Remote updating- upgrading of vehicle firmware
Coordinated by
I-FEVS
Securing remote and in-vehicle communications against cyber-attacks, possibly performed with quantum computers in the near future, is a major goal in the automotive sector. For such a purpose I-FEV focused on a thorough study and an architecture and protocol design to develop and implement a Service Over the Air (SOtA )system, starting from Electronic Control Unit (ECU) firmware update on its electric vehicles from remote.
UPTANE (a de-facto standard in the automotive sector) guidelines have been successfully taken as a reference for the implementation of the system. The achievements have been integrated in the first prototypes.
Description
February 2023Describe the innovation content of the result:
The UPTANE based implementation of SOtA brings security feature to an otherwise vulnerable communication system on-board electric vehicles.
Who will be the customer?
Users of transportation means in a urban mobility framework (e.g. commuters)
What benefit will it bring to the customers?
Secure communications brings not only privacy but safety as well when it comes to vehicle operations, especially for electric ones, which are equipped with high energy density battery packs and autonomous drive.
When is the expected date of achievement in the project (Mth/yr)?
Within the time span of the project.
When is the time to market (Mth/yr)?
3 yr.
What are the costs to be incurred after the project and before exploitation?
500 k€.
What is the approximate price range of this result/price of licences?
N/A.
What are the market size in Millions € for this result and relevant trend?
N/A.
How will this result rank against competing products in terms of price/performance?
N/A.
Who are the competitors for this result?
Proprietary architecture and protocols developed by large Automotive OEMs.
How fast and in what ways will the competition respond to this result?
It will take about 3 years for other implementations of similar solutions.
Who are the partners involved in the result?
Not defined yet.
Who are the industrial partners interested in the result (partners, sponsors, etc.)?
Not defined yet.
Have you protected or will you protect this result? How? When?
Patents will be filed for those aspects of the design not covered yet and for the specific solutions adopted in the implementation.
Other results
ResilBlockly
This exploitation result consists in cybersecurity consultancy services supported by ResilBlockly (former Blockly4SoS), a Model-Driven Engineering tool that has been developed in the context of BIECO.
Security tools for AI Investments platform
Secured AI Investments platform using the outcome of the BIECO project.
Log Forgery Blocker
Log Forgery Blocker – a brand new product on the market.
Security evaluation methodology
Security evaluation methodology to evaluate the security of an ICT system. The methodology is based on standards such as ISO 31000 standard for Risk Management, the ISO 29119 standard for Security Testing or the MUD standard…
Monitoring Tool
The monitoring tool is an infrastructure in charge of setting up and managing a monitoring component. It is based on event messages and enables the collection of complex events.
Extended MUD file
The extended Manufacturer Usage Description (MUD) file is an extension of the MUD Internet Engineering Task Force (IETF) standard…