공지 : 도쿄증권거래소 JASDAQ 스탠다드 시장 신규 상장 관련 안내

Global Information
회사소개 | 문의 | 비교리스트

OEM 사이버 보안 레이아웃 조사(2020년)

OEM Cyber Security Layout Report, 2020

리서치사 ResearchInChina
발행일 2020년 12월 상품 코드 980085
페이지 정보 영문 130 Pages
가격
US $ 3,200 ₩ 3,712,000 Unprintable PDF (Single User License) help
1명만 이용할 수 있는 라이선스입니다. PDF 파일은 Copy & Paste 가 되지 않으며, 인쇄 또한 불가능합니다.
US $ 4,800 ₩ 5,568,000 Printable & Editable PDF (Enterprise-wide License) help
구매기업과 모회사, 자회사, 관련 회사 등 회사 전체에서 인원수에 제한없이 이용할 수 있는 라이선스입니다. PDF파일은 Copy & Paste 가 가능합니다. 인쇄횟수에 제한은 없으나, 인쇄물의 이용 범위는 PDF 이용 범위에 준합니다.


OEM 사이버 보안 레이아웃 조사(2020년) OEM Cyber Security Layout Report, 2020
발행일 : 2020년 12월 페이지 정보 : 영문 130 Pages

본 상품은 영문 자료로 한글과 영문목차에 불일치하는 내용이 있을 경우 영문을 우선합니다. 정확한 검토를 위해 영문목차를 참고해주시기 바랍니다.

서버와 디지털 키는 공격에 취약한 포트로, OEM은 사이버 보안에 대한 대처를 강화하고 있습니다. 현재 자동차의 사이버 보안 이벤트는 주로 서버, 디지털 키, 모바일 APP, OBD 포트에 대한 공격으로부터 발생하고 있습니다.

통계적으로는 중국의 신차로의 텔레매틱스 기능 도입률은 2020년 1월부터 10월에 걸쳐 50%를 넘어서고, 2025년에는 75% 정도로 상승할 것으로 예측됩니다.

OEM은 사이버 보안에서 그 어느때 보다 폭넓은 협력 관계를 구축하고 있습니다. OEM은 보안 강화를 비롯해 차량, 통신, 플랫폼, 데이터 및 애플리케이션에 관한 외부 협업을 적극적으로 요구하고 있습니다.

세계의 OEM에 의한 사이버 보안 레이아웃에 대해 조사했으며, IoV 사이버 보안 개요, IoV 사이버 보안 기술 애플리케이션, 중국 및 세계의 자동차 사이버 보안 표준 개발 동향, 자동차 사이버 보안 업계의 현황, OEM 각사의 사이버 보안 레이아웃 등에 대해 분석했습니다.

목차

제1장 IoV 사이버 보안 개요

  • 개요
    • 정의
    • IoV 사이버 보안 보호
  • IoV 사이버 보안 기술 애플리케이션
    • T-BOX
    • IVI
    • 디지털 키 시스템
    • 카 클라우드 네트워크 통신 보안용 PKI
    • 차량탑재 시스템용 FOTA
  • 국내외에서의 자동차 사이버 보안 표준 개발
    • 중국과 세계의 자동차 사이버 보안 표준 개발 개요
    • IoV 사이버 보안에 관한 주요 국제 정책과 규제
    • IoV 사이버 보안에 관한 유럽의 주요 정책과 규제
    • IoV 사이버 보안에 관한 미국과 일본의 주요 정책과 규제
    • 중국의 IoV 사이버 보안 표준 시스템 아키텍처
    • 중국의 IoV 사이버 보안 표준 구축
  • 중국의 자동차 사이버 보안 현황과 동향
    • 사이버 보안에 대한 CASE의 영향
    • IoV 사이버 보안 현황에 관한 업계 관계자의 지식
    • 차량 E/E 아키텍처가 사이버 보안에 미치는 영향
    • 자동차 사이버 보안 기술 개발 전략 : 클라우드
    • 자동차 사이버 보안 기술 개발 전략 : 통신
    • 자동차 사이버 보안 기술 개발 전략 : 차량

제2장 자동차 사이버 보안 업계의 현황

  • OEM 사이버 보안 이벤트 분석
    • OEM 사이버 보안 이벤트 분석
    • OEM 사이버 보안 이벤트 분석 : 이벤트 개요
    • OEM 사이버 보안 이벤트(애플리케이션) 분석(I)
    • OEM 사이버 보안 이벤트(애플리케이션) 분석(II)
    • OEM 사이버 보안 이벤트(플랫폼) 분석(III)
    • OEM 사이버 보안 이벤트(플랫폼) 분석(IV)
    • OEM 사이버 보안 이벤트(차량) 분석(V)
    • OEM 사이버 보안 이벤트(차량) 분석(VI)
    • OEM 사이버 보안 이벤트(통신) 분석(VII)
    • OEM 사이버 보안 이벤트(통신) 분석(VIII)
  • OEM 사이버 보안 레이아웃 비교
    • 유럽·미국의 OEM
    • 일본·한국의 OEM
    • 중국의 OEM
  • OEM의 사이버 보안 협업
    • 유럽·미국의 OEM
    • 일본·한국의 OEM
    • 중국의 OEM
    • 중국의 자동차 사이버 보안 업계 맵

제3장 유럽·미국의 OEM 사이버 보안 레이아웃

  • Mercedes-Benz
    • 사이버 보안 레이아웃
    • 사이버 보안 기술 루트
    • 사이버 보안 파트너
  • BMW
  • Audi
  • VW
  • Volvo
  • Ford
  • GM

제4장 일본·한국의 OEM 사이버 보안 레이아웃

  • Toyota
    • 사이버 보안 레이아웃
    • 사이버 보안 기술 루트
    • 사이버 보안 파트너
  • Honda
  • Nissan
  • Hyundai

제5장 중국의 OEM 사이버 보안 레이아웃

  • Xpeng Motors
    • 사이버 보안 레이아웃
    • 사이버 보안 기술 루트
    • 사이버 보안 파트너
  • NIO
  • Lixiang
  • WM Motor
  • Dongfeng Motor
  • SAIC
  • BAIC
  • GAC
KSM 21.01.18

Research into automotive cyber security: server and digital key are the ports vulnerable to attacks, for which OEMs have stepped up efforts in cyber security.

With advances in the CASE (Connected, Autonomous, Shared, and Electrified) trend, cars are going smarter ever with functional enrichment. Statistically, the installation rate of telematics feature to new cars in China is over 50% from January to October of 2020, a figure projected to rise to 75% or so in 2025. In terms of functionality, intelligent cockpit and advanced automated driving become trending, and the features such as multi-modal interaction, multi-display interaction, 5G connectivity, V2X, OTA and digital key finds ever broader application alongside the soaring number of vehicle control codes and more port vulnerabilities to safety threat.

Currently, the automotive cyber security events arise mainly from attacks on server, digital key, mobile APP, OBD port among others.

Server acts as the most important port for cyber security, which is exposed to the attack by hackers on operating system, database, TSP server, OTA server and the like, thus issuing in data tampering, damage and vehicle safety accidents. Most tools of assault on servers are remotely accessible with lower costs, while the data storage over servers is of paramount importance, all of which lead to often a rather high share of attacks on servers.

Digital key, as the second port that matters most to cyber security, is a common media subject to vehicle intrusion and theft. In 2020, there will be 300,000 Bluetooth digital key installs in China, coupled with an installation rate at about 4%, with such more functionalities besides lock/unlock & start as account log-in, key sharing, vehicle trajectory record, and parcel delivery to cars, which has ever more implications on vehicle safety.

Different auto brands are subject to varied attack on vehicle security.

The smarter a car is, the more vulnerable to security attacks will be. Amid the intelligence trend, all OEMs, whatever Mercedes-Benz, BMW, Audi, VW, Toyota, Honda or Hyundai, have varied exposure to security attacks.

In March 2020, key encryption approaches of OEMs like Toyota, Hyundai and KIA were reported to have limitations with a possibility of intrusions and thefts largely due to the vulnerabilities of TI's DST80 encryption system employed by them. A hacker just stands near the car that packs DST80 remote control key, using the inexpensive Proxmark RFID reader/transmitter for the 'identity theft' of the key and thus getting the encrypted information.

OEM quicken their presence in cyber security

To address serious challenges in automotive cyber security, the OEMs are sparing no efforts in security improvement in many aspects:

  • 1) information management inside the company and optimization of R&D process;
  • 2) to build a team intended for cyber security;
  • 3) cyber security protection of telematics.

European and American OEMs: Diversified deployments of cyber security protection

The automakers from Europe and America are pushing ahead with cyber security construction roundly with technical superiorities, with a tightened control on information security management inside the company apart from improvements in cyber security protection of telematics. As concerns team construction, the majority of European and American OEMs as usual set up either an independent cyber security division or a subsidiary to ensure information security during a vehicle lifespan.

Mercedes-Benz, for instance, has such actions for cyber security in the three below:

  • Cloud computing: vehicle data protection enabled by a cloud platform through which the car owner takes control of data openness to the outside while driving, and at the same time relevant information will be eliminated automatically after the car owner leaves his/her car;
  • Factory: partnership with telecom carriers and equipment vendors to set up intelligent vehicle manufacturing factories with production data safety enabled by 5G mobile network;
  • Vulnerability protection: joins forces with third-party cybersecurity providers to test and repair the potential vulnerabilities of intelligent connected vehicle.
  • Japanese and Korean OEMs: with a more focus on cyber security protection and management inside the company
  • Nissan Motor, for example, proceeds with intro-company management on information security and perfects the regulations concerned. Over the recent years, Nissan has been improving its R&D management system and cyber security platform, with its Tel Aviv-based joint innovation laboratory and collaborations with Israeli start-ups on cyber security testing and study. As yet, Nissan has more than ten cooperative joint prototype projects.
  • Chinese OEMs: the emerging forces go ahead of the rest.
    • The emerging carmakers are commendable in cyber security protection. Cases include XPENG Motors that boast concurrent deployments over cloud, vehicle and mobile phone by building a security team on its own and the partnerships with Aliyun, Irdeto, and Keen Security Lab of Tencent in order for a proactive protection system; and NIO that has built a X-Dragon multi-dimensional protection system through a self-owned security team and multi-party cooperation.

Also, the time-honored Chinese automakers follow suit, such as Dongfeng Motor, SAIC, GAC and BAIC that all prioritize the security stewardship during their life cycle. As concerns its overall deployment, SAIC, for example, incorporates its subordinates into the group's cyber security protection and management system and applies the data encryption software (GS-EDS system) with one accord for data safety as a whole; secondly, SAIC builds a cloud platform independently and a proprietary cloud computing center delivering cloud-based security services; last, SAIC founded SAIC Lingshu Software Co., Ltd in charge of developing basic technology platform and sharpening software R&D competence.

OEMs have ever broader cooperation in cyber security.

In addition to security enhancement, OEMs are vigorously seeking for external collaborations on vehicle, communication, platform, data, and application, to name a few.

Table of Contents

1. Overview of IoV Cyber Security

  • 1.1 Overview
    • 1.1.1 Definition
    • 1.1.2 IoV Cyber Security Protection
  • 1.2 IoV Cyber Security Technology Application
    • 1.2.1 T-BOX Safety Technology Application
    • 1.2.2 IVI Safety Technology Application
    • 1.2.3 Safety Technology Application of Digital Key System
    • 1.2.4 PKI Technology Application for Car Cloud Network Communication Security
    • 1.2.5 FOTA Safety Technology Application for Onboard System
  • 1.3 Automotive Cyber Security Standard Development at Home and Abroad
    • 1.3.1 Overview of Automotive Cyber Security Standard Development in China and the World
    • 1.3.2 Major International Policies and Regulations on IoV Cyber Security
    • 1.3.3 Major European Policies and Regulations on IoV Cyber Security
    • 1.3.4 Major American and Japanese Policies and Regulations on IoV Cyber Security
    • 1.3.5 Chinese IoV Cyber Security Standard System Architecture
    • 1.3.6 Chinese IoV Cyber Security Standard Construction
  • 1.4 Status Quo and Trend of Chinese Automotive Cyber Security
    • 1.4.1 Impact of CASE on Cyber Security
    • 1.4.2 Knowledge of Industry Insiders on Status Quo of IoV Cyber Security
    • 1.4.3 Impact of Vehicle E/E Architecture on Cyber Security
    • 1.4.4 Automotive Cyber Security Technology Development Strategy: Cloud
    • 1.4.5 Automotive Cyber Security Technology Development Strategy: Communication
    • 1.4.6 Automotive Cyber Security Technology Development Strategy: Vehicle

2. Status Quo of Automotive Cyber Security Industry

  • 2.1 Analysis of OEM Cyber Security Events
    • 2.1.1 Analysis of OEM Cyber Security Events
    • 2.1.2 Analysis of OEM Cyber Security Events: Event Summary
    • 2.1.3 Analysis (I) of OEM Cyber Security Event (Application)
    • 2.1.4 Analysis (II) of OEM Cyber Security Event (Application)
    • 2.1.5 Analysis (III) of OEM Cyber Security Event (Platform)
    • 2.1.6 Analysis (IV) of OEM Cyber Security Event (Platform)
    • 2.1.7 Analysis (V) of OEM Cyber Security Event (Vehicle)
    • 2.1.8 Analysis (VI) of OEM Cyber Security Event (Vehicle)
    • 2.1.9 Analysis (VII) of OEM Cyber Security Event (Communication)
    • 2.1.10 Analysis (VIII) of OEM Cyber Security Event (Communication)
  • 2.2 Comparison of OEM Cyber Security Layouts
    • 2.2.1 European and American OEMs
    • 2.2.2 Japanese and Korea OEMs
    • 2.2.3 Chinese OEMs
  • 2.3 Cyber Security Collaborations of OEMs
    • 2.3.1 European and American OEMs
    • 2.3.2 Japanese and Korea OEMs
    • 2.3.3 Chinese OEMs
    • 2.3.4 Chinese Automotive Cyber Security Industry Map

3. Cyber Security Layouts of European and American OEMs

  • 3.1 Mercedes-Benz
    • 3.1.1 Cyber Security Layout
    • 3.1.2 Cyber Security Technology Route
    • 3.1.3 Cyber Security Partners
  • 3.2 BMW
    • 3.2.1 Cyber Security Layout
    • 3.2.2 Cyber Security R&D System Construction
    • 3.2.3 Cyber Security Partners
  • 3.3 Audi
    • 3.3.1 Cyber Security Layout
    • 3.3.2 Cyber Security R&D System Construction
    • 3.3.3 Cyber Security Partners
  • 3.4 VW
    • 3.4.1 Cyber Security Layout
    • 3.4.2 Cyber Security R&D System Construction
    • 3.4.3 Cyber Security Partners
  • 3.5 Volvo
    • 3.5.1 Cyber Security Layout
    • 3.5.2 Cyber Security R&D System Construction
    • 3.5.3 Cyber Security Partners
  • 3.6 Ford
    • 3.6.1 Cyber Security Layout
    • 3.6.2 Cyber Security R&D System Construction
    • 3.6.3 Cyber Security Partners
  • 3.7GM
    • 3.7.1 Cyber Security Layout
    • 3.7.2 Cyber Security R&D System Construction
    • 3.7.3 Cyber Security Partners

4. Cyber Security Layout of Japanese and Korean OEMs

  • 4.1 Toyota
    • 4.1.1 Cyber Security Layout
    • 4.1.2 Cyber Security Technology Route
    • 4.1.3 Cyber Security Partners
  • 4.2 Honda
    • 4.2.1 Cyber Security Layout
    • 4.2.2 Cyber Security R&D System Construction
    • 4.2.3 Cyber Security Partners
  • Software
  • 4.3 Nissan
    • 4.3.1 Cyber Security Layout
    • 4.3.2 Cyber Security R&D System Construction
    • 4.3.3 Cyber Security Partners
  • 4.4 Hyundai
    • 4.4.1 Cyber Security Layout
    • 4.4.2 Cyber Security Technical Route
    • 4.4.3 Cyber Security Partners

5. Cyber Security Layout of Chinese OEMs

  • 5.1 Xpeng Motors
    • 5.1.1 Cyber Security Layout
    • 5.1.2 Cyber Security Technology Route
    • 5.1.3 Cyber Security Partners
  • 5.2 NIO
    • 5.2.1 Cyber Security Layout
    • 5.2.2 Cyber Security Technology Route
    • 5.2.3 Cyber Security Partners
  • 5.3 Lixiang
    • 5.3.1 Cyber Security Layout
    • 5.3.2 Cyber Security Technology Route
    • 5.3.3 Cyber Security Partners
  • 5.4 WM Motor
    • 5.4.1 Cyber Security Layout
    • 5.4.2 Cyber Security Technology Route
    • 5.4.3 Cyber Security Partners
  • 5.5 Dongfeng Motor
    • 5.5.1 Cyber Security Layout
    • 5.5.2 Cyber Security Technology Route
    • 5.5.3 Cyber Security Partners
  • 5.6 SAIC
    • 5.6.1 Cyber Security Layout
    • 5.6.2 Cyber Security Technology Route
    • 5.6.3 Cyber Security Partners
  • 5.7 BAIC
    • 5.7.1 Cyber Security Layout
    • 5.7.2 Cyber Security Technology Route
    • 5.7.3 Cyber Security Partners
  • 5.8 GAC
    • 5.8.1 Cyber Security Layout
    • 5.8.2 Cyber Security Technology Route
    • 5.8.3 Cyber Security Partners
Back to Top
전화 문의
F A Q