Skip to main content

Technologies to protect connected cars ‘not being utilised’

A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’. The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbe
August 10, 2016 Read time: 3 mins
A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’.

The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbee radio.

The white paper provides a metadata analysis of the many private vehicle security assessments IOActive has conducted since 2013 and includes an analysis of the impact, likelihood, overall risk and remediation of vulnerabilities IOActive consultants have discovered over the course of thousands of testing hours.

According to report author Corey Thuen, senior security consultant at IOActive, there are some idiosyncrasies between sub-categories of automotive and further between automotive and IoT or ICS/SCADA but, in general, these embedded computers are all using the same technologies under the hood. They all suffer from many of the same problems and challenges.

He continues, “The connected car is forcing automotive companies to become much more than automotive companies. They must now be database managers, cloud providers, enterprise network operators, etc., etc. Taking the car into the future means having to learn all of the lessons that Microsoft, Google, or Apple have learned over the past 15 years. The plus side, however, is that along the way these companies documented the bumps and bruises and now there are really great roadmaps and resources for implementing security.”

Jon Geater, chief technology officer, 596 Thales e-Security, said: “To help defend against certain cyber-attacks, and protect the integrity of the supply chain, connected components require clear authentication processes. While vehicle OEMs and their suppliers have recognised that cryptographically-based digital signatures provide the strongest form of authentication, this also necessitates the management and protection of certificates and the underlying keys. The rapid increase in connected components has created the need for broad-scale secure key management, supported by a public key infrastructure.

“Adding even further complexity, vehicle-to-vehicle and vehicle-to-infrastructure communications, although first introduced in 2017 production vehicles, will soon become the norm, requiring manufacturers to identify and implement the necessary technologies to protect drivers, passengers and the wider community from cyber-attackers.”

Thuen concludes, “The technologies needed to protect the connected car against cyber attack are already in existence, they just aren’t being utilised.”

For more information on companies in this article

Related Content

  • Wireless technology aids city-wide traffic management
    October 10, 2012
    An extensive hybrid communications network in the County of Los Angeles is proving the capability and benefits of modern wireless technology for traffic management across wide areas. Wireless communications technology has found a welcoming test bed for use in traffic management systems, in the County of Los Angeles. The county has long running programmes synchronizing and monitoring traffic signals over large areas. In the process, combined with installation of advanced traffic management systems (ATMS), th
  • Report: wireless technologies leave vehicles exposed to hackers
    February 11, 2015
    New standards are needed to plug security and privacy gaps in cars and trucks, according to a report by US Senator Edward J. Markey. The report, Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk and first reported on by CBS News’ 60 Minutes, reveals how sixteen major automobile manufacturers responded to questions from Markey in 2014 about how vehicles may be vulnerable to hackers, and how driver information is collected and protected. The responses from the automobile manufacturer
  • Report analyses multiple ITS projects to highlight cost and benefits
    March 16, 2015
    Every year in America cost benefit analysis is carried out on dozens of ITS installations and pilot studies and the findings, along with the lessons learned, are entered into the Department of Transportation’s (USDOT’s) web-based ITS Knowledge Resources database. This database holds more than 1,600 reports and periodically the USDOT reviews the material on file to draw conclusions from this wider body of evidence. It has just published one such review ITS Benefits, Costs, and Lessons Learned: 2014 Update Re
  • Industry collaboration ‘the key to avoiding autonomous driving traffic congestion’
    July 19, 2016
    A joint whitepaper published by Here and SBD argues that new levels of vehicle automation will increase traffic congestion in the foreseeable future and it's up to the automotive industry to enhance its collaboration in order to create a seamless transition as we reach these new levels of automation. According to co-author of the study, Andrew Hart, director at SBD, autonomous cars have the potential in the long-term to revolutionise mobility and radically improve the safety of our roads. However, the pa