Telemetries and Data | ISO/SAE 21434 and WP.29 CSMS

TEAM UPSTREAM

Collecting vehicle telemetries and vehicle data is super-important for securing the vehicle in post-production. The reason is that in post-production, we need to protect the vehicle against attacks that were known at the time of the vehicle development, but also against new attacks that were unknown while the vehicle was developed. And these new attacks are result of new attack techniques and new services that are being introduced to the market.

This is why CSMS actually requires the OEM to detect cyber attacks based on vehicle logs. And if you look specifically
at the requirement, in CSMS, it’s required to have detection, a centralized detection system that is based on vehicle logs, detects cyber attacks, and provides a response within a reasonable timeframe to these attacks.

In the Vehicle Type requirements, it’s required to secure critical elements in the vehicle, but also to emit meaningful telemetry that will enable this type of post-production detection for vehicles while they’re on the road.

And when you combine these two requirements, you get a very powerful way to detect attacks in a centralized manner as
part of the management system.

So, such a detection system really enables a very broad coverage of the threats listed in Annex 5 of the WP.29, but also because you collect telemetries from millions of vehicles, you really can create a very strong baseline that describes the normal
behavior of the vehicle and have an effective anomaly detection system that can also help detect unknown attacks.

Lastly, when you collect lots of telemetries, you can not only detect the attack, but you can apply forensics and really detect the root cause of the attack.

Newsletter Icon

Subscribe
to our newsletter

Sign up to receive updates delivered to your inbox

EV 充電所 拡大に向けて: EV充電所インフラ安全確保への課題

Delivering driver confidence with robust charging networks has created new opportunities for hackers to penetrate OEM and Tier-1 networks by tampering with charging station data.

More Details

The Leading Managed Vehicle SOC: Actively Protecting Millions of Vehicles for OEMs Worldwide

Protect automotive cybersecurity with an automotive-specific Vehicle Security Operations Center (VSOCs) to address the complexity of cyberattacks targeting OT networks, such as connected vehicles and&

More Details

Beyond Cyber: Upstream Puts Data in Motion

Automotive data in the cloud breaks silos, allowing teams to analyze information in the pursuit of identifying exciting new revenue opportunities.

More Details

2022 グローバルモビリティ サイバーセキュリティ報告書

2022 グローバルモビリティ サイバーセキュリティ報告書2022年版のサイバーセキュリティ報告書では過去10年に実際に 起こったサイバー攻撃の脅威を

More Details

Leading the Charge: Securing Charging Station Infrastructures

Delivering driver confidence with robust charging networks has created new opportunities for hackers to penetrate OEM and Tier-1 networks by tampering with charging station data.

More Details

Protecting Electric Vehicles: Modern Cybersecurity Solutions and the Road to Revenue

There is much to enjoy in the performance of electric vehicles and advanced features of electric vehicles, yet each connected capability such as GPS, mobile…

More Details