Table of Contents

 1     Scope          
        1.1     Applicability statements         
        1.2     Validation of security guidelines over the timeline       
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Overview of automotive Ethernet-based and evolving in-vehicle architectures           
        6.1     Electrical and electronic computing and network architecture in a vehicle         
        6.2     Comparison of future and current electrical and electronic architecture security            
        6.3     Communication services using the Ethernet in automotive applications              
 7     Analysis of threats 
        7.1     Approach methodology for analysis of threats
        7.2     Security assets             
        7.3     Security objectives    
        7.4     Identified threats       
 8     Security requirements         
        8.1     Confidentiality             
        8.2     Integrity         
        8.3     Availability     
        8.4     Authenticity 
 9     Implementation of Ethernet-based in-vehicle networks with security             
        9.1     Implementation related considerations in advance      
        9.2     Automotive Ethernet associated security gateway functions   
        9.3     Secure VLAN configuration     
        9.4     Security for Ethernet switches in automotive context 
Appendix I – Description of some Ethernet-based in-vehicle network protocols with communication endpoints located in AUTOSAR or non-AUTOSAR compute nodes    
        I.1     Overview and scope   
        I.2     AUTOSAR secure onboard communication inclusive lower protocol layer security protocols    
        I.3     Diagnostic communication over Internet protocol         
        I.4     Media access control security 
Appendix II – Vehicle gateways with Ethernet, IP or Internet connectivity    
       II.1     Motivation     
       II.2     Purpose of this appendix         
       II.3     Selected vehicle gateway Recommendations with security information
Appendix III – Intra-vehicle intelligent transport system security    
      III.1     Background   
      III.2     ITS in-vehicle networks             
      III.3     ITS security    
Bibliography