Security Suite for TCU


A leading Digital Transformation Enterprise providing connected mobility solution and intelligent transportation solutions secured and protected their Telematic Control Units against attacks and malware.

Client Background

A North American Enterprise, a global leader providing intelligent transportation solutions.

The client was looking at a vendor who has experience on the automotive solutions and embedded systems expertise helping prevent unauthorized access to the device with a balance in the performance, efficiency, and reliability.

The Challenge

With the requirement to secure telematic units against potential attacks and hackers taking control of the vehicles, the enterprise required quick implementation of secure boot and secure filesystem on their existing units.

The TCU which connects to the ECU of the vehicle provides a very rich gateway for hackers to penetrate the car’s network

  • Secure Boot
  • Secure Filesystem
  • OS Hardening
  • NXP i.MX 6
  • Wi-Fi Security
  • Easy to use API

Solution

iWave Systems, with vast expertise in automotive solutions and embedded systems, was chosen as the telematics device partner and implementation of the security features .

iWave Systems introduced a Security suite which secures connected devices, enabling them with security functions such as encryption, storage, data transmission and certificate management. The easy to integrate solution helps address the security challenges creating a safe and secure environment. Security Suite includes secure boot, Wi-Fi secure API, event logging, OS hardening, access control, software firewall and secure firmware update to name a few.

Our security architecture was developed to protect the integrity of the firmware. This means that even if a malicious actor manages to hack the device, they will be unable to interfere with the firmware. Thus, reduces the complexity and huge financial loss in terms of the data that can be lost.

Implementation

Secure File System takes an end-to-end approach of protecting data by cryptography preventing unauthorized access to the data storage. The entire file system is encrypted. So, Without proper encryption keys, data stored on any encrypted file system cannot be read (decrypted). Root file system is booted with read-only mode and write permission is given in a controlled way.

Copyright © 2022 iWave Systems Technologies Pvt. Ltd.