Browse Publications Technical Papers 2018-01-0012

Leveraging Hardware Security to Secure Connected Vehicles 2018-01-0012

Advanced safety features and new services in connected cars depend on the security of the underlying vehicle functions. Due to the interconnection with the outside world and as a result of being an embedded system a modern vehicle is exposed to both, malicious activities as faced by traditional IT world systems as well as physical attacks. This introduces the need for utilizing hardware-assisted security measures to prevent both kinds of attacks.
In this paper we present a survey of the different classes of hardware security devices and depict their different functional range and application. We demonstrate the feasibility of our approach by conducting a case study on an exemplary implementation of a function-on-demand use case. In particular, our example outlines how to apply the different hardware security approaches in practice to address real-world security topics.
We conclude with an assessment of today’s hardware security devices. Based on our presented case study we outline the identified gaps and derive the necessary future developments for next-generation hardware security devices to meet the requirements for automotive applications.


Subscribers can view annotate, and download all of SAE's content. Learn More »


Members save up to 18% off list price.
Login to see discount.
Special Offer: Download multiple Technical Papers each year? TechSelect is a cost-effective subscription option to select and download 12-100 full-text Technical Papers per year. Find more information here.

Due to current capacity constraints, printed versions of our publications - including standards, technical papers, EDGE Reports, scholarly journal articles, books, and paint chips - may experience shipping delays of up to four to six weeks. We apologize for any inconvenience.
We also recommend:

Security Mechanisms Design for In-Vehicle Network Gateway


View Details


Mitigating Unknown Cybersecurity Threats in Performance Constrained Electronic Control Units


View Details


Proposal of HILS-Based In-Vehicle Network Security Verification Environment


View Details