Site Information

 Loading... Please wait...

Multi-Core Microcontroller (MCU) With Up To Eight CAN FD Ports Aimed At Automotive Applications

Posted by Industry News on

STMicroelectronics SPC58 MCU With CAN FD For Automotive Applications

The  SPC58 product family by STMicroelectronics is the latest in the line enhancing the scalability, connectivity, and security of automotive applications, including standalone, integrated, and smart gateways, firmware updates over-the-air, electric-vehicle battery management, access control, lighting and body control units, domain controllers, and advanced park maneuver assistance.

Premium vehicles today typically have around 130 electronic control units (ECUs). These are networked to control about 150 motors and actuators. Therefore the MCUs provide different network options including ISO CAN FD. Some family members feature up to eight independent CAN FD interfaces. 

In designing the products, the chipmaker defined the key features to ensure an MCU range with scalable performance as well as a host of memory and packaging options. Performance up to 200 MHz with single, double, and triple core options, is complemented by memory sizes that will provide up to 10 MiB of flash and 1,3 MiB of RAM. 

More Information...

Implementing Scalable CAN Security with CANcrypt: Authentication and encryption for CANopen, J1939 and other Controller Area Network or CAN FD protocolsImplementing Scalable CAN Security with CANcrypt: Authentication and encryption for CANopen, J1939 and other Controller Area Network or CAN FD protocols

When the Controller Area Network (CAN) was designed, security was not a requirement. The primary usage of CAN was considered closed; possible intruders or attackers would simply not get physical or remote access to the network. However, today it is more and more common that devices connected to a CAN system also have connections to other networks, including the Internet. 

Recent car hacks have shown that attackers may get access to CAN systems. Without strong security features, an attacker automatically gains full access to everything connected, allowing active control commands to be recorded and replayed. In this book we examine which options developers of CAN based systems realistically can use to provide adequate security features. 

What can we do - without using heavy-weight security features? What can we do - to detect possibly injected messages? What can we do - without any hardware change? What can we do - with minimal software change? The CANcrypt protocol and software is introduced as a scalable security solution for the Controller Area Network.

More Information...