SlideShare a Scribd company logo
Department of Electrical and Electronics Engineering
Department of Electrical and Electronics Engineering
SRI SAIRAM COLLEGE OF ENGINEERING
ANEKAL, BANGALORE -562106
Seminar Title : ROLE OF CYBER SECURITY IN CONNECTED CARS
PRESENTED BY : TEJAS DN
INDIRA J
MOHAMMED SAADULLAKHAN
SEMINAR GUIDE : Prof. Malini KV
HOD, EEE
SSCE
INTRODUCTION
Department of Electrical and Electronics Engineering
 The influx of digital transformation and advancements
the automakers to develop cars that are cleaner, safer,
smarter and more energy-efficient.
 Employ with a series of intelligent technologies such as
Adaptive headlights, Lane keep assist, Collision warning,
Adaptive cruise control, Reversing camera, Hill assist,
Crash-imminent braking.
 Connected cars
 Safer, energy efficient
Modern smart cars
 They can have about 70-100 embedded
microcontrollers onboard running millions of lines of
code within them.
 These ECU’s control almost every function of the car
including safety-critical vehicle applications such as
braking, engine control, steering, airbag functions,
navigation systems etc.
 Connected with V2V and infr(V2X )
 They become more vulnerable than ever to attackers
and hackers.
 A compromised infotainment system can offer an
effective vector for attacking safety critical ECU’s
connected to the
In-vehicle network.
 Once a hacker gains access to the in-vehicle network of
the car, they could control everything.
Security Attacks Overview
o Active attacks
o Passive attacks
How A Connected Car Can Be Hacked?
 A modern automotive can be hacked either by
physical access or by remote access of the In-Vehicle-Network.
 Direct physical access to the car internal network is possible via OBD port, Debug
ports or Digital multimedia ports.
 Remote access to car is possible via a broad range of attack vectors such as
CD/DVD players, Short-range wireless access – Bluetooth, RFID(remote Keyless
entry, vehicle immobilizers, Tire Pressure Monitoring System), Dedicated Short-
Range Communications and Long-range wireless access – WiFi, Cellular
Technologies(LTE, GSM, CDMA)
Department of Electrical and Electronics Engineering
Some of the potential attack vectors in a Connected car
1. Telematics Control Unit
2. Infotainment System
3. Unprotected External Interfaces and Debug Ports
4. Wireless Key Entry
5. Over the Air Firmware Upgrades
6. Insecure communication channels
7. Insider Attacks
8. e-Call Center Attack
9. Poor Security Policies, Procedures,
Practices
PROPOSED SYSTEM
Department of Electrical and Electronics Engineering
Securing a Connected
Vehicle
 The security system inside
autonomous connected vehicle
shall ensure that technology in
the connected Car works 100%
of the time without compromising
the safety-critical functions. To
achieve this a multi-layered,
distributed security architecture
with a defense-in-depth strategy
is needed.
Security measures to secure vehicle network:
Off Board Network Security
•V2X Security
•Secure external interfaces
•Remote Diagnostics
•Target Authentication
•Secure Software Updates Over the Air(SOTA)
In-Vehicle Network Security
•Secure Boot
•Secure Flashing
•Secure Access
•Secure Storage
•Secure Onboard Communication(SecOC)
•Secure Diagnostics
•Key Management
•Auditing and Logging
•Hardware based Crypto(HSM/SHE)
•Machine Security & Tamper protection
REFERENCE
 Roadmap for Cybersecurity in Autonomous Vehicles, Vipin Kumar Kukkala, Sooryaa V
Thiruloga, and Sudeep Pasricha
 Cybersecurity in Autonomous Vehicles, Shusuke Morimoto, Fang Wang, Ranchao Zhang, Ji
Zhu
 https://www.telematicswire.net/securing-a-connected-car/
Department of Electrical and Electronics Engineering
THANK YOU
ANY QUERIES

More Related Content

Similar to Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx

WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
Symantec
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
Brad Nicholas
 
V2X Secure Central Gateway
V2X Secure Central GatewayV2X Secure Central Gateway
V2X Secure Central Gateway
Michael Lesniak
 
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
cscpconf
 
Hackers are the new highway threat
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threat
Harman Innovation
 
Understanding Automotive
Understanding Automotive Understanding Automotive
Understanding Automotive
DorleControls
 
10 embedded systems1
10 embedded systems110 embedded systems1
10 embedded systems1
vinodanytime
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Madhur Gupta
 
HOME APPLIANCE CONTROL SYSTEM USING GSM TECHNOLOGY
HOME APPLIANCE CONTROL SYSTEM USING GSM TECHNOLOGYHOME APPLIANCE CONTROL SYSTEM USING GSM TECHNOLOGY
HOME APPLIANCE CONTROL SYSTEM USING GSM TECHNOLOGY
SEKHAR PENTAKOTA
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
Iaetsd Iaetsd
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdf
DorleControls
 
Project report3
Project report3Project report3
Project report3
Bhanuprakash K
 
AUTOMOTIVE CYBER SECURITY PPT
AUTOMOTIVE CYBER SECURITY PPTAUTOMOTIVE CYBER SECURITY PPT
AUTOMOTIVE CYBER SECURITY PPT
VinayakSharma609332
 
automotivecybersecurityppt.pdf
automotivecybersecurityppt.pdfautomotivecybersecurityppt.pdf
automotivecybersecurityppt.pdf
VinayakSharma609332
 
Algorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous CarsAlgorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous Cars
Association of Scientists, Developers and Faculties
 
Vehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdfVehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdf
DorleControls
 
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road MapSecurity and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Maanak Gupta, Ph.D.
 
Network Simulator Master Thesis in Egypt
Network Simulator Master Thesis in EgyptNetwork Simulator Master Thesis in Egypt
Network Simulator Master Thesis in Egypt
Phdtopiccom
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
ParthaS
 
auto theft Project1
auto theft Project1auto theft Project1
auto theft Project1
Akshay Gaikwad
 

Similar to Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx (20)

WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
V2X Secure Central Gateway
V2X Secure Central GatewayV2X Secure Central Gateway
V2X Secure Central Gateway
 
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
 
Hackers are the new highway threat
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threat
 
Understanding Automotive
Understanding Automotive Understanding Automotive
Understanding Automotive
 
10 embedded systems1
10 embedded systems110 embedded systems1
10 embedded systems1
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
 
HOME APPLIANCE CONTROL SYSTEM USING GSM TECHNOLOGY
HOME APPLIANCE CONTROL SYSTEM USING GSM TECHNOLOGYHOME APPLIANCE CONTROL SYSTEM USING GSM TECHNOLOGY
HOME APPLIANCE CONTROL SYSTEM USING GSM TECHNOLOGY
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdf
 
Project report3
Project report3Project report3
Project report3
 
AUTOMOTIVE CYBER SECURITY PPT
AUTOMOTIVE CYBER SECURITY PPTAUTOMOTIVE CYBER SECURITY PPT
AUTOMOTIVE CYBER SECURITY PPT
 
automotivecybersecurityppt.pdf
automotivecybersecurityppt.pdfautomotivecybersecurityppt.pdf
automotivecybersecurityppt.pdf
 
Algorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous CarsAlgorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous Cars
 
Vehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdfVehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdf
 
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road MapSecurity and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
 
Network Simulator Master Thesis in Egypt
Network Simulator Master Thesis in EgyptNetwork Simulator Master Thesis in Egypt
Network Simulator Master Thesis in Egypt
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
 
auto theft Project1
auto theft Project1auto theft Project1
auto theft Project1
 

Recently uploaded

Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 

Recently uploaded (20)

Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 

Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx

  • 1. Department of Electrical and Electronics Engineering Department of Electrical and Electronics Engineering SRI SAIRAM COLLEGE OF ENGINEERING ANEKAL, BANGALORE -562106 Seminar Title : ROLE OF CYBER SECURITY IN CONNECTED CARS PRESENTED BY : TEJAS DN INDIRA J MOHAMMED SAADULLAKHAN SEMINAR GUIDE : Prof. Malini KV HOD, EEE SSCE
  • 2. INTRODUCTION Department of Electrical and Electronics Engineering  The influx of digital transformation and advancements the automakers to develop cars that are cleaner, safer, smarter and more energy-efficient.  Employ with a series of intelligent technologies such as Adaptive headlights, Lane keep assist, Collision warning, Adaptive cruise control, Reversing camera, Hill assist, Crash-imminent braking.  Connected cars  Safer, energy efficient
  • 3. Modern smart cars  They can have about 70-100 embedded microcontrollers onboard running millions of lines of code within them.  These ECU’s control almost every function of the car including safety-critical vehicle applications such as braking, engine control, steering, airbag functions, navigation systems etc.  Connected with V2V and infr(V2X )  They become more vulnerable than ever to attackers and hackers.  A compromised infotainment system can offer an effective vector for attacking safety critical ECU’s connected to the In-vehicle network.  Once a hacker gains access to the in-vehicle network of the car, they could control everything.
  • 4. Security Attacks Overview o Active attacks o Passive attacks How A Connected Car Can Be Hacked?  A modern automotive can be hacked either by physical access or by remote access of the In-Vehicle-Network.  Direct physical access to the car internal network is possible via OBD port, Debug ports or Digital multimedia ports.  Remote access to car is possible via a broad range of attack vectors such as CD/DVD players, Short-range wireless access – Bluetooth, RFID(remote Keyless entry, vehicle immobilizers, Tire Pressure Monitoring System), Dedicated Short- Range Communications and Long-range wireless access – WiFi, Cellular Technologies(LTE, GSM, CDMA)
  • 5. Department of Electrical and Electronics Engineering Some of the potential attack vectors in a Connected car 1. Telematics Control Unit 2. Infotainment System 3. Unprotected External Interfaces and Debug Ports 4. Wireless Key Entry 5. Over the Air Firmware Upgrades 6. Insecure communication channels 7. Insider Attacks 8. e-Call Center Attack 9. Poor Security Policies, Procedures, Practices
  • 6. PROPOSED SYSTEM Department of Electrical and Electronics Engineering Securing a Connected Vehicle  The security system inside autonomous connected vehicle shall ensure that technology in the connected Car works 100% of the time without compromising the safety-critical functions. To achieve this a multi-layered, distributed security architecture with a defense-in-depth strategy is needed.
  • 7.
  • 8. Security measures to secure vehicle network: Off Board Network Security •V2X Security •Secure external interfaces •Remote Diagnostics •Target Authentication •Secure Software Updates Over the Air(SOTA) In-Vehicle Network Security •Secure Boot •Secure Flashing •Secure Access •Secure Storage •Secure Onboard Communication(SecOC) •Secure Diagnostics •Key Management •Auditing and Logging •Hardware based Crypto(HSM/SHE) •Machine Security & Tamper protection
  • 9. REFERENCE  Roadmap for Cybersecurity in Autonomous Vehicles, Vipin Kumar Kukkala, Sooryaa V Thiruloga, and Sudeep Pasricha  Cybersecurity in Autonomous Vehicles, Shusuke Morimoto, Fang Wang, Ranchao Zhang, Ji Zhu  https://www.telematicswire.net/securing-a-connected-car/ Department of Electrical and Electronics Engineering