Assuring Trustworthiness via Structured Assurance Cases
(LIN) are examples. 7
With the controls now being software
enabled with network connectivity as shown
in Figure 5, there are several external attack
surfaces where the car’s systems are now
accessible from outside the vehicle. If we
look to the future, where vehicle to vehicle
communications telematics and other
enhanced capabilities are coming 8 , that
attack surface will grow even further.
Figure 3: Connected Software and HW (microelectronics)
The same migration of physical connection
and control to a bus structure has taken
place for all of the critical functions in
vehicles. As shown in Figure 4, most of an
automobile controlling functions are all now
enabled
through
software, over buses.
Additionally, there are
many software-driven
networks, both for high
speed, low latency type
of activities, and for
more relaxed timing
requirements
and
things that are focused
on the occupants of the
car. The Controller
Area Network (CAN),
the Media Oriented
Systems
Transport
(MOST), Ethernet, the
FlexRay Consortium’s
FlexRay, and Local
Interconnect Network
Figure 4: Critical Functions Have Migrated into Connected SW/HW
7
Renesas In-Vehicle Networking Solutions https://www.renesas.com/us/en/solutions/ automotive/technology/networking-
solutions.html
8
Siam Ahmed, Geotab Inc., “Get to Know Connected Vehicle Technology: V2V, V2X, V2I,” February 9, 2018,
https://www.geotab.com/blog/connected-vehicle-technology/
- 47 -
IIC Journal of Innovation