Dear Colleagues,
After years of theoretical research and experiments, V2X technology will be put into actual combat, which will greatly improve the safety of the car. In 2017, the major vehicle manufacturers, Tier 1 and the Industry Alliance launched V2X products, technology and industry standards, including: Chery Auto built the first intelligent network V2X model road in Anhui province China; SAIC Motor planed commercialize its Roewe car with experiencing V2X function in 2019; Qualcomm released its breakthrough C-V2X connected vehicle solutions; NXP introduced global first secured extensible V2X platform based on single chip; STMicroelectronics and Autotalks successfully developed V2X chipset; USDOT with other seven automotive manufactures in CAMP Alliance developed V2X safety specification; Cadillac CTS, the first commercially available vehicle with V2V capabilities came into service.
However, the success of V2X technology must depend on the development of network security and information security. Automakers have been challenged with the task of making a fully secure connected vehicle to keep drivers safe on the road and protect their privacy. Vehicles are designed with driver and passenger safety as a key concern; however, without proper security, there cannot be safety. V2X is the next generation vehicle technology that is being researched and developed not only from the well known vehicle manufacturer, it is also researched and developed at national level in the United States and Europe. However, as vehicles are converged with IT technology, security threats that existed in preexisting IT environment are also being transferred to vehicles. There has been hacking cases announced around famous conferences which was performed on actual vehicles. If there is a hacking damage case targeting the future V2X environment, security measures are required because it could lead to accidents related to humans.
How to achieve assurance of secure V2X capabilities is the major challenge the automotive industry has to face and solve. At the upcoming “The 3rd Annual China Automotive Cyber Security Summit” to be held on the 25th -26th Jan. 2018 in Jinjiang Tower Hotel Shanghai, Mr. Ryan Wu, the BD Director of OnBoard Security Inc., will provide an update on the current state of deployment of V2X technologies, regulatory and standardisation activities across key global markets, and discuss strategies for the implementation of high speed communications security for connected vehicles based on the IEEE 1609.2 standard.× Examples of the most up-to-date implementation of message authentication and user privacy for the connected vehicle system will be demonstrated, the 2017 Cadillac CTS, the first commercially available vehicle with V2V capabilities. Also Dr. Jaejung Kim, the CTO of KICA (Korea Information Certificate Authority) will give a talk about “A Case Study of Vehicular-PKI Establishment for V2X communication of Cooperative-ITS in Korea”. The research on security of vehicle PKI system in the V2X environment has already been carried out much abroad based on IEEE WAVE 1609.2 standard, and in Korea, establishing and demonstrating vehicle PKI system in national industrial aspect based on IEEE WAVE 1690.2 standard is being prepared. Dr. Kim’s presentation will introduce how to build and operate a vehicle PKI systefor communication security on ongoing V2X environment in Korea. By comparing with the structure and operation method of public authentication service currently used in Korea, an efficient method for building and operating a real vehicle authentication system will be discussed. Also, a roadmap for building Korea's V2X environment security infrastructure for Cooperative-ITS (C-ITS) will be introduced in the presentation. In addition, Dr. Mustafa Sead, the Cybersecurity Group Lead & Principal Engineer from Hyundai-Kia America Technical Center, Inc. will present on the topic of “Cybersecurity Concerns on Vehicle Technology Evolution”, Dr. Sead’s presentation will help you to understand how to ensure security of future models of transportation (autonomous. etc) through demonstrating the gaps in current cyber security systems and also demonstrate how these vehicles could be hacked and what's required to counter this.
Part of the Topics:
•Legislation Update: How China government amend the existing laws and regulations for the characteristics of the
connected car technology and potential security risks
•Understand the security business risks for OEM's and top tier suppliers, as well as potential adversaries that you'll face, along with their motivation and resources
•Security and Next Gen Automotive Technology including V2V, V2X, Vehicle to cloud, fleets, ADAS and autonomous cars
•Secure Automated Vehicles Fuse Security With Functional Safety
•How fleet owner, OEMs, Tier 1s, etc can take today to start protecting their vehicles from cybersecurity attacks,
including best practices, updates, and monitoring and the longer-term path toward comprehensive solutions
•Plot the what & why of security technology already in progress, including standards, authentication, security analytics and an update on SHE, EVITA, & CAMP
•How to build a Secure Vehicle Architecture: Discuss the security technology implications of connected cars and best practices for designing a vehicle architecture that minimizes attack surfaces and ensures data privacy
•Delivering secure software and firmware updates OTA
•Blockchains in Automotive security
•Feasible attack paths and effective protection against ransomware
•Securely merging vehicle platforms with other IoT platform
•Addressing vulnerabilities in new sensors and car computers
....................................
Part of Our Speaker Lineup:
|