Skip to main content

Technologies to protect connected cars ‘not being utilised’

A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’. The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbe
August 10, 2016 Read time: 3 mins
A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’.

The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbee radio.

The white paper provides a metadata analysis of the many private vehicle security assessments IOActive has conducted since 2013 and includes an analysis of the impact, likelihood, overall risk and remediation of vulnerabilities IOActive consultants have discovered over the course of thousands of testing hours.

According to report author Corey Thuen, senior security consultant at IOActive, there are some idiosyncrasies between sub-categories of automotive and further between automotive and IoT or ICS/SCADA but, in general, these embedded computers are all using the same technologies under the hood. They all suffer from many of the same problems and challenges.

He continues, “The connected car is forcing automotive companies to become much more than automotive companies. They must now be database managers, cloud providers, enterprise network operators, etc., etc. Taking the car into the future means having to learn all of the lessons that Microsoft, Google, or Apple have learned over the past 15 years. The plus side, however, is that along the way these companies documented the bumps and bruises and now there are really great roadmaps and resources for implementing security.”

Jon Geater, chief technology officer, 596 Thales e-Security, said: “To help defend against certain cyber-attacks, and protect the integrity of the supply chain, connected components require clear authentication processes. While vehicle OEMs and their suppliers have recognised that cryptographically-based digital signatures provide the strongest form of authentication, this also necessitates the management and protection of certificates and the underlying keys. The rapid increase in connected components has created the need for broad-scale secure key management, supported by a public key infrastructure.

“Adding even further complexity, vehicle-to-vehicle and vehicle-to-infrastructure communications, although first introduced in 2017 production vehicles, will soon become the norm, requiring manufacturers to identify and implement the necessary technologies to protect drivers, passengers and the wider community from cyber-attackers.”

Thuen concludes, “The technologies needed to protect the connected car against cyber attack are already in existence, they just aren’t being utilised.”

Related Content

  • June 28, 2018
    Harnessing the power of smart technology
    Keeping the public safe in a changing world requires smart thinking and sensible deployment of technology. Peter Jones of Hitachi Europe examines some available options From human threats, such as terrorism, to digital threats like hacking, the growing sophistication of crime is posing serious challenges to public safety. At the same time, mass urbanisation threatens to exacerbate these problems as there are more people to keep safe. According to a new whitepaper from Hitachi and Frost & Sullivan, Public
  • September 7, 2017
    Ricardo and Roke Manor to collaborate on next-generation vehicle cyber security
    International technology company Ricardo is to join forces with cyber security specialist Roke Manor Research to develop solutions that will make autonomous and connected transport robust against cyber attack. Many of today’s new vehicles are already connected over the air for telematics and maintenance, for safety systems such as eCall, by consumers using insurance-based monitoring technology, and by the many smartphone apps available to vehicle owners.
  • June 8, 2018
    SafeRide and Irdeto partner on cybersecurity for C/AVs
    Cybersecurity company SafeRide Technologies Ltd and Dutch firm Irdeto have launched a solution to help original equipment manufacturers and Tier-1 suppliers protect connected and autonomous vehicles (C/AVs). Called Vsentry, the device combines network security with software security of the engine control unit to allow users to detect anomalies and respond to attacks. Vsentry uses an artificial intelligence engine and provides multi-layer protection for securing the connectivity perimeter and the in-vehi
  • September 4, 2013
    Nokia sells device business to Microsoft, but retains Here
    Nokia Corporation has signed an agreement to sell substantially all of its devices and services business and licence its patents to Microsoft for US$7.1 billion in cash, payable at closing. Following the transaction, Nokia plans to focus on its three established businesses: NSN network infrastructure and services; Here mapping and location services; and Advanced Technologies technology development and licensing.