Connecting without concern

Today’s connected cars have a highly sensitive electronic environment, containing both critical systems and confidential information. Until recently security measures to safeguard this environment have been limited, partly because the systems were relatively isolated from the rest of the world. With increasing connectivity in the car, the potential for system interference or data misuse by unauthorised sources is also increasing. By using a Secure Network Platform connected vehicles can have the security protection they need, giving manufacturers and drivers complete peace of mind.

That insecure feeling

To prevent hackers from accessing the car’s internal network, access needs to be restricted. Only known entities are allowed access to limited parts of the network and to limited data subsets. Our proven technologies bring powerful and cost-effective authentication capabilities, based on strong device identity and service profiling, to the automotive environment.

For trusted authentication, our tamper resistant and secure microcontrollers feature hardware cryptographic accelerators (ECC, RSA, AES, 3DES, SHA, TRNG), and support a broad range of symmetric and asymmetric (public key) algorithms and protocols. With over 15 years experience in the smartcard market, NXP® has evolved its solutions to feature the latest security technologies. Already proven in NXP certified products, they deliver very high reliability and tamper proof operations with support for multi-application environments.

Why is the security risk so significant?

Increasing electronic functionality, such as ADAS, in vehicles means there are ever more networks of ECUs in the car. As well as interacting within the car, these modules may also interact with the internet, either by antenna or indirectly through mobile device links. While all this is to good purpose – hugely improving safety, performance, convenience and more – it unfortunately makes in-vehicle systems, relying on traditional network security, potentially vulnerable to software attacks.

Related Products