Vehicle Cybersecurity System Learning
Term DefinitionBlockchain is a distributed database technology used to record and verify transactions, with the characteristics of decentralization, transparency and immutability. Smart Contracts are self-executing contracts stored on the blockchain, which automatically execute the terms of the contract when the preset conditions are met. Digital License Plate (e-tag) An electronic display screen that replaces the traditional metal license plate to display vehicle information. On-board Remote Diagnostics System (OBD II) A standard diagnostic interface on the vehicle for accessing vehicle data. Telematics uses wireless communication technology to achieve information exchange between the vehicle and the outside world, providing services such as navigation and remote diagnosis. Vehicle Control Unit (ECU) The core control unit of the vehicle's electronic system, responsible for managing the operation of components such as the engine and transmission. Identity and Access Management Enterprise Platform (IAME) A blockchain-based platform for storing and verifying user information and managing vehicle access rights. Unique Tag Identification Number (UTIN) A unique identifier assigned to each user by an authorized agency for identity authentication. Personal Identity Verification (PIV) Card A smart card that stores the user's identity information and digital certificate for identity authentication. Common Access Card (CAC) is a smart card used by the U.S. government that stores a user's identity information and access rights for authentication and access control.
Short Answer Question
How do digital license plates (e-tags) work? Digital license plates use motion sensors, position sensors, light sensors, and other components to provide a safer and more efficient way to use vehicles. When an e-tag is activated, the display panel lights up and displays a preset message.
What role does telematics play in this system? Telematics is used to collect vehicle data such as location, speed, diagnostic information, etc. and send it to the IAME platform for recording and analysis.
How does the system authenticate users? The system uses a three-step verification protocol: authorization, authentication, and vehicle activation. The authorization step verifies that the user has a valid UTIN, the authentication step uses a multi-factor authentication method such as a password, fingerprint, or facial recognition, and the vehicle activation step activates the vehicle's electronic systems.
What happens if user authentication fails? If user authentication fails, the system activates the primary disconnect switch, preventing the vehicle from starting.
When is the secondary disconnect switch activated? When cybersecurity monitoring detects a cyberattack, a secondary disconnect switch is activated to disable vehicle operation and initiate a cyberthreat isolation procedure and cyberthreat detection notification.
How does the system prevent hackers from attacking the vehicle's security systems? The system continuously monitors diagnostic codes and data from interface devices to detect if the security systems have been hacked.
What role does the malware analysis service play in the system? The malware analysis service receives data from the connected vehicle and analyzes it to identify cyber threats (i.e., cyberattacks).
What is the IAME platform and how does it work? The IAME platform is a blockchain-based identity and access management enterprise platform that stores and authenticates user information and manages vehicle access rights. It uses distributed ledger technology to ensure data security and integrity.
How is UTIN used in the system? UTIN is a unique identifier assigned to each user and is used for authorization, authentication, and logging of user activities.
How does the system leverage existing identity architectures and cybersecurity networks? When performing multi-factor authentication, the system can reference the identity architecture/cyber defense network established by any federal agency/office or state DMV, such as the DISA Zero Trust Network, the DHS Office of Biometric Identity Management (OBIM) Network, the Behavior-Based Identity Network, etc.