| Secure Boot |
- Ensures that only trusted and verified software is executed during the boot process.
- Prevents malicious tampering, especially important in connected devices.
- Verifies the integrity of firmware and application code before execution.
- If verification fails, the boot process is halted to block unauthorized or tampered firmware.
- iWave will provide:
- Binaries with bootloader signature verification.
- Secure boot flow integration ensuring only signed images are loaded.
|
| Secure Storage |
- Protects sensitive data such as user credentials, security certificates, vehicle logs and other critical system information.
- Ensures secure handling and storage of sensitive data to maintain integrity and prevent breaches.
- Restricts access to encrypted partitions to authenticated users only, enhancing the data security.
- iWave will provide:
- An API library to manage encryption and decryption of partition.
- A sample configuration file and application.
|
| Authentication |
- Prevents unauthorized access to the device by verifying user identity.
- A strong password verification process ensures only trusted individuals or systems can interact with vehicle systems.
- A CSV file containing credentials for User credentials, Wi-Fi configuration, SSH access, Encrypted partition
- User can modify existing passwords (user, Wi-Fi, SSH) using the sample application.
- iWave will provide:
- An API library to implement custom applications
- A sample application to test the API library
|
| AppArmor Access Control |
- Enforces mandatory access control policies at the application level.
- Each application is confined to a strict security profile, allowing access only to necessary resources.
- Prevents compromised or malicious apps from accessing or interfering with critical system components.
- iWave will deliver:
- An API library to implement custom applications
- A sample application to test the API library
|