{"id":8823,"date":"2018-08-10T07:30:47","date_gmt":"2018-08-10T06:30:47","guid":{"rendered":"https:\/\/engineernewsnetwork.com\/blog\/?p=8823"},"modified":"2018-08-09T11:08:22","modified_gmt":"2018-08-09T10:08:22","slug":"in-vehicle-networks","status":"publish","type":"post","link":"https:\/\/www.engineernewsnetwork.com\/blog\/in-vehicle-networks\/","title":{"rendered":"Protect in-vehicle networks from hackers"},"content":{"rendered":"<span class=\"highlight highlight-blue\">\u2028<a href=\"https:\/\/engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/\" target=\"_blank\" rel=\"noopener\">Microchip Technology<\/a><\/span> announces the new <span class=\"highlight highlight-blue\"><a href=\"http:\/\/www.microchip.com\/cryptoautomotive\" target=\"_blank\" rel=\"noopener\">CryptoAutomotive In-Vehicle Network (IVN) TrustAnchor\/Border Security Device (TA\/BSD) development kit<\/a><\/span>.<\/p>\n<p>This tool enables OEMs and Tier 1 suppliers to introduce security to networked vehicle systems, starting in areas of priority, with the highest level of protection and without disruption elsewhere.<br \/>\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<ins class=\"adsbygoogle\" style=\"display: block; text-align: center;\" data-ad-layout=\"in-article\" data-ad-format=\"fluid\" data-ad-client=\"ca-pub-7565662001938327\" data-ad-slot=\"7585079586\"><\/ins><br \/>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><br \/>\nThe only security-specific automotive tool in the industry, the CryptoAutomotive TA\/BSD development kit emulates a secure node in an automotive network and provides system designers with an intuitive starting point for implementing security.<\/p>\n<p>Designed to be flexible, the tool accommodates each OEM\u2019s implementation by allowing manufacturers to configure the node to conform to various specifications and industry standards.<br \/>\nThe tool demonstrates secure key storage, Electronic Control Unit (ECU) authentication, hardware-based crypto accelerators and other cryptographic elements.<\/p>\n<p>When used with a host microcontroller, it enables designers to implement functions such as secure boot and Controller Area Network (CAN) message authentication, including conversion of CAN 2.0 messages to CAN Flexible Data rate (CAN-FD) with appended Message Authentication Codes (MAC) when appropriate.<\/p>\n<p>Microchip provides a comprehensive approach to automotive security. With the companion approach, the TA\/BSD emulation kit enables OEMs to continue using their existing microcontrollers (MCUs) and, more importantly, existing MCU firmware certified to required safety standards by later adding the companion chip the kit emulates.<\/p>\n<p>These companion chips will come to the customer preprogrammed and include built-in security measures to provide true hardware-based key protection.<\/p>\n<p>This add-on approach can deliver significant cost and time-to-market advantages, compared to the alternative of redesigning the system with a high-end secure MCU. This can entail significant re-architecture of the MCU firmware to implement secure zones with hardware and software domains.<\/p>\n<p>The tool can be used with any ECU, architecture, configuration or bus, providing the flexibility to implement security in existing systems without large-scale redesigns.<\/p>\n<p>The companion chip solution requires minimal MCU code updates, resulting in minimal to no impact to existing host MCU functional safety ratings. This approach also removes the requirement for in-house security expertise.<\/p>\n<p>The tool provides an online Graphical User Interface (GUI) program with pre-configured options to simplify and facilitate implementation.<\/p>\n<p>With great advances in AI, rapidly increasing levels of automation and autonomous vehicles on the horizon, securing automotive networks is a clear and urgent necessity the industry is now widely acknowledging.<\/p>\n<p>With its flexible add-on approach, Microchip\u2019s automotive development kit gives OEMs and Tier 1 suppliers the tools needed to start implementing security measures into existing vehicle networks immediately.<\/p>\n<p>The CryptoAutomotive Security ICs TA\/BSD development kit (DM320112) is available today for $250.00 from go to Microchip\u2019s full-service channel microchipDIRECT.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u2028Microchip Technology announces the new CryptoAutomotive In-Vehicle Network (IVN) TrustAnchor\/Border Security Device (TA\/BSD) development kit. This tool enables OEMs and Tier 1 suppliers to introduce security to networked vehicle systems, starting in areas of priority, with the highest level of protection and without disruption elsewhere. The only security-specific automotive tool in the industry, the CryptoAutomotive &hellip;<\/p>\n","protected":false},"author":1,"featured_media":8824,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[104],"tags":[4906,3478,4905,2732],"class_list":["post-8823","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-electronics","tag-cryptoautomotive-in-vehicle-network","tag-hackers","tag-in-vehicle-networks","tag-microchip-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect in-vehicle networks from hackers - Engineer News Network<\/title>\n<meta name=\"description\" content=\"Development kit provides OEMs and Tier 1 customers with tools to secure existing automotive networks\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.engineernewsnetwork.com\/blog\/in-vehicle-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect in-vehicle networks from hackers - Engineer News Network\" \/>\n<meta property=\"og:description\" content=\"Development kit provides OEMs and Tier 1 customers with tools to secure existing automotive networks\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/in-vehicle-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"Engineer News Network\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-10T06:30:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/08\/MC1428-Image-CryptoAutomotiveDevKit-hi.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2100\" \/>\n\t<meta property=\"og:image:height\" content=\"1500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/in-vehicle-networks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/in-vehicle-networks\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"headline\":\"Protect in-vehicle networks from hackers\",\"datePublished\":\"2018-08-10T06:30:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/in-vehicle-networks\\\/\"},\"wordCount\":440,\"image\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/in-vehicle-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/MC1428-Image-CryptoAutomotiveDevKit-hi.jpg\",\"keywords\":[\"CryptoAutomotive In-Vehicle Network\",\"hackers\",\"In-vehicle networks\",\"Microchip Technology\"],\"articleSection\":[\"Electronics\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/in-vehicle-networks\\\/\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/in-vehicle-networks\\\/\",\"name\":\"Protect in-vehicle networks from hackers - Engineer News Network\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/in-vehicle-networks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/in-vehicle-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/MC1428-Image-CryptoAutomotiveDevKit-hi.jpg\",\"datePublished\":\"2018-08-10T06:30:47+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"description\":\"Development kit provides OEMs and Tier 1 customers with tools to secure existing automotive networks\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/in-vehicle-networks\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/in-vehicle-networks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/in-vehicle-networks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/MC1428-Image-CryptoAutomotiveDevKit-hi.jpg\",\"contentUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/MC1428-Image-CryptoAutomotiveDevKit-hi.jpg\",\"width\":2100,\"height\":1500,\"caption\":\"Development kit provides OEMs and Tier 1 customers with tools to secure existing automotive networks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/in-vehicle-networks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect in-vehicle networks from hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\",\"name\":\"Engineer News Network\",\"description\":\"The ultimate online news and information resource for today's engineer\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\",\"name\":\"admin\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect in-vehicle networks from hackers - Engineer News Network","description":"Development kit provides OEMs and Tier 1 customers with tools to secure existing automotive networks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.engineernewsnetwork.com\/blog\/in-vehicle-networks\/","og_locale":"en_GB","og_type":"article","og_title":"Protect in-vehicle networks from hackers - Engineer News Network","og_description":"Development kit provides OEMs and Tier 1 customers with tools to secure existing automotive networks","og_url":"https:\/\/www.engineernewsnetwork.com\/blog\/in-vehicle-networks\/","og_site_name":"Engineer News Network","article_published_time":"2018-08-10T06:30:47+00:00","og_image":[{"width":2100,"height":1500,"url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/08\/MC1428-Image-CryptoAutomotiveDevKit-hi.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/in-vehicle-networks\/#article","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/in-vehicle-networks\/"},"author":{"name":"admin","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"headline":"Protect in-vehicle networks from hackers","datePublished":"2018-08-10T06:30:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/in-vehicle-networks\/"},"wordCount":440,"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/in-vehicle-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/08\/MC1428-Image-CryptoAutomotiveDevKit-hi.jpg","keywords":["CryptoAutomotive In-Vehicle Network","hackers","In-vehicle networks","Microchip Technology"],"articleSection":["Electronics"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/in-vehicle-networks\/","url":"https:\/\/www.engineernewsnetwork.com\/blog\/in-vehicle-networks\/","name":"Protect in-vehicle networks from hackers - Engineer News Network","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/in-vehicle-networks\/#primaryimage"},"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/in-vehicle-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/08\/MC1428-Image-CryptoAutomotiveDevKit-hi.jpg","datePublished":"2018-08-10T06:30:47+00:00","author":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"description":"Development kit provides OEMs and Tier 1 customers with tools to secure existing automotive networks","breadcrumb":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/in-vehicle-networks\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.engineernewsnetwork.com\/blog\/in-vehicle-networks\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/in-vehicle-networks\/#primaryimage","url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/08\/MC1428-Image-CryptoAutomotiveDevKit-hi.jpg","contentUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/08\/MC1428-Image-CryptoAutomotiveDevKit-hi.jpg","width":2100,"height":1500,"caption":"Development kit provides OEMs and Tier 1 customers with tools to secure existing automotive networks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/in-vehicle-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.engineernewsnetwork.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Protect in-vehicle networks from hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website","url":"https:\/\/www.engineernewsnetwork.com\/blog\/","name":"Engineer News Network","description":"The ultimate online news and information resource for today's engineer","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.engineernewsnetwork.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1","name":"admin","url":"https:\/\/www.engineernewsnetwork.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/8823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/comments?post=8823"}],"version-history":[{"count":1,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/8823\/revisions"}],"predecessor-version":[{"id":8825,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/8823\/revisions\/8825"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media\/8824"}],"wp:attachment":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media?parent=8823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/categories?post=8823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/tags?post=8823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}