Skip to main content

Technologies to protect connected cars ‘not being utilised’

A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’. The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbe
August 10, 2016 Read time: 3 mins
A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’.

The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbee radio.

The white paper provides a metadata analysis of the many private vehicle security assessments IOActive has conducted since 2013 and includes an analysis of the impact, likelihood, overall risk and remediation of vulnerabilities IOActive consultants have discovered over the course of thousands of testing hours.

According to report author Corey Thuen, senior security consultant at IOActive, there are some idiosyncrasies between sub-categories of automotive and further between automotive and IoT or ICS/SCADA but, in general, these embedded computers are all using the same technologies under the hood. They all suffer from many of the same problems and challenges.

He continues, “The connected car is forcing automotive companies to become much more than automotive companies. They must now be database managers, cloud providers, enterprise network operators, etc., etc. Taking the car into the future means having to learn all of the lessons that Microsoft, Google, or Apple have learned over the past 15 years. The plus side, however, is that along the way these companies documented the bumps and bruises and now there are really great roadmaps and resources for implementing security.”

Jon Geater, chief technology officer, 596 Thales e-Security, said: “To help defend against certain cyber-attacks, and protect the integrity of the supply chain, connected components require clear authentication processes. While vehicle OEMs and their suppliers have recognised that cryptographically-based digital signatures provide the strongest form of authentication, this also necessitates the management and protection of certificates and the underlying keys. The rapid increase in connected components has created the need for broad-scale secure key management, supported by a public key infrastructure.

“Adding even further complexity, vehicle-to-vehicle and vehicle-to-infrastructure communications, although first introduced in 2017 production vehicles, will soon become the norm, requiring manufacturers to identify and implement the necessary technologies to protect drivers, passengers and the wider community from cyber-attackers.”

Thuen concludes, “The technologies needed to protect the connected car against cyber attack are already in existence, they just aren’t being utilised.”

Related Content

  • November 14, 2016
    Connected car data – both opportunities and challenges for auto OEMs, says KPMG
    Data collected through connected cars will present automakers with tremendous business opportunities to enhance customer experiences while at the same time also posing inherent risks, according to a new KPMG report, Your Connected Car is Talking: Who's Listening? KPMG's national automotive leader, Gary Silberg, notes that, while OEMs can use data collected through connected vehicles to optimise performance, reliability and safety of vehicles they produce, failure to get cyber-security right could have a
  • February 23, 2018
    Companies depend on automation, AI and machine learning for cyber security
    To defend against cyber attacks, 39% of organisations are reliant on automation, 34% on machine learning and 32% on artificial intelligence (AI), according to the Cisco 2018 annual report conducted on 3,600 chief information security officers. It found that over half of all attacks resulted in financial damages of more than $500,000 (£697,000), including, but not limited to, lost revenue, clients, opportunities, and out-of-pocket costs. The study revealed that adversaries are using Malware sophistication
  • September 12, 2024
    Cisco’s 5 steps to cyber-resilient roadways
    As the ITS world becomes ever more connected, cybersecurity risks are increasing. Cisco experts Pete Kavanagh and Angela Murphy explain how to overcome key challenges
  • April 9, 2014
    Global toll revenues $8.5bn while technology ‘battles’ continue
    ABI Research’s Dominique Bonte talks to Jason Barnes about trends in tolling and how a wider appreciation of technology options is sorely needed. Global Electronic Toll Collection (ETC) solution revenues will grow to $8.5bn by 2018, with ETC becoming a main source of funding for both Intelligent Transport Systems (ITS) and Vehicle-to-X (V2X) cooperative infrastructures, according to a new report from ABI Research (Chart 1). But, says the report’s author, ABI Research vice president and practice director Dom