CYBERSECURITY IN AUTOMOTIVE

Authors

  • Zoran Vujić Autor
  • Vladimir Rajs Supervisor

DOI:

https://doi.org/10.24867/29IH02Vujic

Keywords:

Architecture, HSM, SHE, key, encryption, decryption, signing, hash, Autosar, secure boot, secure diagnostics

Abstract

This paper presents a description of algorithms used in cybersecurity. The functionalities and characteristics that a product developed for the automotive industry should have, as well as the reasons for their implementation are described.

References

[1] https://en.wikipedia.org/wiki/Message_authentication_code
[2] https://learn.microsoft.com/en-us/windows/win32/seccertenroll/about-x-509-public-key-certificates
[3] https://www.autosar.org/fileadmin/standards/R22-11/FO/AUTOSAR_TR_SecureHardwareExtensions.pdf
[4] https://www.autosar.org/fileadmin/standards/R19-11/CP/AUTOSAR_SWS_SecureOnboardCommunication.pdf
[5] https://www.autosar.org/fileadmin/standards/R22- 11/CP/AUTOSAR_EXP_UtilizationOfCryptoServices.pdf
[6] https://www.vector.com/int/en/products/solutions/safety-security/automotive-cybersecurity/security-manager/#c233594
[7] Road vehicles – Unified diagnostic Services (UDS), UDS_ISO_14229-1-01_02_2020

Published

2024-12-04