Telematics Wire Magazine 2016

Page 16

certification by the assessment agency exida Certification SA for the EB tresos Safety OS. Elektrobit security solutions are based on AUTOSAR and HIS (http://portal.automotive-his.de/index. php?lang=english ) and offer support for cryptographic hardware such as Secure Hardware Extension (SHE) and Hardware Security Module (HSM). We believe than an open and standards-based approach to security implementations (e.g. peer reviews outside of individual OEMs) will prevail over the more secretive and closed implementations that we have seen in the past. In general, techniques for securing our systems and software go well beyond just the automotive industry. There is already collaboration happening among carmakers around safety and security, but we also have to look outside our industry at the successful technologies and solutions used else where that can be applied to automotive. What is the role of after market in telematics value chain? The aftermarket ecosystem will still A be very important especially as we see Apple CarPlay and Google’s Android Auto gaining traction. In some regions, like South America and Asia for example, carmakers are developing vehicles that don’t have high-end telematics systems, making the aftermarket ecosystems very important. How sustainable do you feel are Q the new telematics & connectivity-based business models like car-sharing, smart mobility? think they’re very sustainable. A IMany carmakers including Ford, GM, Daimler and Audi are exploring these new business models and are invested in expanding their offerings – especially in urban areas. There is a great opportunity for the mobile apps ecosystem to deliver unique applications to the auto industry around parking and safety, in addition to other areas. Everything is becoming more and more connected and the carmakers are smart to invest in such business models.

Q

PG.16 | Smart Automotive | March - April 2016

Automotive Cyber-Security: Separating fear from the fact

Franz Tschimben Business Development Savari Inc.

C

yber security has been a big issue for the fast evolving automotive market ever since electronics became a crucial part of the vehicle, but only made it into mainstream media in July 2015. Miller and Valasek1 exposed the weak points of regular cars on the streets by wirelessly and remotely hacking into a Jeep Cherokee for demonstration purposes. Testing was conducted on a total of 20 car models released from 2014 to 2015 from different manufacturers – the problem is universal and involves the whole industry. The hacking demonstration of the car happened through the center piece of today’s connected cars: the infotainment system and its cellular connection. As cars will get more connected and autonomous in the years to come, more entry options will be given to software specialists with malicious intentions. Research of the Automotive Security Review Board2, led by Intel, shows that 15 exposed attack surfaces exist in the next generation smart car. One of the biggest and most widely regarded benefits of the connection and automation of cars – reducing total fatal car accidents – is at stake. According

Sridhar Reddy Savari Networks to Miller and Valasek3, a successful hack depends on remote attack surfaces, cyber physical features and in-vehicle network architectures were the identified. The industry has given priority to the threat and works towards creating a system that reduces hacking threats by closing down entry points. Importance is given to solutions with software that can be continuously updated and therefore strengthened. OEM’s, suppliers and specialized automotive cybersecurity companies like Argus and Towersec, are developing and marketing solutions. Furthermore, the Auto Information Sharing and Analysis Center (ISAC) has been established for major automakers in July 2015. Its chairman, Tom Stricker from Toyota, explained that the group will act as a central hub for gathering intelligence that allows to analyze, share and track cyber threats and spot potential weaknesses in vehicle electronics”.4 As the industry is intended to decrease the threat of cybersecurity by bundling forces, so does legislation by working on a new draft bill – titled “Security and Privacy in your (SPY) car act of 2015”5 that aims at establishing cyberwww.telematicswire.net


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.