Skip to main content

Technologies to protect connected cars ‘not being utilised’

A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’. The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbe
August 10, 2016 Read time: 3 mins
A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’.

The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbee radio.

The white paper provides a metadata analysis of the many private vehicle security assessments IOActive has conducted since 2013 and includes an analysis of the impact, likelihood, overall risk and remediation of vulnerabilities IOActive consultants have discovered over the course of thousands of testing hours.

According to report author Corey Thuen, senior security consultant at IOActive, there are some idiosyncrasies between sub-categories of automotive and further between automotive and IoT or ICS/SCADA but, in general, these embedded computers are all using the same technologies under the hood. They all suffer from many of the same problems and challenges.

He continues, “The connected car is forcing automotive companies to become much more than automotive companies. They must now be database managers, cloud providers, enterprise network operators, etc., etc. Taking the car into the future means having to learn all of the lessons that Microsoft, Google, or Apple have learned over the past 15 years. The plus side, however, is that along the way these companies documented the bumps and bruises and now there are really great roadmaps and resources for implementing security.”

Jon Geater, chief technology officer, 596 Thales e-Security, said: “To help defend against certain cyber-attacks, and protect the integrity of the supply chain, connected components require clear authentication processes. While vehicle OEMs and their suppliers have recognised that cryptographically-based digital signatures provide the strongest form of authentication, this also necessitates the management and protection of certificates and the underlying keys. The rapid increase in connected components has created the need for broad-scale secure key management, supported by a public key infrastructure.

“Adding even further complexity, vehicle-to-vehicle and vehicle-to-infrastructure communications, although first introduced in 2017 production vehicles, will soon become the norm, requiring manufacturers to identify and implement the necessary technologies to protect drivers, passengers and the wider community from cyber-attackers.”

Thuen concludes, “The technologies needed to protect the connected car against cyber attack are already in existence, they just aren’t being utilised.”

Related Content

  • December 30, 2022
    What does 2023 have in store for ITS?
    From VRUs to EVs, from customer experience to connected vehicles, here are some thoughts...
  • February 6, 2017
    LeddarTech partners with IDT to develop new LeddarCore IC for autonomous vehicles
    LeddarTech has teamed up with Integrated Device Technology to jointly develop the LeddarCore LCA2 integrated circuits, a receiver IC which is a key element within an automotive LiDAR system. This newest generation of LeddarCore IC enables solid-state implementations of high-performance, low-cost automotive LiDARs, which are required for the mass-market deployment of semi-autonomous and autonomous vehicles. As part of the agreement, IDT will leverage its expertise in component requirements analysis, archi
  • January 7, 2013
    IRF takes politicians to task on road safety
    The International Road Federation has issued a wake up call to government ministers, in the form of its Vienna Manifesto on ITS. Four years on from coming to a key decision on ITS, the International Road Federation (IRF) now faces a further question – how can it ensure its Vienna Manifesto on ITS achieves maximum impact? This is a challenge the organisation is not taking lightly. Issues the manifesto has been drawn up to address have become more acute in the time taken to publish it and are forecast to wors
  • August 23, 2018
    Here beats Google as world’s leading location platform, says Ovum
    Here Technologies has toppled Google as the world’s leading location platform, according to a new report. The Dutch mapping company’s price plan appears more developer-friendly and competitive than the Google Maps model, says analyst Ovum. Location Platform Index: Mapping and Navigation ranked 14 major location platform vendors according to their mapping and technology as well as the size of their reach across the developer communities and industries. Here’s Freemium model is intended to lower price