Countermeasure layers | Threats | |||||||
---|---|---|---|---|---|---|---|---|
Enclosure manipulation | ITS interface tamper attacks | V2X HSM interface tamper attacks | GNSS interface tamper attacks | Eavesdropping data signals | Clock fault injection | Temperature fault injection | Voltage fault injection | |
Environmental sensors | \(\bullet\) | \(\bullet\) | \(\bullet\) | |||||
Opening enclosure detection | \(\bullet\) | \(\bullet\) | \(\bullet\) | \(\bullet\) | \(\bullet\) | |||
Coating covering sensible circuits, with self-destructive components to avoid coating removal | \(\bullet\) | |||||||
Active wire-mesh protection for critical elements and signals | \(\bullet\) | \(\bullet\) | \(\bullet\) | \(\bullet\) | ||||
Mutual authentication | \(\bullet\) | \(\bullet\) | ||||||
Data encryption | \(\bullet\) | \(\bullet\) | ||||||
Secure boot | \(\bullet\) | \(\bullet\) | ||||||
Application processor trusted execution environment | \(\bullet\) | \(\bullet\) |