Automated driving safety demand increases vehicle processor threshold

Safety is the primary foundation for autonomous driving design. In response to this trend, semiconductor manufacturers have introduced various sensing components to ensure driving safety. At the same time, semiconductor manufacturers and automakers continue to enhance the security protection of processors and networking systems in order to create safe and reliable self-driving vehicles both inside and outside.

Automated driving safety is gaining more and more attention. In order to improve the overall safety of self-driving vehicles, semiconductor manufacturers are committed to developing various sensing components. The depot and system factory are committed to the development of sensor integration technology to ensure driving safety. On the other hand, strengthening the performance of self-driving components to create a safer self-driving car is also one of the most vigorous development directions. With more and more sensor components on the car, how to make the car processor respond to the information sent by the car sensor, make the right analysis in real time, and prevent hackers from invading and stealing data will be automatic in the future. Driving development focus.

In the era of the Internet of Vehicles, confidentiality and security can not be avoided.

Ye Zhiping, Senior Director of Qualcomm Product Market

Figure 1 Ye Zhiping, senior director of Qualcomm product market, said that Qualcomm launched the Snapdragon 820A car networking reference platform in response to the demand for Internet of Vehicles, which is highly scalable.

In response to the era of Internet of Vehicles, many semiconductor companies have launched related networking solutions to attack market opportunities. For example, Qualcomm has designed a car networking reference platform using its Snapdragon 820A.

Ye Zhiping, senior director of Qualcomm's product market (Figure 1), said that the design concept of this platform includes the following points: First, the company wants to use a scalable way to allow different features to be applied to the same platform. On top, let it extend, if you need to change RF, Bluetooth, Wi-Fi, GPS or 4G to 5G, it becomes very simple.

Second, in the case of multiple wireless technologies coexisting, the most difficult part of OEM (original equipment manufacturer) design is to solve very complex mutual interference. The company's reference design solves the problem of interference, allowing multiple wireless technologies to exist simultaneously. Basically some traditional connectivity features may be placed on an electronic control unit (ECU), or infotainment. Qualcomm's current car networking reference platform can concentrate all antennas, Wi-Fi and RF in the car to place the antenna, so that these car OEMs can put all the RF radios together when designing the control. If you need to update these connection technologies, you only need to replace this IoT reference platform, and the central control system, the screen and other things in the car need not be updated.

However, the Internet of Vehicles, like the smartphone or the IoT market, needs to ensure that data transmission is not affected by hacking. In response to this demand, Qualcomm also has related technologies, such as SmartProtect technology, to provide real-time malware detection, classification and source analysis on the device to make up for the shortcomings of traditional malware solutions, and to analyze and identify updated features. New threat. The rest are Sense ID fingerprinting technology, SafeSwitch anti-theft technology, and StudioAccess content protection technology.

Infineon Automotive Safety Marketing Manager Wang Longfei

Figure 2 Infineon Automotive Safety Marketing Manager Wang Longfei pointed out that in order to prevent hacker attacks, MCUs with hardware security modules (HSM) can enhance information protection effectiveness.

In addition to Qualcomm, Infineon also has relevant security measures for car network protection. Infineon Automotive Safety Marketing Manager Wang Longfei (Figure 2) pointed out that in order to prevent hacking attacks, the current microcontroller (MCU) in the car must have security performance.

For example, Infineon's AURIX family of microcontrollers incorporates a hardware security module (HSM) to meet the various security and protection needs of the future car networking. This HSM uses Infineon's own encryption technology to prevent hacking and prevent data theft.

At the same time, with the rise of the Internet of Vehicles, and the fact that many cars have been hacked in the past few years, the EVITA Alliance, which is composed of major European car manufacturers, has also accelerated the security hardware expansion due to the hacking incident. Extension, SHE) and the hardware security module (HSM) and other related regulations. At present, many car manufacturers have invested in the safety mechanism design of the body network, and SHE will take the lead in popularizing the models after 2018-2019.

Huang Yuan, Director of Automotive Application Marketing Department, Renesas Marketing Department

Figure 3 Huang Yuanqi, director of the automotive application marketing department of Renesas Marketing Division, revealed that the company has introduced ICUS hardware to meet the requirements of HSM in response to the regulations of the EVITA alliance.

Huang Yuanqi (Fig. 3), director of the automotive application marketing department of Renesas Electronics' marketing department in Taiwan, analyzed that the car designed by the car manufacturer could easily be invaded by hackers if the layer protection was not done well. In theory, the body network will have a physical system architecture, from the SoC to the MCU, and then to the body network.

Because the SoC requires a lower level of security, it uses a simple mechanism to communicate with the MCU, such as transferring images and data. However, if the system is designed too simple, the hacker can update the firmware and update it. After that, you will be able to go straight to the body network, and if the body network is not encrypted, you can send a fake command to control the car.

So hackers cracked three places, the first one is SoC security, the second is that the system architecture is not designed, and the third is the unencrypted body network. The MCU is like a firewall, and if it is well designed, it will be able to keep many malicious attacks out.

Therefore, Huang Yuanqi said that the car factory has begun to ask the chip factory to add such encryption mechanism to the chip. In response to the regulations of the EVITA alliance, Renesas has introduced the ICUS hardware to meet the needs of SHE, after 2018∼2019. This type of safety mechanism will be fully adopted in the vehicle type, and the ICUM hardware under development will respond to the needs of HSM.

ICUS is a relatively simple mechanism, there will be a key placed by the car manufacturer, using symmetric encryption. When the packet is received, it will be thrown into it first, and the encryption/decryption unit will inform which key to use for decryption; after the solution, the MCU will process it again; after processing, put it in again, after encrypting Throw it out to ensure the safety of the body safety communication. Because the body communication is now transmitted through the clear code, as long as the measurement, you can know what each bit represents.

In the case of a car, it is generally sufficient to use ICUS, such as gear signals, speed signals, and use this set of lower security passwords to achieve security protection. ICUM is used for components such as car body gateways, body controllers, engine controllers, and EPS, which further link the data between the MCU and the body network.

There is a separate chip in ICUM. When the power is turned on, it will first confirm whether the firmware and data in the MCU are correct, and there will be a signature action to check whether the program has been tampered with. Will go to execute the program, the security level will be higher. In addition, because it is another MCU, it can also do other more complicated operations, such as if the passwords are always in the same group, and if they are used all the time, they may be reverse engineered, which can generate different keys in the middle. , like a one-time password, to effectively prevent this from happening.

Four Burner with Built in Hob

Kitchen Exhaust Hood,Gas Hob 4 Burner,Stainless Steel Gas Hob,4 Burner Gas Cooker Hob

xunda science&technology group co.ltd , https://www.gasstove.be

This entry was posted in on