Font Size: a A A

Design And Implementation Of A Cyber Security Subsystem In Smart Cockpit

Posted on:2022-01-05Degree:MasterType:Thesis
Country:ChinaCandidate:X Y ZhangFull Text:PDF
GTID:2532307058997109Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Over the last decades,artificial intelligence and internet technologies have made great progresses,which make today’s vehicles increasingly intelligent.These novel techniques lead the future developments of automotive industry,but result in new challenges in terms of cyber security.Smart cockpit systems centralize the information of driving,infotainment and vehicle internet,it therefore plays an important role in the field of the vehicle cyber security.Because the systems of this type are heterogeneous and possess complex hierarchical architectures,the related developments and maintenances are usually difficult and effort-costly,especially when they must be updating to adapt different operating systems simultaneously.This work focuses on the field of intelligent vehicle techniques.The motivation is to improve the state of arts of the smart cockpit systems.The developments are based on the ARM virtualization technology of TrustZone and trusted execution environment standards of Global Platform.First of all,we implement and evaluate four key features of smart cockpit systems regarding to the security booting,upgrading,storing and communicating by using different popular SOCs for the state-of-art researches.The SOCs of this evaluation include Qualcomm SA8155 SOC,QTEE and Android OS.Next,considering that QTEE is a closed-source operating system specialized for Qualcomm SOC,the SOC of NXP i.mx8 and open-source operating system of OP-TEE are selected as the hardware and software platforms,respectively.Basing on the existing research achievements of vehicle information security,new solutions are proposed and implemented.The method of this work improved the compatibility of the system interfaces to different trusted operating systems,allowing fast updating of the system for Android applications.Furthermore,the trusted applications are layered by extracting the public modules,so it is possible to enhance the standard modules of normal environments via trusted ones.
Keywords/Search Tags:TrustZone, Security boot, Security update, Security storage, Security communication
PDF Full Text Request
Related items