How To Implement a Connected Vehicle Gateway in a Secure and Cost-efficient Manner?

Chrysler announced a recall for 1.4 million vehicles 2 years ago after Miller and Valasek demonstrated to WIRED that they could remotely hijack a Jeep’s digital systems over the Internet. Chrysler attack is just one of many examples on car hacking we have seen so far. Back in 2014 the share of connected cars was just about 13% of new vehicles and by 2020 the same number has been forecasted to reach 75% (BI Intelligence 2014). If this problem is not tackled, what might happen in few years?

The number of applications and features utilizing connectivity is ever growing. Remote vehicle control (even moving the vehicle remotely) and remote diagnostic data collection are becoming mainstream features and a growing number of connected features require more and more extensive access to the vehicle network. Connecting the vehicle network to Internet is the highest cyber security risk in a modern vehicle. Furthermore, it is very critical from safety point of view – in worst case hackers could get control over not just one but an entire fleet of vehicles.

In this post we introduce the architectural components of a safe and secure connected vehicle gateway implementation.

SOFTWARE IS THE KEY

Software can be used in conjunction with the system design to implement a secure connected gateway. There are a number of technologies that can be used to mitigate risks, and here are examples of a few that have been proven:

  • Risk analysis of the system to identify critical components and data flows
  • Architecture design that uses sand-boxing, attack surface minimization, and defense in depth
  • Cryptography throughout the chain that enforces validation

Link Motion software stack has been designed from day zero for secure connected cars. Our hardware has been designed to support secure software – not the other way around. Link Motion software platform uses selected hardware-level security technologies to further enhance the security of the platform.

Software-centric approach has also an advantage of increased flexibility with well-known development tools. This flexibility allows rapid innovation, vast pool of developers and easy integration of mainstream software components. Both flexibility and security need to be maintained in the platform – this is why software is the key of a secure connected gateway.

HOW TO IMPLEMENT THE SECURE CONNECTED GATEWAY?

The connected vehicle gateway can be implemented as a separate unit but making it as an extension of a cockpit solution is a more integrated approach with better cost-efficiency. The cockpit solution is the key system gathering information from the vehicle and presenting it to the user, and it could and should be extended to act as a gateway as well. Telematics features are a natural extension to the cockpit since the functions partially overlap already.

Motion T secure connected carputer allows implementation of the connected vehicle gateway as a separate unit or as a part of the cockpit solution (eCockpit). Cockpit solution allows for a higher integration level, whereas a separate unit gives more flexibility to position the unit freely in the car, for instance close to the antennas. Software platform is the same in both, and can be reused for both configurations.

Motion T secure connected carputer

PICTURE 1 Motion T secure connected carputer acts as a secure connected gateway, offering four different hardware configurations from a pure connected gateway to full eCockpit solution including up to three displays and connectivity.

Mikko Hurskainen, Technologist of Link Motion will share more on this topic @ Automotive Linux Summit Tokyo 2nd June at 9AM, and @ ConCarExpo Berlin 5th – 6th July. Welcome to listen and discuss!

If you wish to set up a meeting in these shows beforehand, please contact Sarianne Niemi, sarianne.niemi@link-motion.com.

SHAREShare on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestEmail this to someone

Comments (8)

  1. www aol com aol com mail login

    With this technique, you are going to install the AOL software for the new
    computer and keep to the directions to “Add existing account to the present computer.

    Reply
  2. Pendants or Charms

    BTW those stating AZ doesn’t lag it does.

    Reply
  3. 86Numbers

    I see you don’t monetize your site, don’t waste your traffic, you can earn additional
    cash every month because you’ve got hi quality content.

    If you want to know what is the best adsense alternative, type in google: adsense alternative Mertiso’s tips

    Reply
  4. facebook login

    Facebook offers a Java – Script Software Development Kit,.
    You heard accounts of success from people that are reconnected with old friends, sweethearts, or relatives using this web 2 .
    0 tool.

    Reply
  5. http://bookoflove.com.ua

    Have you ever given away a part of mail and immediately kicked yourself for doing.

    Windows Live for Mobile: Hotmail; MSN: Text Alerts; Resources.

    Reply
  6. amazon login

    Facebook is an internet based social networking site made for friends and family for connecting with one another and stay
    up-to-date one.

    Reply
  7. www.almerek.kz

    The obligations wouldn’t ‘not pertain to services which are provided
    only into a single place, or even places inside the same area, for example free Wi-Fi access provided in restaurants,
    libraries or maybe a campus’. PCWorld can help you navigate the
    PC ecosystem to discover the products you want and also the advice you need the job done.

    Reply
  8. paypal one touch

    Click about the “Sign Up” link on top of Pay – Pal’s homepage.

    Reply

Leave a Comment

Your email address will not be published. Required fields are marked *