Software update over the air (SOTA)
Updating software over the air requires special attention to system security
High expenses at vehicle manufacturers for fixing software issues by costly recalls are driving their desire to use mobile communication to remotely update software over the air (SOTA).
The benefits of this remote update capability are really compelling, but the security aspect and with it the potential consequences on the car’s safety need to be considered.
An insufficiently secured external connection, could open up the door for potential hackers to the complete board net architecture of the car and thus its safety systems. So at the end driver’s life could be dependent on the security protection mechanism of the vehicle.
Infineon’s security controllers are offering protection for an entire SOTA system. The graphic below shows a simplified SOTA system architecture, where dedicated security controllers are used for specific security functions.
SOTA brings many advantages
The telematics control unit connects the car to the outside world and thereby enables numerous new applications and functionalities. Software in different ECUs can be updated remotely, to either add new features or remove any software bugs that might be found during operation. This reduces the number of recalls and related costs and increases customer satisfaction. The possibility of adding new features opens up the door for new business models and revenue streams.
System & application features
- Realizing benefits of SOTA without risking safety of the car through holistic security architecture
- Avoiding reputation damage caused by potential hacks enabled by insufficient security
- Optimized certified security solutions at reasonable costs
- Reliable AEC Q100 qualified security solutions
Infineon’s scalable security solutions (discrete or HSM on microcontroller) offer optimized security for the specific use cases and functions in the different ECUs, which are affected by the software update.
- SLI 76 / SLI 97 families enable as embedded SIM cards the connection of the car to the internet.
- The security certified OPTIGA™ TPM offers besides cryptographic operations a tamper resistant key store for high sensible credentials, and thereby secures not only the sensible external interfaces of the car but also the vehicle supply chain.
- The HSM of the AURIX™ microcontroller family supplies important on-site security measures in each involved ECU (Telematics, Gateway, Target ECU)
- Service authentication
- Verification and central data storage
- Update of target ECU
Infineon’s Trusted Platform Module (OPTIGA™ TPM) protects cars
Infineon has developed the TCG-standard, 2.0-compliant OPTIGA™ TPM (Trusted Platform Module) to secure external communication. It is preferable to integrate the TPM into the Communication Control Unit, which is often connected to the infotainment system, where the TPM takes over important security functions like authentication of incoming signals to avoid unauthorized access from external.
By establishing a secured connection to the manufacturers’ servers and verifying system integrity, the TPM enhances trust between communicating entities and can be used, for example, to secure software updates on the road. Because key secrecy is essential to these operations, the TPM protects these sensible keys and credentials by its tamper proof and security certified key store function. The TPM has the added advantage of being based on security standards, which have been improved over many years to resist most of all known attacks and therefor TPM offers maximum security at optimized costs.
Security also results from security processes throughout the entire value chain
Product security in general also depends on the quality of security processes implemented in the development and manufacturing stages. The Infineon TPM (OPTIGA™ TPM) development process is Common Criteria (ISO 15408) certified. Additionally, Infineon’s TPMs are manufactured and customized using audited and certified secured manufacturing processes. This strict third party control of security processes is essential to Infineon TPM`s excellent security quality.
Personalization means that every TPM contains a certificate and related private secret key. This key can then be used for encrypting sensitive data like keys in automotive vendors’ (OEM) and in tiers’ manufacturing when transferring this data into electronic control units. This relieves these manufacturing steps from security measures to protect key handling in clear text, saving costs and increasing manufacturing security.
To summarize: The OPTIGA™ TPM is not only providing security while the car is on the road, but also improves security and reduces costs in manufacturing at OEMs and tiers.
Power and Sensing Selection Guide 2018
00_00 | Feb 19, 2018 | PDF | 23.91 mb
Automotive Power Selection Guide
01_04 | Oct 12, 2017 | PDF | 12.05 mb
Automotive Application Guide
02_00 | Nov 23, 2016 | PDF | 8.44 mb
Hybrid electric and electric cars
02_00 | May 20, 2014 | PDF | 7.22 mb
Make Your Application Wireless-Sub 1GHz RF Solutions
02_00 | Nov 20, 2014 | PDF | 1.59 mb
Product Brochure New TriCore™ Family
03_00 | Feb 22, 2018 | PDF | 10.61 mb
Sensing the world - Sensor solutions for automotive, industrial and consumer applications
May 29, 2017 | PDF | 10.99 mb
Microcontroller Pocket Guide
01_00 | Feb 22, 2018 | PDF | 2.58 mb
Your path to robust and reliable in-vehicle networking, Infineon's automotive networking solutions
01_00 | Nov 21, 2016 | PDF | 8.27 mb
Join our free webinar "Security solutions for today’s connected car"
Battery Management for Electric Verhicles
Solutions for Small Electric Vehicles
Powertrain System Part 1
Powertrain System Part 2
BLDC Motor Control
Brushed DC Motors
Stepper Motor Control
AC Induction Motors
Find an answer to your question
Technical Assistance Center (TAC)
Infineon welcomes your comments and questions.
If you have any questions concerning our products, please fill out the following form. Your inquiry will be sent to the appropriate specialist who will be in touch with you as soon as possible.
You will receive a confirmation E-mail to validate your address in our system. Any attached file to the reply which will help to support your inquiry is highly appreciated.