The annual Consumer Electronics (CES) conference has become a major show for automakers and suppliers to highlight the latest and greatest technological advances in cars. The past few years, there have been many announcements and demonstrations of Vehicle-to-Everything (V2X) communications, primarily using a Wi-Fi-based technology called Dedicated Short Range Communications (DSRC). The year marked a turning point, as a majority of the V2X announcements were based on Cellular V2X (C-V2X).
2018 has been an eventful year for OnBoard Security® and the markets we serve. The year started with a bang when OnBoard Security was spun off from Security Innovation®, becoming an independent company with the mission to help Automotive and IoT manufacturers stay ahead of the curve in cyber security. As an independent company, we are better positioned to focus on filling critical cyber security gaps in our target markets.
Topics: V2I, Blockchain, DSRC, Connected Vehicles, Research, SCMS, V2V, TPM, Trusted Computing, TSS, Cyber Security, Autonomous Vehicles, Embedded Security, Automotive, V2X, Internet of Things, Privacy, Cryptography
The Onboard Diagnostics Port (OBD) has been required for all cars sold in the US since 1996 and in Europe since 2001. Prompted by the need to simplify the diagnosis of increasingly complex emission control systems, the OBD-II improved on previous implementations by providing standardized condition codes for the auto repair and tuning markets. Standardized access to this data has helped spawn a robust aftermarket of plug-in devices to allow consumers to monitor their teen drivers, earn discounts from insurers, or gain insights into the performance and health of their vehicles. Similar devices allow fleet managers to monitor the condition, performance and behavior of their vehicles. Nearly all of these dongles offer a wireless connection for the convenience of their customers. Unfortunately, a wireless connection also provides a potential path for hackers to gain entry to the car’s internal networks.
Recently, our customer, Rivetz, announced their Dual Roots of Trust solution to protect private keys in a mobile phone, even if one of the systems is compromised. The Rivetz software generates and distributes the private key between the two roots – the Trusted Execution Environment (TEE) running in ARM TrustZone and the SIM card. This means that both roots would have to be compromised in order to get the user’s private key. Since the TEE is controlled by the phone manufacturer and the SIM is controlled by the mobile carrier, the user’s data is also protected from insider attacks or a vendor security breach.
Last year Americans purchased slightly less than 200,000 electric vehicles which are supported by approximately 47,000 US charging stations, according to Statista. The growth rate of electric vehicles is high and shows no signs of slowing down.
The world is facing an increasing threat from quantum computers. All widely deployed public key cryptosystems, namely, RSA, ECC and (EC)DH, will be broken due to Shor’s algorithm running on a quantum computer. To mitigate this threat, NIST started a call for proposal to identify cryptographic algorithms that are secure against quantum computers (a.k.a, post-quantum cryptosystems or PQC).
Most drivers place full trust in their GPS navigation systems to guide them to their destination. But what if those navigation systems can’t be trusted.