Infineon’s new SLS37 V2X HSM is based on a high-security, tamper-proof microcontroller tailored to the security requirements of V2X applications in telematics ECUs. It protects the integrity and furthermore the authenticity of messages as well as the privacy of the sender. The HSM has Common Criteria EAL4+ certification, which is expected to become mandatory in European V2X systems.
In a V2X host environment, the discrete HSM helps system integrators meet the conflicting requirements of high performance and high security. Therefore, the SLS37 V2X HSM's feature set focuses on high-security tasks such as key storage and signature generation for outgoing messages. This eliminates the need for security certification of the host processor, which, in addition to a Linux operating system and the application software, also handles the less security-relevant but performance-hungry verification of incoming messages.
Target applications of the SLS37 V2X HSM are telematics control units in automobiles as well as road side units or other infrastructures for V2X communication. The solution supports all major vehicle safety credential management systems, including SCMS, CCMS and ESPS. It accepts an extensive supply voltage range from 1.6 to 3.6 V, has a high-speed SPI interface with up to 10 MHz and is qualified according to AEC-Q100 for harsh automotive applications.
In addition, Infineon provides a host software package. This makes the SLS37 V2X HSM a plug-and-play solution. The personalisation concept implemented in the hardware and anchored in a secure and certified manufacturing environment minimises the customer's key management effort. At the same time, this provides maximum security during the product life cycle. The sophisticated personalisation concept utilises a range of chip- and customer-specific certificates and keys for ease of use, enabling manufacturer verification, pairing and transport protection, as well as secure-in-field updates. As a discrete security controller, the SLS37 also offers scalability for developing platforms for different regions with different security requirements.