Skip to main content

Technologies to protect connected cars ‘not being utilised’

A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’. The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbe
August 10, 2016 Read time: 3 mins
A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’.

The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbee radio.

The white paper provides a metadata analysis of the many private vehicle security assessments IOActive has conducted since 2013 and includes an analysis of the impact, likelihood, overall risk and remediation of vulnerabilities IOActive consultants have discovered over the course of thousands of testing hours.

According to report author Corey Thuen, senior security consultant at IOActive, there are some idiosyncrasies between sub-categories of automotive and further between automotive and IoT or ICS/SCADA but, in general, these embedded computers are all using the same technologies under the hood. They all suffer from many of the same problems and challenges.

He continues, “The connected car is forcing automotive companies to become much more than automotive companies. They must now be database managers, cloud providers, enterprise network operators, etc., etc. Taking the car into the future means having to learn all of the lessons that Microsoft, Google, or Apple have learned over the past 15 years. The plus side, however, is that along the way these companies documented the bumps and bruises and now there are really great roadmaps and resources for implementing security.”

Jon Geater, chief technology officer, 596 Thales e-Security, said: “To help defend against certain cyber-attacks, and protect the integrity of the supply chain, connected components require clear authentication processes. While vehicle OEMs and their suppliers have recognised that cryptographically-based digital signatures provide the strongest form of authentication, this also necessitates the management and protection of certificates and the underlying keys. The rapid increase in connected components has created the need for broad-scale secure key management, supported by a public key infrastructure.

“Adding even further complexity, vehicle-to-vehicle and vehicle-to-infrastructure communications, although first introduced in 2017 production vehicles, will soon become the norm, requiring manufacturers to identify and implement the necessary technologies to protect drivers, passengers and the wider community from cyber-attackers.”

Thuen concludes, “The technologies needed to protect the connected car against cyber attack are already in existence, they just aren’t being utilised.”

For more information on companies in this article

Related Content

  • 2getthere calls for stricter AV regulations
    April 13, 2018
    Authorities will have to introduce strict regulations to ensure the safe introduction of autonomous vehicles (AVs) on public roads, according to a white paper published by Utrecht-based company 2getthere. Called Safety in Autonomous Transit, the report states that authorities should set more firm conditions on road safety, reliability and availability of these vehicles and also for the spatial planning of public areas where AVs operate. 2getthere highlights that governments will have to set tighter
  • Queensland extends emergency vehcile priority system
    December 18, 2014
    Following encouraging results from an initial small-scale trial of an emergency vehicle priority system in Queensland, Australia, the scheme is now being extended. In an emergency every second counts. Nowhere is this more graphically illustrated than by the survivability statistics for the time to cardiopulmonary resuscitation of pre-hospital cardiac arrest: at four minutes the survival rate is 22% but by 14 minutes the survival has dropped to 5% - as can be seen from the graph below. There is a similar tre
  • Evidence growing for distance-based charging
    January 18, 2012
    The case is growing for an alternative to fuel taxation for funding highway infrastructure. A more sustainable system of mileage-based charging can be established in a way that is acceptable to the travelling public, writes Jack Opiola. Fuel tax - the lifeblood relied on for 80 years to maintain and improve roads and transit systems - is now in considerable jeopardy in the United States. Increased vehicle fuel efficiency and a poor economy already hamper generation of fuel tax revenue; now a recent federal
  • Refurbishing ageing VMS with new technology
    January 26, 2012
    Virginia DoT faced a challenge common to many highway authorities around the world: the need, in economically challenging times, to replace ageing variable message signs reaching the end of their operational life. For some 25 years now, since the mid 80s, Virginia Department of Transportation (VDoT), has deployed variable message signs (VMS) as part of its motorist information systems. Throughout the state there are still many old 'flip-disk' signs. Some of the companies that provided these electronic messa