Home // VEHICULAR 2019, The Eighth International Conference on Advances in Vehicular Systems, Technologies and Applications // View article


My Connected Car Is Under Attack: "TPM", “TPM” HELP ME

Authors:
Jeevan Visvesha

Keywords: TPM; V2I; OTA; Secure protocol; Authentication

Abstract:
Raising trend in connecting vehicle prompts us to answer how secure they are. They are no less than a massive computer. There are around sixty to eighty Electronic Control Unit (ECU) in the vehicle. Modern automotive technologies are required to enhance the consumer in-car experience which at the same time expands the attack surface, opening up a host of new vulnerabilities. Presence of around eighty ECUs additionally mandates for secure in-vehicle communication between the vital ECUs, that is not existent in present vehicles. Telematics Control unit (TCU) is commonly utilized in vehicles to act as sort of a gate in uplinking any vehicle information to Infrastructure and downlinking files from Infrastructure to vehicle. There are a lot of complexities involved with building connected system. Solutions for a portion of the complexities present us with imperative issues like identification and authentication, which may be of high impact. The paper can provide answers to following queries: How TPM helps in moving towards a secure authentication with the infrastructure? How TPM helps in securing the Uplinking and OTA communication? How ECU to TPM communication can be secured?

Pages: 103 to 107

Copyright: Copyright (c) IARIA, 2019

Publication date: June 30, 2019

Published in: conference

ISSN: 2327-2058

ISBN: 978-1-61208-720-7

Location: Rome, Italy

Dates: from June 30, 2019 to July 4, 2019