Automotive Cybersecurity


Automotive Cybersecurity


As the complexity of malware rises, Panasonic’s Intrusion Detection System is designed to root out emerging viruses in connected and autonomous vehicles.

Panasonic Automotive provides a comprehensive security solution for today’s connected vehicles and tomorrow’s fully autonomous vehicles, where the prevention of intrustions to control system is critical.

Targeting autonomous and connected

Connected cars can be the target of malicious cyber attacks. Conventional defense systems in vehicles can cope with known software viruses, but have problems identifying new ones. When a system can’t identify malware, it is difficult, if not impossible, to deploy an antidote. Panasonic’s newly developed system is designed to monitor and protect autonomous and connected cars by detecting emerging malicious attacks and viruses targeting vehicles. This is done by analyzing the communication in the car and deploying over-the-air countermeasures.

Detect and prevent emerging malware

This technology leverages Panasonic's intrusion detection and prevention technology for control area networks, Ethernet, FlexRay and in-vehicle infotainment systems. It works by exposing and preventing unauthorized commands sent to a vehicle’s engine control unit. The system sends info on malicious events to an analysis platform in the cloud to identify and block suspicious traffic. By 2025, all new cars are expected to be connected, according to research. As vehicle lines roll out, this data can be used to more easily detect attacks that may threaten them.

On display at CES: a scaled model of a connected vehicle. See a simulation of how the Panasonic Intrusion Detection System actively monitors cyber- attacks. By detecting intrusive attacks and viruses to the vehicle system, the technology systems discard and disable such intrusions.

Monitoring security from the roads and the clouds

The Panasonic Intrusion Detection System consists of two units—a "monitoring module" and a "monitoring cloud module” installed in the vehicle.  The monitoring module, programmed with rules to detect malware, constantly checks the vehicle’s system for intrusion. When an attack is discovered, the system can prevent it by updating the programmed rules of the vehicle-installed monitoring module.

The cloud module works as a security information and event management system. It collects in-vehicle log data to analyze device events, conditions and system communications. By analyzing the log data, the cloud module can detect suspicious events, alert the security team, who can analyze the alert, and respond when needed.