Towards Deployment of a Zero-Trust Architecture (ZTA) for Automated Vehicles (AV)

2024-01-4115

09/16/2024

Features
Event
2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium
Authors Abstract
Content
Automated Vehicles (A)V development historically placed a significant focus on functionality and less on security. Programs such as Cybersecurity for Robotics and Autonomous Systems Hardening (CRASH) are addressing AV cybersecurity, strengthening security while simultaneously supporting the developer focus on functionality. This task is challenging due to continuous interaction by AVs with the environment through sensors and actuators, command and control, and remote connectivity. This paper presents an approach balancing functionality and security through an AV Zero-Trust Architecture (ZTA) which leverages authentication, cyber policy enforcement, and monitoring to detect and mitigate cyber-attacks. The AV ZTA approach is traceable to NIST 800-217 guidance for applying ZT concepts to Information Technology (IT) networks.
The presented AV architecture example begins with a non-self-driving baseline, adding sensors, actuators, command/control, and remote connectivity. NIST 800-207 principles are distilled into three (3) components: 1. Authentication 2. Policy Enforcement and 3. Monitoring. Authentication includes verifying software authenticity prior to booting, and use of a combination of public/private key encryption, symmetric key encryption, and Message Authentication Codes (MACs) to secure network communication. Policy Enforcement occurs at every AV network node and is overseen by a central gateway. The gateway also monitors traffic and logs issues. Together, these combine into an AV ZTA.
Several recent programs have partially implemented the outlined AV ZTA. For example, the CRASH program has implemented authentication for networked communication, policy enforcement, and monitoring. Other programs are tackling monitoring automotive CAN and ethernet busses and improving resiliency through sensor redundancy and fusion. There remain other unaddressed pieces to fully implement an AV ZTA.
Meta TagsDetails
DOI
https://doi.org/10.4271/2024-01-4115
Pages
11
Citation
Murray, V., Lathrop, S., and Mikulski, D., "Towards Deployment of a Zero-Trust Architecture (ZTA) for Automated Vehicles (AV)," SAE Technical Paper 2024-01-4115, 2024, https://doi.org/10.4271/2024-01-4115.
Additional Details
Publisher
Published
Sep 16
Product Code
2024-01-4115
Content Type
Technical Paper
Language
English