SlideShare a Scribd company logo
1 of 16
Download to read offline
AUTOMOTIVE
CYBER SECURITY
Introduction
IT/Cyber modules of a car
Automotive Architecture
Functionality
Security Design Philosophy
Secure Architecture
Security Enhancement
Firewall
Why Needed
Intrusion Detetction System
CONTENTS
As the integration of advance
technologies in electronics, software and
internet connectivity has increased in
automotive sector, Our vehicles are now
more prone to cyber attacks. A
ransomware attack may occur in the
steering, braking, car infotainment
systems, etc.
INTRODUCTION
IT/CYBER MODULES AND EQUIPMENTS OF A CAR
Modern cars have
their ECU, ECM, BCM
and other electronic
modules connected
to internet via a sim
card, satellite, etc.
Hence, the major
fuctionalities of
modern cars are
prone to cyber
attacks.
MAIN BOARD
ECU/ECM
OBD - II Port
ECU-2 BCM ECU-3
ECU-1
AUTOMOTIVE ARCHITECTURE
Cloud Services
Cellular/Mobile
Services
Bluetooth
WiFi
Satellite
e-Sim
CAN - Bus
CAN - Bus
All the modules are interconnected via Controller
Area Network (CAN) Bus.
OBD -2 Port has full CAN access
Cars are controlled by various modules like ECM -
Engine working, BCM - Lock & lights, Airbag Module,
Transmission Module - gears, Internet connectvity,
etc.
FUNCTIONALITY
Block everything except what you must let through.
What you do let through, Authenticate and Sign or
encrypt.
(If you care about Integrity you sign, If care about privacy you encrypt
)
3.Log what gets through and what gets blocked
1.
2.
SECURITY DESIGN PHILOSOPHY
Add a firewall between CAN and OBD-2
Firewall should have Over the AIr (OTA) updatable rules Protects most vulnerable OBD-2 Port.
MAIN BOARD
ECU/ECM
OBD - II Port
ECU-2 BCM ECU-3
ECU-1
Firewall
SECURE AUTOMOTIVE ARCHITECTURE
Cloud Services
Cellular/Mobile
Services
Bluetooth
WiFi
Satellite
e-Sim
CAN - Bus
CAN - Bus
Firewall
Firewall
Intrusion Detection System
1. Need a Firewall instance on every entry point
- Cellular, WiFi, Bluetooth, OBD
-2
2. Rules/Policies should be updatable
- Detects abnormal/malicious activities and traffic
SECURITY ENHANCEMENT
Firewall
Automotive network firewall is a security system
that monitors and controls incoming and outgoing
network traffics of automotive at every point based
on predetermined security rules. The main functions
of network firewall include data packet filter, anti-
DoS and access control.
FIREWALL
FIREWALL
Security needs to evolve and policies should be timely
updated
Detects and block DoS attacks
Security against Vehicle Theft
OTA updates and vehicle data is monitored from
intrusion
Need to prevent the routing engine from getting
Overloaded
Need to understand when attacks are being made and
to be able to take action
WHY NEEDED ?
CAN Detection
g
ECU Inte rity
Keyfob Detection
- Abnormal/Conflicting CAN activity
- CAN messages with invalid or clone ID
CAN bus scan by unauthorized tool
-
- Alert when ECU is reflashed (reprogrammed) or modified
- Monitor flash signatures for changes
- Detect a diagnostic tool on the BUS performing diagnostic scans
- Detect scans being performed by unauthorized tools
INTRUSION DETECTION SYSTEM
Cyberattacks on Vehicles specially Luxury Vehicles are
starting to increase.
Hackers could attack our vehicles Or vehicles of
Important People (P.M., Defence Vehicles, etc).
Overall, hackers are morelikely to attack luxury vehicles
for financial gains OR Important People Vehicles to get
their wishes fulfilled.
The automotive makers are continuously increasing the
security measures to avoid mis-happenings.
KEY TAKEAWAYS
THANK YOU

More Related Content

What's hot

Diagnostic in Adaptive AUTOSAR
Diagnostic in Adaptive AUTOSARDiagnostic in Adaptive AUTOSAR
Diagnostic in Adaptive AUTOSARBernhard Wagner
 
ECU Flashing: Flash Bootloaders that Facilitate ECU Reprogramming
ECU Flashing: Flash Bootloaders that Facilitate ECU ReprogrammingECU Flashing: Flash Bootloaders that Facilitate ECU Reprogramming
ECU Flashing: Flash Bootloaders that Facilitate ECU ReprogrammingEmbitel Technologies (I) PVT LTD
 
Adaptive AUTOSAR - The New AUTOSAR Architecture
Adaptive AUTOSAR - The New AUTOSAR ArchitectureAdaptive AUTOSAR - The New AUTOSAR Architecture
Adaptive AUTOSAR - The New AUTOSAR ArchitectureAdaCore
 
Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)Priyanka Aash
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive IndustrySasken Technologies Ltd.
 
Automotive embedded systems part8 v1
Automotive embedded systems part8 v1Automotive embedded systems part8 v1
Automotive embedded systems part8 v1Keroles karam khalil
 
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture Embitel Technologies (I) PVT LTD
 
What is AUTOSAR Communication Stack (ComStack)?Get introduced to CAN ComStack
What is AUTOSAR Communication Stack (ComStack)?Get introduced to CAN ComStackWhat is AUTOSAR Communication Stack (ComStack)?Get introduced to CAN ComStack
What is AUTOSAR Communication Stack (ComStack)?Get introduced to CAN ComStackEmbitel Technologies (I) PVT LTD
 
pptudsy.pptx
pptudsy.pptxpptudsy.pptx
pptudsy.pptxYamini454
 
Automotive embedded systems part5 v1
Automotive embedded systems part5 v1Automotive embedded systems part5 v1
Automotive embedded systems part5 v1Keroles karam khalil
 
Autosar basics by ARCCORE
Autosar basics by ARCCOREAutosar basics by ARCCORE
Autosar basics by ARCCOREARCCORE
 
Over-the-air (OTA) updates and the Connected car
Over-the-air (OTA) updates and the Connected carOver-the-air (OTA) updates and the Connected car
Over-the-air (OTA) updates and the Connected carPratik Desai, PhD
 

What's hot (20)

Diagnostic in Adaptive AUTOSAR
Diagnostic in Adaptive AUTOSARDiagnostic in Adaptive AUTOSAR
Diagnostic in Adaptive AUTOSAR
 
Autosar Basics hand book_v1
Autosar Basics  hand book_v1Autosar Basics  hand book_v1
Autosar Basics hand book_v1
 
Automotive Hacking
Automotive Hacking Automotive Hacking
Automotive Hacking
 
ECU Flashing: Flash Bootloaders that Facilitate ECU Reprogramming
ECU Flashing: Flash Bootloaders that Facilitate ECU ReprogrammingECU Flashing: Flash Bootloaders that Facilitate ECU Reprogramming
ECU Flashing: Flash Bootloaders that Facilitate ECU Reprogramming
 
Adaptive AUTOSAR - The New AUTOSAR Architecture
Adaptive AUTOSAR - The New AUTOSAR ArchitectureAdaptive AUTOSAR - The New AUTOSAR Architecture
Adaptive AUTOSAR - The New AUTOSAR Architecture
 
Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive Industry
 
Automotive embedded systems part8 v1
Automotive embedded systems part8 v1Automotive embedded systems part8 v1
Automotive embedded systems part8 v1
 
Cyber Security Threat Modeling
Cyber Security Threat ModelingCyber Security Threat Modeling
Cyber Security Threat Modeling
 
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
 
ISO 26262: Automotive Functional Safety
ISO 26262: Automotive Functional SafetyISO 26262: Automotive Functional Safety
ISO 26262: Automotive Functional Safety
 
What is AUTOSAR Communication Stack (ComStack)?Get introduced to CAN ComStack
What is AUTOSAR Communication Stack (ComStack)?Get introduced to CAN ComStackWhat is AUTOSAR Communication Stack (ComStack)?Get introduced to CAN ComStack
What is AUTOSAR Communication Stack (ComStack)?Get introduced to CAN ComStack
 
Flash Bootloader Development for ECU programming
Flash Bootloader Development for ECU programmingFlash Bootloader Development for ECU programming
Flash Bootloader Development for ECU programming
 
pptudsy.pptx
pptudsy.pptxpptudsy.pptx
pptudsy.pptx
 
Automotive embedded systems part5 v1
Automotive embedded systems part5 v1Automotive embedded systems part5 v1
Automotive embedded systems part5 v1
 
Autosar MCAL (Microcontroller Abstraction Layer)
Autosar MCAL (Microcontroller Abstraction Layer)Autosar MCAL (Microcontroller Abstraction Layer)
Autosar MCAL (Microcontroller Abstraction Layer)
 
UDS Protocol Stack | Manual Guide | Fact Sheet
UDS Protocol Stack | Manual Guide | Fact SheetUDS Protocol Stack | Manual Guide | Fact Sheet
UDS Protocol Stack | Manual Guide | Fact Sheet
 
Autosar basics by ARCCORE
Autosar basics by ARCCOREAutosar basics by ARCCORE
Autosar basics by ARCCORE
 
Over-the-air (OTA) updates and the Connected car
Over-the-air (OTA) updates and the Connected carOver-the-air (OTA) updates and the Connected car
Over-the-air (OTA) updates and the Connected car
 
UDS PPT
UDS PPTUDS PPT
UDS PPT
 

Similar to AUTOMOTIVE CYBER SECURITY PPT

Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWKapil Kanugo
 
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptxSeminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptxsaketkumar128143
 
Current state of automotive network security
Current state of automotive network securityCurrent state of automotive network security
Current state of automotive network securityFFRI, Inc.
 
Hackers are the new highway threat
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threatHarman Innovation
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 
Chapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptxChapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptx40NehaPagariya
 
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...FFRI, Inc.
 
Lemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, KarlshruheLemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, KarlshruheValentin Scinteie
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesMadhur Gupta
 
Controller area network as the security of the vehicles
Controller area network as the security of the vehiclesController area network as the security of the vehicles
Controller area network as the security of the vehiclesIAEME Publication
 
IRJET - IoT based Advanced Home Automation
IRJET -  	  IoT based Advanced Home AutomationIRJET -  	  IoT based Advanced Home Automation
IRJET - IoT based Advanced Home AutomationIRJET Journal
 
From Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive RevolutionFrom Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive RevolutionAlexander Schellong
 
DefCamp 2013 - In vehicle CAN network security
DefCamp 2013 - In vehicle CAN network securityDefCamp 2013 - In vehicle CAN network security
DefCamp 2013 - In vehicle CAN network securityDefCamp
 

Similar to AUTOMOTIVE CYBER SECURITY PPT (20)

Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptxSeminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
 
Wfcs2019
Wfcs2019Wfcs2019
Wfcs2019
 
Current state of automotive network security
Current state of automotive network securityCurrent state of automotive network security
Current state of automotive network security
 
Hackers are the new highway threat
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threat
 
hamaa2.pdf
hamaa2.pdfhamaa2.pdf
hamaa2.pdf
 
Deepak
DeepakDeepak
Deepak
 
Deepak
DeepakDeepak
Deepak
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Nireeksha
NireekshaNireeksha
Nireeksha
 
Chapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptxChapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptx
 
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
 
Lemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, KarlshruheLemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, Karlshruhe
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
 
Controller area network as the security of the vehicles
Controller area network as the security of the vehiclesController area network as the security of the vehicles
Controller area network as the security of the vehicles
 
IRJET - IoT based Advanced Home Automation
IRJET -  	  IoT based Advanced Home AutomationIRJET -  	  IoT based Advanced Home Automation
IRJET - IoT based Advanced Home Automation
 
From Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive RevolutionFrom Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive Revolution
 
thesis paper
thesis paperthesis paper
thesis paper
 
DefCamp 2013 - In vehicle CAN network security
DefCamp 2013 - In vehicle CAN network securityDefCamp 2013 - In vehicle CAN network security
DefCamp 2013 - In vehicle CAN network security
 
7hj
7hj7hj
7hj
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 

AUTOMOTIVE CYBER SECURITY PPT

  • 2. Introduction IT/Cyber modules of a car Automotive Architecture Functionality Security Design Philosophy Secure Architecture Security Enhancement Firewall Why Needed Intrusion Detetction System CONTENTS
  • 3. As the integration of advance technologies in electronics, software and internet connectivity has increased in automotive sector, Our vehicles are now more prone to cyber attacks. A ransomware attack may occur in the steering, braking, car infotainment systems, etc. INTRODUCTION
  • 4. IT/CYBER MODULES AND EQUIPMENTS OF A CAR Modern cars have their ECU, ECM, BCM and other electronic modules connected to internet via a sim card, satellite, etc. Hence, the major fuctionalities of modern cars are prone to cyber attacks.
  • 5. MAIN BOARD ECU/ECM OBD - II Port ECU-2 BCM ECU-3 ECU-1 AUTOMOTIVE ARCHITECTURE Cloud Services Cellular/Mobile Services Bluetooth WiFi Satellite e-Sim CAN - Bus CAN - Bus
  • 6. All the modules are interconnected via Controller Area Network (CAN) Bus. OBD -2 Port has full CAN access Cars are controlled by various modules like ECM - Engine working, BCM - Lock & lights, Airbag Module, Transmission Module - gears, Internet connectvity, etc. FUNCTIONALITY
  • 7.
  • 8. Block everything except what you must let through. What you do let through, Authenticate and Sign or encrypt. (If you care about Integrity you sign, If care about privacy you encrypt ) 3.Log what gets through and what gets blocked 1. 2. SECURITY DESIGN PHILOSOPHY
  • 9. Add a firewall between CAN and OBD-2 Firewall should have Over the AIr (OTA) updatable rules Protects most vulnerable OBD-2 Port. MAIN BOARD ECU/ECM OBD - II Port ECU-2 BCM ECU-3 ECU-1 Firewall SECURE AUTOMOTIVE ARCHITECTURE Cloud Services Cellular/Mobile Services Bluetooth WiFi Satellite e-Sim CAN - Bus CAN - Bus Firewall
  • 10. Firewall Intrusion Detection System 1. Need a Firewall instance on every entry point - Cellular, WiFi, Bluetooth, OBD -2 2. Rules/Policies should be updatable - Detects abnormal/malicious activities and traffic SECURITY ENHANCEMENT
  • 11. Firewall Automotive network firewall is a security system that monitors and controls incoming and outgoing network traffics of automotive at every point based on predetermined security rules. The main functions of network firewall include data packet filter, anti- DoS and access control. FIREWALL
  • 13. Security needs to evolve and policies should be timely updated Detects and block DoS attacks Security against Vehicle Theft OTA updates and vehicle data is monitored from intrusion Need to prevent the routing engine from getting Overloaded Need to understand when attacks are being made and to be able to take action WHY NEEDED ?
  • 14. CAN Detection g ECU Inte rity Keyfob Detection - Abnormal/Conflicting CAN activity - CAN messages with invalid or clone ID CAN bus scan by unauthorized tool - - Alert when ECU is reflashed (reprogrammed) or modified - Monitor flash signatures for changes - Detect a diagnostic tool on the BUS performing diagnostic scans - Detect scans being performed by unauthorized tools INTRUSION DETECTION SYSTEM
  • 15. Cyberattacks on Vehicles specially Luxury Vehicles are starting to increase. Hackers could attack our vehicles Or vehicles of Important People (P.M., Defence Vehicles, etc). Overall, hackers are morelikely to attack luxury vehicles for financial gains OR Important People Vehicles to get their wishes fulfilled. The automotive makers are continuously increasing the security measures to avoid mis-happenings. KEY TAKEAWAYS