M2MD Communications Gateway: fast, secure and efficient

Similar documents
M2MD Communications Gateway: fast, secure, efficient

The Open Application Platform for Secure Elements.

SW-Update. Thomas Fleischmann June 5 th 2015

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017

Scalable Security solutions to enable Cyber Security and to manage Digital Identities

Mobile IoT: The Ideal Fit for Smart Cities

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications

Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust

Security Strategy for Mobile ID GSMA Mobile Connect Summit

New Business. Opportunities for Cellular IoT. Loic Bonvarlet Director of Marketing Secure Identity Arm. Copyright 2018 Arm, All rights reserved.

Simple and Secure Micro-Segmentation for Internet of Things (IoT)

Achieving End-to-End Security in the Internet of Things (IoT)

Securing V2X communications with Infineon HSM

Connected Car Solutions Based on IoT

Connecting Securely to the Cloud

Case Study. gsma.com/iotsecurity

Key Protection for Endpoint, Cloud and Data Center

LTE-M vs NB-IoT. Comparing New Cellular Connectivity Options

Powering the Internet of Things with MQTT

Aerohive and IntelliGO End-to-End Security for devices on your network

Connected vehicle cloud Commercial presentation

IOT IN THE AUTOMOTIVE INDUSTRY

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

Diagnostic Trends 2017 An Overview

Automotive Security An Overview of Standardization in AUTOSAR

Solutions to Enhance IoT Authentication Using SIM Cards (UICC)

IoT security based on the DPK platform

Connected vehicle cloud

Turbocharging Connectivity Beyond Cellular

Strong Security Elements for IoT Manufacturing

WIND RIVER NETWORKING SOLUTIONS

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

Secure Application Trend in Smartphones. STMicroelectronics November 2017

Sierra Wireless. Corporate Overview. May 2017

EBV Personalization Services for Security Devices

NC1701 ENHANCED VEHICLE COMMUNICATIONS CONTROLLER

Introduction to Device Trust Architecture

Securing the future of mobility

Connected Living. SIMs & M2M the Central and Developing Role of SIMs

IoT Edge within the IoT Framework

SHARE THIS WHITEPAPER. Fastest Website Acceleration for New HTTP Protocol with Alteon NG and Advanced HTTP/2 Gateway Whitepaper

Autorama, Connecting Your Car to

BUILDING AUTOMATION OF THE FUTURE

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

GSMA Embedded SIM Specification Remote SIM Provisioning for M2M. A single, common and global specification to accelerate growth in M2M

Securing Vehicle ECUs Update Over the Air

ARM Security Solutions and Numonyx Authenticated Flash

Security Solutions. End-to-end security. Protecting your physical access control system.

INTERNET OF THINGS (IoT) DESIGN CONSIDERATIONS FOR EMBEDDED CONNECTED DEVICES ANDREW CAPLES SENIOR PRODUCT MARKETING MANAGER, NUCLEUS

PKI Credentialing Handbook

$263 WHITE PAPER. Flexible Key Provisioning with SRAM PUF. Securing Billions of IoT Devices Requires a New Key Provisioning Method that Scales

Make security part of your client systems refresh

EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC

Automotive Gateway: A Key Component to Securing the Connected Car

Spotlight on IoT Security. Choose the right security for the Internet of Things.

MASP Chapter on Safety and Security

NEXT GENERATION INFOTAINMENT CONNECTIVITY AND TELEMATICS SOFTWARE FROM PROOF-OF-CONCEPT TO START-OF-PRODUCTION

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle

A Robust, Flexible Platform for Expanding Your Storage without Limits

Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans

THE THALES SECURITY WORLD ARCHITECTURE

GSMA Embedded SIM 9 th December Accelerating growth and operational efficiency in the M2M world

The case for a Vehicle Gateway.

Implementing security has never been easier. Infineon Security Partner Network.

Transaction Security Challenges & Solutions

Securing Network Communications

Verizon Software Defined Perimeter (SDP).

SD Express Cards with PCIe and NVMeTM Interfaces

ebook - TRUSTED esim TESTING FRAMEWORK - June 2016 BUILDING A TRUSTED EMBEDDED SIM TESTING FRAMEWORK IN THE AGE OF IOT

5G SIM: Maximising MNO Investment in 5G Networks

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region

Kigen SIM Solutions. Unlock the full potential of IoT

Windows 10 IoT Core Azure Connectivity and Security

white paper SMS Authentication: 10 Things to Know Before You Buy


Identity & security CLOUDCARD+ When security meets convenience

Unbound and Oasis KMIP Interoperability

High-performance. Enterprise Scale. Global Mobility.

World s Most Secure Government IT Solution

5G Network Architecture

JUST WHAT THE DOCTOR ORDERED: A SOLUTION FOR SMARTER THERAPEUTIC DEVICES PLACEHOLDER IMAGE INNOVATORS START HERE.

LTE and the path to LTE MTC

The Medeco Solution for Controlled Access and Accountability

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

Clouds and Things. Implications of the Cloud and Internet-of-Things for SCADA/ICS. April 25, 2018

Utimaco IS GmBH. Teo Poh Soon Director. CryptoServer Products Aachen, Germany June 2014 Page 1


Introduction to VANET

Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity

Automotive Anomaly Monitors and Threat Analysis in the Cloud

The secure remote support, remote access and online meeting software that the world relies on.

Securing Smart Meters with MULTOS Technical Overview

Presentation's title

Automotive Cyber Security

Five Key Considerations When Implementing Secure Remote Access to Your IIoT Machines. Blanch Huang Product Manager

DesignWare IP for IoT SoC Designs

Wi-Fi Security for Next Generation Connectivity. Perry Correll Aerohive, Wi-Fi Alliance member October 2018

Instant evolution in the age of digitization. Turn technology into your competitive advantage

Getting Started with AWS Security

Transcription:

Solution Brief M2MD Communications Gateway: fast, secure and efficient Key Benefits G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular automotive connectivity. Technology has transformed almost every aspect of modern life, but the car has seen changes that significantly affect our day-to-day lives. Computerization has changed the way cars work, how they are produced, and how we view and interact with them. Getting from point A to point B is no longer enough. Today s cars have smart features and are connected transitioning to tomorrow s cars, which will be fully autonomous and require always-on connectivity. With an increasing number of connected vehicles on the road, the need for strong security and efficient communication has become paramount. However, the increasing computerization of the car brings with it the threat of digital security breaches. Now that our cars are connected and use our personal information, car makers must protect our data while still providing convenient and flexible access. The M2MD Communications Gateway transforms vehicle connectivity Instant connection Keys stored in hardware for optimal security Manages power consumption and costs effectively

fast, secure, efficient 2 Security challenges for the connected car Certificate-based security is the authentication process used on the public internet between two devices that are unknown to each other (e.g. a personal computer and a bank s server). This authentication process typically requires a computationally intensive handshake that takes time and requires the devices to pass data back and forth to establish a secure session. When using a computer on a home or office network, this transaction happens quickly over a data circuit with nearly unlimited data budgets and sufficient bandwidth to make certificate-based security efficient. To minimize cost and battery consumption, car telematics control units (TCUs) typically have far less powerful processors than a normal personal computer, which increases the time needed to complete a certificate-based handshake. In addition, wireless operators charge automakers according to the amount of data transmitted over the network, which makes the data consumed in the handshake process a relatively expensive overhead cost. provides end-to-end security and efficient connectivity for mobile applications. With the ability to instantly connect to a vehicle, it delivers a better user experience whilst securing the connection. No additional hardware is required the solution works with most of the currently installed vehicle hardware. Certificate operations in connected cars In automotive telematics, cellular They have expiration dates and communications happen on a require regular updates. private network and between two If a certificate is compromised in a known devices that have been vehicle, the vehicle may have to be preconfigured to work together. recalled, and a trip to the dealer Certificate-based handshakes may be the only solution. require time and power to compute On average, top-of-the-line, on embedded devices, using server-supporting, certificate-based significant overhead data and security can support only 15,000 increasing costs with each cellular devices, driving higher hardware session established. costs and impacting scalability. Certificate operations were designed for human intervention. Automakers require a proven, tested security solution but need it to be fast, cost effective, and designed for the unique automotive environment. Improved Experience for drivers and automakers Designed for interactive use cases, the gateway provides a whole new user experience in terms of responsiveness without sacrificing security. The secure gateway provides the ability to instantly connect to a vehicle. Today s connected cars typically require up to 30 seconds to receive a mobile command. The M2MD Communications Gateway has reduced this communication time to just a few seconds. For improved connectivity, the M2MD Communications Gateway instantly triggers a network initiated data session to the vehicle, resulting in an immediate response to complete requests for remote control functions (e.g. remote vehicle battery charging status check). The automakers also benefit from improved connectivity with the vehicle using the M2MD Communications Gateway. This results in an immediate response regarding diagnostic trouble codes. The automaker can analyse the data and make adjustments immediately.

fast, fast, secure secure, and efficient 3 Improved Security merges M2MD s proprietary security solutions with G+D s expertise in encryption, key management and highly secure hosting capabilities. The gateway provides a secure communications channel between the TCU in the vehicle and a backend platform. The essential cryptographic key material is stored on hardware, utilizing the certified security of the SIM. strengthens data transmission security and the speed of initiating communications between the vehicle and the automaker s preferred telematics platform. The solution leverages well-tested and standardized security technologies like TLS and 3GPP methods. By using symmetric cryptography only, it avoids the challenges associated with certificates. 1 Remote start request initiated Typical Remote Start Solution Average execution time > 30 seconds 1 SMS message per request Consumes > 6500 bytes of data OEM Cloud or IoT Platform M2MD Communications Gateway M2MD QuickConnect technology Average execution time < 3 seconds No SMS message Consumes 304 bytes of data Very secure Leveraging the hardware security of the SIM 2 Gateway initiates data session via QuickConnect 3 Vehicle receives start request

fast, secure, efficient 4 Reduced costs through QuickConnect technology is optimized for embedded devices with low power budgets. The gateway has built-in QuickConnect wake-up technology, which requires negligible power consumption by both the vehicle and the device. The car is in an always ready state of connection as opposed to being always on, which taxes the battery. The gateway s unique QuickConnect feature establishes a secure connection within seconds about 10x faster than today s methods. QuickConnect uses minimal mobile data to establish the connection as symmetric cryptography does not require data-heavy keys and certificates. While a single vehicle manages only a single connection, the automotive manufacturers handle thousands of connections through their backend systems. Symmetric encryption requires far less computing time, which greatly reduces the load on the backend platform and thus reduces the cost of managing the connectivity services. Why the SIM is the best security anchor for automotive connectivity The SIM has a long history as the trusted element for securing subscriber identity and connectivity credentials for mobile networks. The highly secure, multifunctional SIM or UICC (Universal Integrated Circuit Card) can also act as a security anchor for the horizontal security required for IoT and, in this case, car connectivity. The UICC is a compact computational device with data storage capability, it is tamper-resistant, and provides a secure repository for critical information. As an independent computing entity inside the connected car, the UICC can store the factory reset configuration in its secure storage and perform supervisory tasks, thus ensuring that cars can be remotely managed as needed. G+D Mobile Security manages 3+ billion cards across 80 countries. Furthermore, G+D Mobile Security leads the industry in esim management, which directly enables secure, over-the-air credential management using remote devices. Globally, G+D has deployed and supports more than 200 over-the-air platforms. Nine of the top ten automotive manufacturers trust G+D Mobile Security to provide UICC hardware, esim management software, and secure communications for current and next generation connected cars. M2MD Communications Gateway Key Features allows drivers to quickly connect to the vehicle over mobile networks, execute remote commands more rapidly, and enjoy extended battery life. In addition to a more satisfied customer, the automaker benefits from reduced vehicle data costs on the back end. Fast < 3 second reaction time, 10 times faster than current solutions on the market Secure Proven and well-known security mechanisms are used (e.g. TLS 1.2) Static cryptographic elements are protected by esim hardware security Only session keys are used for operations outside of SIM hardware Regular key rollovers reduce the impact of potential attacks by providing forward secrecy Efficient Cost savings: No SMS required, only 304 bytes for connection establishment, 6,000 bytes less than certificate-based methods Power savings: Highly optimized embedded solution allows the TCU to be always ready, whereas current solutions have to go offline for periods of time to stay within the vehicle s power budget Run-time savings: Fewer CPU operations needed Client side: Faster execution, lower CPU requirements Server side: Up to 350,000 vehicles per server vs.15,000 clients per server for current solutions on the market No additional hardware required, works with all TCUs/modems Dual/multi-source SIM strategy possible for automotive manufacturers

Managing identities in a connected world. G+D Mobile Security provides trustworthy and secure solutions in an everchanging world whether virtual or physical, online or offline. Our experience in future-proof identity management makes us the perfect partner to enable businesses to satisfy customer demands for quick, convenient and smart services, while ensuring the security of customer identities and data. Learn more about G+D Mobile Security automotive solutions For more information, contact your G+D Mobile Security representative, or visit https://www.gi-de.com/en/de/mobile-security/industries/automotive/ Giesecke+Devrient G+D Mobile Security, Inc. 45925 Horseshoe Drive Dulles, VA 20166 USA P +1-703-480-2000 mobilesecurity-us@gi-de.com Visit our automotive solutions website: https://www.gi-de.com/en/us/mobile-security/ industries/automotive/ Giesecke+Devrient Mobile Security GmbH, June 2018. All Rights Reserved. Subject to change without notice. G+D and other trademarks are trademarks of Giesecke+Devrient Mobile Security GmbH, Germany. Other trademarks may be trademarks of their respective owners. This document is for informational purposes only. Giesecke+Devrient Mobile Security make no warranties - express or implied - in this document. Connect with us: