Intel automotive network security solutions

As cars become more common interconnected system, the risk of the vehicle suffered hacker attacks have become more sophisticated. The longer the vehicle on a road running time, are more likely to be exposed to an unsafe environment. Therefore, the automotive industry hopes at all levels, to be able to find a reliable virtual network defenses. 2016 American Society of Engineers (SAE) World Congress, an expert from Intel’s microprocessors are given, the automotive industry must protect the security problem to be solved.

As general manager of Intel networking security matter, Lorie Wigle believe Controller Area Network CAN bus systems, such as encryption technology is overvalued, in fact, encryption can be prevented only partially hazardous conditions. Currently there is no perfect solution, the security issue is the need to always be considered, by no means simply a preliminary tasks involved in the field is not limited to the automotive industry.

Drive systems and infrastructure should also be security, but also worth noting that attacks the most value to the cloud network, rather than the vehicle itself. Although many people think of today’s high level of danger, but the complexity of the vehicle actually still relatively low. Ordinary cars have 25–200 ranging from microprocessors, more than 65 million lines of software code, but about half of which are used in multimedia systems. Now there are 144 limousine electronic control unit is connected, is located on the CAN bus 73, 61 use local interconnect network (LIN), the remaining 10 dependent FlexRay vehicle networking. In addition, the top-level configuration models using over 100 motor to achieve comfort control cockpit.

Drive system is the target of the most vulnerable, but also potentially dangerous vehicles being invaded by hackers, including the most dangerous form of six. The most common to the number of car thieves, theft traditional way is to apply some of the physical means to open the door, now joined the wireless intrusions. Many hackers even to pursue technical superiority, but only wireless car theft method. Some offenders have both advanced technical knowledge and tools, but also the physical and digital means together, such a person is the greatest threat to the user of the vehicle. Coordinator with physical means, can change control settings of the vehicle. More frightening is that some hacker can not only successfully enter someone else’s vehicle, but also the structure of the car very well.

Now the level of telematics is still far away from large-scale promotion, but the future is bound to become a fully interconnected real-time Internet communications environment, cars and trucks, vehicles and infrastructure between the vehicle and the running / brake system information summary, is the mainstream of technological development. Vehicle autopilot technology appears in a part of models, advanced adaptive cruise control systems and associated semi-automatic driving system still has many deficiencies, can not be successfully applied in all driving conditions in.

Adaptive security area of ​​the vehicle is a new concept emerged recently, best practice is to transfer as much as possible the position of hacking into the cloud, Intel cloud-based Intrusion Prevention System (IPS) is a good case. Intel is actively promoting car strengthening security unit, which includes a hardware security module to protect a variety of traffic operations. Hardware security module system uses Wind River hypervisor can be applied in a central processing unit and Intel Trusted Execution Engine software conditions, run multiple operating systems simultaneously. Hardware technology is designed to determine the authenticity of platforms and operating systems, and the establishment of safety level of trust.

Wireless network software upgrade between devices do not allow private individuals, but to get certified by public bodies. Car electronic system protection is to promote the benefits of a secure and flexible development process, as SAE J3061 as planning guidebook. System to identify and attack all the numbers, and then to carry out risk analysis, reducing the intensity of the attack and to improve the hardware and software levels. SAE J3101 standard specifies a set of guidelines for hardware protection needs, combined with the promotion of the common J3061 performance hardware and software.

Intel automotive safety committee composed of researchers, their study by Intel platform network security solutions. Commission and the three “white hat hacker” security research organization (IOActive, iamthecavalry.org, opengarages.org) cooperation, hoping to recruit more network security professionals to accelerate the technology development process.