Autonomous Vehicle Engineering - July 2022 - 14

Cybersecurity
An Holistic Approach to
Verifying Cybersecurity
in Design
by Craig Hendricks
A powerful new generation of test and sim solutions aims to address
specific security concerns associated with automotive designs.
Today's vehicle is a mobile computer growing in
complexity. From infotainment systems to propulsion,
to advanced driver assistance systems (ADAS)
and autonomous vehicles (AV), computers now drive
how automobiles and trucks are designed, how they
operate and how they're increasingly connected. For
that reason, the transformation of vehicles, roadways
and cities has created new design considerations for
engineers. One aspect that can't be overlooked is
cybersecurity and the need for an all-encompassing
approach to ensure vehicle safety.
A 2019 study conducted by SAE International (in
conjunction with Synopsis) highlights the level of angst
around securing the advanced technologies designed
into automobiles. Eighty-four percent (84%) of survey
respondents are concerned that cybersecurity practices
are not keeping up with the security landscape.
As worrisome, 63% of survey respondents admitted
they test less than half of hardware, software and other
technologies for security vulnerabilities.
The National Highway Traffic Safety
Administration (NHTSA), recognizing the growing
trepidation, has suggested a multi-layered approach
to cybersecurity. The focus is on a vehicle's entry
points, both wireless and wired, that can be potentially
vulnerable to a cyberattack. Among the recommendations
suggested by the agency are:
* establishing a risk-based prioritized identification
and protection process for safety-critical
vehicle control systems
* architectures, methods and measures that
design-in cyber resiliency and facilitate rapid
recovery from incidents when they occur
Implementing the proper verification processes can
ensure products and systems meet the NHTSA recommendations.
Part of those processes - for both OEMs
and suppliers - is to create test environments that can
perform all the necessary tests accurately and efficiently.
Network-wide issue
The rollout of 5G and Internet of Things (IoT)
advances have received much attention. Other technologies
are also impacting designs, particularly from
a security perspective. One example is Open Radio
Access Network (O-RAN). Traditionally, the focus to
prevent nefarious cyberattacks has been solely on the
user equipment (UE). While that remains important,
the integration of O-RAN technologies results in the
need to take a more holistic approach.
O-RAN architecture (Fig. 1) comes with many
14 July 2022
AUTONOMOUS VEHICLE ENGINEERING

Autonomous Vehicle Engineering - July 2022

Table of Contents for the Digital Edition of Autonomous Vehicle Engineering - July 2022

Autonomous Vehicle Engineering - July 2022 - Cov4
Autonomous Vehicle Engineering - July 2022 - Cov1
Autonomous Vehicle Engineering - July 2022 - Cov2
Autonomous Vehicle Engineering - July 2022 - 1
Autonomous Vehicle Engineering - July 2022 - 2
Autonomous Vehicle Engineering - July 2022 - 3
Autonomous Vehicle Engineering - July 2022 - 4
Autonomous Vehicle Engineering - July 2022 - 5
Autonomous Vehicle Engineering - July 2022 - 6
Autonomous Vehicle Engineering - July 2022 - 7
Autonomous Vehicle Engineering - July 2022 - 8
Autonomous Vehicle Engineering - July 2022 - 9
Autonomous Vehicle Engineering - July 2022 - 10
Autonomous Vehicle Engineering - July 2022 - 11
Autonomous Vehicle Engineering - July 2022 - 12
Autonomous Vehicle Engineering - July 2022 - 13
Autonomous Vehicle Engineering - July 2022 - 14
Autonomous Vehicle Engineering - July 2022 - 15
Autonomous Vehicle Engineering - July 2022 - 16
Autonomous Vehicle Engineering - July 2022 - 17
Autonomous Vehicle Engineering - July 2022 - 18
Autonomous Vehicle Engineering - July 2022 - 19
Autonomous Vehicle Engineering - July 2022 - 20
Autonomous Vehicle Engineering - July 2022 - 21
Autonomous Vehicle Engineering - July 2022 - 22
Autonomous Vehicle Engineering - July 2022 - 23
Autonomous Vehicle Engineering - July 2022 - 24
Autonomous Vehicle Engineering - July 2022 - 25
Autonomous Vehicle Engineering - July 2022 - 26
Autonomous Vehicle Engineering - July 2022 - 27
Autonomous Vehicle Engineering - July 2022 - 28
Autonomous Vehicle Engineering - July 2022 - Cov3
Autonomous Vehicle Engineering - July 2022 - Cov4
https://www.nxtbook.com/smg/sae/24AE04
https://www.nxtbook.com/smg/sae/24AE03
https://www.nxtbook.com/smg/sae/24AE02
https://www.nxtbook.com/smg/sae/23AE12
https://www.nxtbook.com/smg/sae/23AAVE11
https://www.nxtbook.com/smg/sae/23AE10
https://www.nxtbook.com/smg/sae/23AE09
https://www.nxtbook.com/smg/sae/23AE08
https://www.nxtbook.com/smg/sae/23AAVE07
https://www.nxtbook.com/smg/sae/23AE06
https://www.nxtbook.com/smg/sae/23AE05
https://www.nxtbook.com/smg/sae/23AAVE04
https://www.nxtbook.com/smg/sae/23AE04
https://www.nxtbook.com/smg/sae/23AE03
https://www.nxtbook.com/smg/sae/23AE02
https://www.nxtbook.com/smg/sae/23AAVE01
https://www.nxtbook.com/smg/sae/22AE12
https://www.nxtbook.com/smg/sae/22AVE11
https://www.nxtbook.com/smg/sae/22AE10
https://www.nxtbook.com/smg/sae/22AE09
https://www.nxtbook.com/smg/sae/22AE08
https://www.nxtbook.com/smg/sae/22AVE07
https://www.nxtbook.com/smg/sae/22AE06
https://www.nxtbook.com/smg/sae/22AE05
https://www.nxtbook.com/smg/sae/22AVE04
https://www.nxtbook.com/smg/sae/22AE04
https://www.nxtbook.com/smg/sae/22AE03
https://www.nxtbook.com/smg/sae/22AE02
https://www.nxtbook.com/smg/sae/22AVE01
https://www.nxtbook.com/smg/sae/21AE12
https://www.nxtbook.com/smg/sae/21AVE11
https://www.nxtbook.com/smg/sae/21AE10
https://www.nxtbook.com/smg/sae/21AVE09
https://www.nxtbook.com/smg/sae/21AE09
https://www.nxtbook.com/smg/sae/21AE08
https://www.nxtbook.com/smg/sae/21AVE07
https://www.nxtbook.com/smg/sae/21AE06
https://www.nxtbook.com/smg/sae/21AE05
https://www.nxtbook.com/smg/sae/21AVE05
https://www.nxtbook.com/smg/sae/21AE04
https://www.nxtbook.com/smg/sae/21AE03
https://www.nxtbook.com/smg/sae/21AVE03
https://www.nxtbook.com/smg/sae/21AE02
https://www.nxtbookmedia.com