Skip to main content

Technologies to protect connected cars ‘not being utilised’

A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’. The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbe
August 10, 2016 Read time: 3 mins
A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’.

The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbee radio.

The white paper provides a metadata analysis of the many private vehicle security assessments IOActive has conducted since 2013 and includes an analysis of the impact, likelihood, overall risk and remediation of vulnerabilities IOActive consultants have discovered over the course of thousands of testing hours.

According to report author Corey Thuen, senior security consultant at IOActive, there are some idiosyncrasies between sub-categories of automotive and further between automotive and IoT or ICS/SCADA but, in general, these embedded computers are all using the same technologies under the hood. They all suffer from many of the same problems and challenges.

He continues, “The connected car is forcing automotive companies to become much more than automotive companies. They must now be database managers, cloud providers, enterprise network operators, etc., etc. Taking the car into the future means having to learn all of the lessons that Microsoft, Google, or Apple have learned over the past 15 years. The plus side, however, is that along the way these companies documented the bumps and bruises and now there are really great roadmaps and resources for implementing security.”

Jon Geater, chief technology officer, 596 Thales e-Security, said: “To help defend against certain cyber-attacks, and protect the integrity of the supply chain, connected components require clear authentication processes. While vehicle OEMs and their suppliers have recognised that cryptographically-based digital signatures provide the strongest form of authentication, this also necessitates the management and protection of certificates and the underlying keys. The rapid increase in connected components has created the need for broad-scale secure key management, supported by a public key infrastructure.

“Adding even further complexity, vehicle-to-vehicle and vehicle-to-infrastructure communications, although first introduced in 2017 production vehicles, will soon become the norm, requiring manufacturers to identify and implement the necessary technologies to protect drivers, passengers and the wider community from cyber-attackers.”

Thuen concludes, “The technologies needed to protect the connected car against cyber attack are already in existence, they just aren’t being utilised.”

Related Content

  • May 22, 2015
    Advanced telematics and integration to revolutionise global connected car market
    Advanced infotainment systems, over-the-air (OTA) updates, big data analytics, mobility services and in-car security are key technologies that will shape the global connected car market in 2015. Human machine interface (HMI) input and output solutions, as well as, heads up display (HUD) are set to take centre stage. However, car makers must create consumer-centric HMI solutions that will strike a balance between reducing driver distraction and meeting consumer need for connected services. New analysis f
  • April 10, 2014
    Cellint measures speed and travel time without roadside infrastructure
    Collecting speed and travel time data without using roadside infrastructure could offer new possibilities to cash-strapped road authorities. Streaming video may be useful for traffic controllers to monitor incidents and automatic number plate recognition may be required for enforcement, but neither are necessary for many ITS functions. For instance travel times, tailbacks, percentage of vehicles turning, origin and destination analysis can all be done using Bluetooth and/or WI-Fi sensors and without video o
  • May 15, 2015
    USDOT ‘accelerating on V2V technology’
    The US Department of Transportation (US DOT) is accelerating its timetable on a proposed V2V rule that would require vehicle-to-vehicle equipment --technology that allows cars to ‘talk’ to one another-- in all new vehicles. V2V technology is a critical element of the connected automation that makes driverless cars as safe as possible. Writing in the USDOT Fastlane blog, Transportation Secretary Antony Foxx announced that he has directed the National Highway Transportation Safety Administration (NHTSA) t
  • June 21, 2019
    ‘Just 6%’ of transport companies can tackle cyberattacks, says Irdeto
    Transport companies are under concerted attack from hackers, according to security specialist Irdeto – and most don’t know how to respond. New research from the group says that 77% of organisations in transport and automotive have experienced an Internet of Things (IoT)-focused cyberattack in the past year – but only 6% “have what they need to combat cyberattacks”. The survey of 225 companies in China, Germany, Japan, UK and US found that the incursions had an impact on 91% of those which experience