As director of strategic planning and production management for Intel’s Transportation Solutions Division, one thing I am particularly excited about these days is the future of automated vehicles. Advances we’re making in connected car technologies have tremendous potential to change our lives and societies for the better. Just imagine it: zero accidents, reduced congestion in the world’s most polluted cities and mobility for all.
Here at Intel, we’ve identified three key pillars that will guide us on the road to an automated vehicle future: the car (including in-vehicle computing and human-machine interfaces, or HMIs), the cloud and data center, and the communications that connect them, specifically 5G. Paramount to each of these pillars is security.
Yet while opportunity awaits, many automakers are still struggling to fuse together automated vehicle platform security. Today’s operating systems and automotive applications can have more than 100 million lines of code, making it challenging for an automaker to ensure that software is secure. Usually, there is an expectation that software will have a defect rate of 0.75 per function point, of which some percentage will cause security vulnerabilities. Agile product life cycle methodologies allow for collective learned enhancements (like maps, traffic data, parking and enhanced visual and cognitive acuity via deep learning updates), security patches and service upgrades with secure software over the air (SOTA) updates.
The Intel ecosystem is working to build resilient security and in-depth architecture, starting at the silicon level and extending to the operating system. Together, we’re protecting communication channels between devices and to the automotive data center for trusted software updates and secure downloads of maps and other navigational information. This fits right into what I consider to be some overall best practices for designing a secure automated driving environment. Along with that, we’re analyzing risk, combining functional safety and security teams, and architecting for requirements.
People can sometimes underestimate how broad a topic automotive security is, from initial design phases through manufacturing and production. By starting early and doing a holistic analysis, you can analyze threats and identify risks, then you can prioritize those risks and focus on hardening your architecture and solution. But it’s an industry and ecosystem challenge. No single company can solve automotive cybersecurity on its own.
Securing the Ride
Historically, all existing security technologies evolve to address threats of their time. For example, intrusion detection systems (IDS) evolved in the 1980s in response to the proliferation of viruses and worms on personal computers, and public key cryptography was invented in the 1970s to secure network communications.
Today, we are doing research into new security technology that can help protect cyberphysical systems. This new technology will allow detection of security failures and will be able to self-recover or self-heal. It will also incorporate elements of artificial intelligence to create necessary levels of resiliency.
Driving toward the Future
Looking ahead, we are setting new standards and defining future architectures for safe, secure transportation that spans the vehicle, communications and data center. With cross-company technology and product leadership across IoT, data center, Intel Security, Wind River Systems, Intel Labs, and our new acquisitions of Nervana, Arynga, Itseez and YOGITECH in particular, Intel is uniquely positioned to prepare automakers and suppliers for the amazing future of transportation. And with our continued commitment to scalable, end-to-end security solutions, the Intel IoT ecosystem is providing layered protection from chip to cloud for a safer tomorrow.
To learn more about the road ahead for connected transportation, visit intel.com/automotive. For more on Intel IoT developments, subscribe to our RSS feed for email notifications of blog updates, or visit intel.com/IoT, LinkedIn, Facebook and Twitter.