|
|
With the sharp increase in the number and significance of image sensors being deployed in safety-critical applications for advanced ADAS and ADS, the need to protect camera stream data becomes ever more important. In this extended discussion, the co-chairs of the MIPI Security Working Group provide an in-depth look at the unique approach MIPI is undertaking to protect data streams between MIPI CSI-2®-based sensors and their related ECUs from the perspectives of authentication, integrity and confidentiality.
After an overview of MIPI's automotive security goals, you'll learn how security fits into the MIPI Automotive SerDes Solutions (MASSSM) framework, and how it will be applied to CSI-2 data streams through provisions in four upcoming specifications: MIPI Camera Service Extensions (CSESM) v2.0, MIPI Security v1.0, MIPI Command & Control Interface Service Extensions (CCISESM) v1.0, and MIPI Security Profiles Specification v1.0.
The discussion focuses on how this approach is distinct from other methods, particularly in its extent and configurability. For instance, whereas many methods protect the link layer, MIPI security is application-based, thereby enabling end-to-end security from the pixel source to pixel sink at the CSI-2 application layer. The approach also introduces the use of scalable source-selective partial-integrity and encryption (SSPIE) -- the ability to provide highly granular security control of the CSI-2 video frame so that implementers have the flexibility to apply needed tradeoffs between the required security level and cost and/or power constraints in the sensor system. It also allows for scalable MAC modes, which allow MAC accumulation and transmission on variable scales, including on a per-message, per-CSI-2 data-type and per-frame basis, enabling algorithm options for higher- or lower-tier sensors.
Also included in the presentation is a discussion of security layering and flexibility vectors, including protocol, crypto algorithms, tag modes and security variants.
An extended question-and-answer session followed the presentation. The Security Working Group looks forward to engaging with the automotive industry and welcomes questions on the security framework, as well as considerations and requirements for future development work.