IIC Journal of Innovation 9th Edition | Page 51

Assuring Trustworthiness via Structured Assurance Cases (LIN) are examples. 7 With the controls now being software enabled with network connectivity as shown in Figure 5, there are several external attack surfaces where the car’s systems are now accessible from outside the vehicle. If we look to the future, where vehicle to vehicle communications telematics and other enhanced capabilities are coming 8 , that attack surface will grow even further. Figure 3: Connected Software and HW (microelectronics) The same migration of physical connection and control to a bus structure has taken place for all of the critical functions in vehicles. As shown in Figure 4, most of an automobile controlling functions are all now enabled through software, over buses. Additionally, there are many software-driven networks, both for high speed, low latency type of activities, and for more relaxed timing requirements and things that are focused on the occupants of the car. The Controller Area Network (CAN), the Media Oriented Systems Transport (MOST), Ethernet, the FlexRay Consortium’s FlexRay, and Local Interconnect Network Figure 4: Critical Functions Have Migrated into Connected SW/HW 7 Renesas In-Vehicle Networking Solutions https://www.renesas.com/us/en/solutions/ automotive/technology/networking- solutions.html 8 Siam Ahmed, Geotab Inc., “Get to Know Connected Vehicle Technology: V2V, V2X, V2I,” February 9, 2018, https://www.geotab.com/blog/connected-vehicle-technology/ - 47 - IIC Journal of Innovation