Macsec in car communication
Automotive & Integrated Mobility

MACsec Protected Security For In-car Communication

Securing the data on connectivity links (Ethernet) between Electronic Control Units (ECUs)

With car technology rapidly increasing, various advancements such as high-powered entertainment systems, navigation, interactive systems, driver response performance, are seen in the market. To support them, Ethernet is becoming an essential part of the Automotive E/E Architecture as a connectivity link that connects various ECUs for the aforementioned high-end applications.

With the need to protect the data transported on Ethernet, a data security protocol, like MACsec, is used. MACsec provides point-to-point security on Ethernet links. This enables the confidentiality of transmitted data in the network of ECUs, preventing disruption and data loss caused by unauthorized parties.

Applications

Applications for MACsec In-car Communication

Icon

Key Injection

Secures payment processes and identities of smart devices by injecting keys generated by HSMs.

Icon

Tokenization

Replacing sensitive data with non-sensitive tokens enables secure business operations without sharing sensitive information.

Icon

General Purpose Hardware Security Modules

Enables key generation, storage, and exchange. Addresses various performance levels and physical security requirements while fulfilling compliance and regulatory mandates.

Icon

Public Key Infrastructures

Establishes trust relationships between connected entities such as devices, networks, applications and users. PKI is a long-proven technology providing the foundation for secure authentication, confidentiality in communication, and the integrity of data generated and exchanged.

Icon

Code Signing

With code signing, organizations can prove that their software is trustworthy and end users can, in turn, verify the authenticity of files and program code.

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more. 

      Downloads

       

      0