Safety and Security
Engineered for safety from the ground up
Our ASIL-D certified architecture embeds functional safety in every domain with independent wheel control, advanced stability systems, and redundancy strategies to maintain control in degraded states. Cybersecurity is built in, with data encryption, zonal isolation, and real-time intrusion detection, to protect vehicles, passengers, and operations.
Functional Safety
ASIL-D certified
ISO-compliant architecture
Functional safety is built into REE’s x-by-wire architecture from the ground up. Designed to meet ISO 26262 standards, the system incorporates layered redundancy and continuous diagnostics, that are designed to achieve safer operation in every driving scenario. OEMs gain the reliability and compliance required to scale software-defined and autonomous vehicles with confidence.
- ISO 26262-compliant design
- Process compliant with ASPICE 4.0
- Built-in redundancy and diagnostics
- Safer operation
- Scalable across platforms and vehicle classes
- Compliance foundation for SDV and autonomy
Cybersecurity
Protection built into every layer
Cybersecurity is native to REE’s architecture. Encrypted communication pipelines, secure key management, and runtime protection safeguard vehicles from external threats. Compliance with UNECE R155 and R156 ensures vehicles remain secure and update-ready for evolving regulations.
- ISO 21434 compliant design
- End-to-end data encryption with secure key management
- Zonal isolation and secure boot mechanisms prevent tampering
- Runtime protection for in-vehicle applications and ECUs
- Compliant with UNECE R155 (cybersecurity) and R156 (software updates)
Intrusion Detection
Real-time threat monitoring and zonal protection
REE’s zonal firewalls and intrusion detection system continuously monitor traffic across domains to identify and block malicious activity. This multi-layered defense protects safety-critical functions and provides real-time alerts for fleet operators and OEMs.
- Continuous monitoring of in-vehicle network traffic
- Zonal firewalls that isolate and contain suspicious activity
- Real-time anomaly detection with instant alerts
- Protection of safety-critical ECUs against unauthorized access