• Session No.32 Automotive Security Technology (OS)
  • May 22Room G418+G41914:55-17:00
  • Chair: Yoshiaki Ishizuka (Marelli)
Contents
With the publication of ISO/SAE 21434, it has become essential to strengthen the cybersecurity of automobiles. In this session, we will broadly discuss research and best practices regarding attack, defense, and evaluation techniques related to automobile security.
Committee
Cybersecurity Courses Organizing Committee
Organizer
Makoto Kayashima (Hitachi), Masahiro Aoyama (Nissan Motor), Masaru Ooe (SUBARU), Yoshiaki Ishizuka (Marelli)
No. Title・Author (Affiliation)
138

Encrypted Control Technology for Concealing Communications and Controls as a Cybersecurity Countermeasure

Takaharu Yamada (dSPACE Japan)・Kiminao Kogiso (The University of Electro-Communications)

This study constructs an encrypted speed control system involving an automobile fuel consumption model on a dSPACE Real-Time Processor. It demonstrates the effectiveness of our developed Matlab/Simulink encrypted PID control block and the real-time detection of replay attacks.

139

Cybersecurity Assessment in Controller Area Network Architectures

Adrian Fernandez (Applus+ IDIADA)

Cybersecurity attacks on vehicles are currently a real threat to the safety of road users, regarding both their physical safety and their data privacy. Furthermore, cybersecurity is a "hidden" quality of a vehicle, and only perceived by the user after an event has occurred. Applus IDIADA has developed a methodology to deploy a cybersecurity assessment service capable of evaluating the cybersecurity of a vehicle. This paper presents the solution to evaluate the vehicle cybersecurity related to the widely used CAN network, and the impact it can have on a vehicle when the cybersecurity of the CAN is not guaranteed.

140

Cybersecurity Assessment of the Charging Process between Vehicle and Charging Point

Miguel Martínez Montoya (IDIADA Automotive Technology)

Electricity and the automotive industry have always been intrinsically linked. Such is the fact that today the automotive industry future is dependent on the capacity to store electricity in vehicles. Electric vehicles bring us the opportunity to develop an efficient and zero emission way of transport. As an antagonist, the hasty change in the automotive environment, leads to flaws and misconfigurations in the electric vehicle environment which can be exploited by attackers. The following paper addresses this problem and is focused on the cybersecurity vulnerabilities of the charging process related to the vehicle and the power supply equipment.

141

Automotive Cybersecurity Assessment

Manel Rodriguez-Recasens (Applus+ IDIADA)

The safety tests are a need in the automotive industry. EuroNCAP is the reference entity of these kind of tests in Europe and have been evolving along the years to cover all the safety key points. Cybersecurity threats in the automotive industry are a hot topic and it is important to evaluate the cybersecurity level of each vehicle. An example of this importance is the new R155 and ISO21434. Applus IDIADA is part of an EuroNCAP working group and has been growing its capabilities and preparing the field to be able to perform a cybersecurity assessment of each vehicle interface.

142

Post-Quantum Cryptography on Embedded ECUs

Philipp Jungklass・Claude-Pascal Stoeber-Schmidt・Randolf Barg・Henrik Hansen・Marco Siebert (IAV)

With the wide availability of quantum computers in the coming years, existing cryptographic algorithms will no longer offer the necessary security. For this reason, the NIST started back in 2017 to select procedures that can also offer the necessary security in the age of quantum computers. Due to the multi-stage, time-consuming selection process, the manufacturers of various microcontroller and microprocessor families were no longer able to integrate the necessary hardware support into the current generations, which makes implementation in software mandatory. For this reason, this presentation will introduce an open-source library called quantumSAR, which implements most of the current candidates of the NIST standardisation process in such a way that it can be executed in a platform-independent and AUTOSAR-compliant manner, even on low-performance embedded systems.

Back to Top