With the sharp increase in the number and significance of image sensors being deployed in safety-critical applications for advanced ADAS and ADS, the need to protect camera stream data becomes ever more important. In this extended discussion, the co-chairs of the MIPI Security Working Group provide an in-depth look at the unique approach MIPI is undertaking to protect data streams between MIPI CSI-2®-based sensors and their related ECUs from the perspectives of authentication, integrity and confidentiality.
After an overview of MIPI's automotive security goals, you'll learn how security fits into the MIPI Automotive SerDes Solutions (MASSSM) framework, and how it will be applied to CSI-2 data streams through provisions in four upcoming specifications: MIPI Camera Service Extensions (CSESM) v2.0, MIPI Security v1.0, MIPI Command & Control Interface Service Extensions (CCISESM) v1.0, and MIPI Security Profiles Specification v1.0.
The discussion focuses on how this approach is distinct from other methods, particularly in its extent and configurability. For instance, whereas many methods protect the link layer, MIPI security is application-based, thereby enabling end-to-end security from the pixel source to pixel sink at the CSI-2 application layer. The approach also introduces the use of scalable source-selective partial-integrity and encryption (SSPIE) -- the ability to provide highly granular security control of the CSI-2 video frame so that implementers have the flexibility to apply needed tradeoffs between the required security level and cost and/or power constraints in the sensor system. It also allows for scalable MAC modes, which allow MAC accumulation and transmission on variable scales, including on a per-message, per-CSI-2 data-type and per-frame basis, enabling algorithm options for higher- or lower-tier sensors.
Also included in the presentation is a discussion of security layering and flexibility vectors, including protocol, crypto algorithms, tag modes and security variants.
An extended question-and-answer session followed the presentation. The Security Working Group looks forward to engaging with the automotive industry and welcomes questions on the security framework, as well as considerations and requirements for future development work.
Philip Hawkes is co-chair of the MIPI Security Working Group. His experience covers mobile networks, location technologies, IoT/M2M, WiFi and wired connectivity. Phil is currently a principal engineer, technology, at Qualcomm, and started his career as a symmetric cryptography expert involved in both design and analysis of algorithms.
Rick Wietfeldt is co-chair of the MIPI Security Working Group and serves as a senior director, technology, at Qualcomm Technologies Inc. He joined Qualcomm in 2007 and established the Advanced Connectivity Technology office responsible for the standards development organizations (SDOs) that drive mobile interface standards. He has authored numerous publications and has been awarded numerous patents in mobile device architecture and operation.
Peter Lefkin has been providing leadership and guidance to the standards development community for more than 20 years. In 2022, he was promoted to executive director of MIPI Alliance, after having served as its managing director since 2011. As MIPI's senior staff executive, he is responsible for all MIPI activities and operations, from strategy development to implementation, and also serves as secretary to the MIPI Alliance Board of Directors.