CYBER SECURITY BASICS

CYBER SECURITY BASICS

Cyber-----> Online

Security----> Protection

Cyber Security is nothing but protection from the online threat.

Ques) Why we need cyber security in Automotive?

Ans) As we know number of ECUs in Automobile is increasing and their features are getting complex and as these ECUs are connected to internet or through mobile device or through Bluetooth it is easier to hack the data which are getting transmitted from one ECU to another ECU.

  • In order to protect the data that are critical in nature, and which can cause a serious threat to human life. These data need to be secure, and we secure it through Cyber Security.
  • Ex: - Air Bag deployment where one ECU detects the collision and another ECU deploy the air bag suppose if the data is getting transmitted from one ECU to another ECU and if particular data is get hacked or compromised then it may cause a serious threat to human life.

Ques) How to avoid that scenario?

Ans) This can be avoided through Cyber Security.

  • In a case where data is unsecured the normal data is getting transmitted from one ECU to another ECU through network protocol.
  • In order to secure that data, we can append the MAC (Message Authentication Code) to the normal data.

Unsecure Data
Secured Data

  • MAC will secure the data which is getting transmitted from one ECU to another ECU and which is critical in nature.

Ques) What is MAC and how it is generated?

Ans) MAC is nothing but a Message Authentication Code which is generated through the Cryptographic Algorithm.

  • Cryptographic Algorithm is nothing, but which can convert a plain text to Cypher text.
  • Plain text can be read easily, and which human can also interpret the data when the data is sent.
  • Cypher text is nothing but a non-readable format of the data.

Generate MAC (Message Authenticate CodE)
Generate Cypher Text

  • When the normal data is passed as an input to Cryptographic Algorithm with the Secret Key it generates the MAC (Message Authentication Code).

Ques) We know the data we know what is MAC, but we done know what is Secret Key and what is its function?

Ans) Key is nothing but a encrypted value used to generate the encrypted data from the plain data.

  • Plain data is nothing but the data which is not secured by the hacker.
  • Encrypted data is the secured data which can't be read by the hackers.

There are two types of Keys: -

1. Symmetrical Key

2. Asymmetrical Key

SYMMETRICAL KEY

  • A key which is used for encryption and the same key is used for decryption.
  • When key and data is passed as an input to the cryptographic algorithm it generates the MAC and MAC is appended with the data it forms the encrypted data.
  • The encrypted data is passed from one ECU1 to ECU2.

Symmetrical Key

  • ECU 2 will on the receiver side will receive the encrypted data and the key which is used for the encryption purpose the same is passed to the cryptographic algorithm on the receiver side along with the encrypted data then it will generate a MAC.
  • The generated MAC will be matched with received encrypted data MAC and if the two MAC value is equal then say whatever data was intended for the rceiver side i.e. ECU 2 is same and then we can decrypt the data which is given will be used by the Software Component.
  • If the MAC value is not verified for matched from ECU 1 and ECU 2 and then that particular ECU is not intended for that particular data and there is somebody who is trying to hack the data.

ASYMMETRICAL KEY

  • In Asymmetrical key value which is used for encryption and the key value which is used for decryption is different keys.

Asymmetrical Key

  • The Key 1 which is used for encryption when passed on with the data to Crypto Algorithm it will generate the MAC and the MAC which will be generated is appended with the data which will form the encrypted data.
  • The encrypted data will be sent to the receiver side. The Key 2 which is mathematically linked to Key 1 or we can say Key 2 is derived from Key 1.
  • When passed to the Crypto Algorithm it will generate the MAC, the MAC value again will be compared with the MAC value which is generated to the transmitted side.
  • If the two MAC value matches, then we say data is intended for ECU 2 and this data will be passed to software component for the processing purpose.
  • If the MAC generated from the Crypto Algorithm does not matches with the MAC value which is received from the transmitted side, then we say ECU 2 is not intended for this particular data and data is not utilized to the Software Component or will not be processed.

Key 1: - Public Key

Key 2: - Secret Key

AUTOSAR Crypto Stack

  • Crypto Driver where the main crypto algorithm is present.
  • Crypto Interface which is linked between the Crypto Driver and Crypto Service Manager.
  • Crypto Service Manager (CSM) handles the service layer which interacts with the Software Component through the Runtime Environment (RTE).

Erik Panke

Automotive Cybersecurity and SIL Validation | dSPACE

6 个月

What part of this do you work on Abhishek? And what kind of trends are you seeing in 2025?

回复

要查看或添加评论,请登录

Abhishek .的更多文章

  • AUTOSAR CanIf

    AUTOSAR CanIf

    CAN IF Architecture Location CAN interface introduction ??As shown in the figure above, CAN interface is referred to as…

    1 条评论
  • DOCKER

    DOCKER

    Docker is an open-source software platform that enables developers to create, deploy, and manage applications in a wide…

  • AUTOSAR CRYPTO STACK

    AUTOSAR CRYPTO STACK

    Stack Architecture 1. The Crypto Service Manager (CSM) The CSM controls one or more clients for one or more synchronous…

社区洞察

其他会员也浏览了