Because of the increase in data for production, processing, and exchange, network security has become an important proposition in the development of autonomous vehicles.
Cars play a vital role in daily commuting and cargo transportation, and smart cars play an important role in our daily lives. Semi-automatic and fully automated vehicles have become a hot topic, with the UK, France and Switzerland testing autonomous vehicles on the road. Gartner, an information technology research and analysis firm, believes that by 2030, driverless cars will account for 25% of the automotive market.
Imagine that the highway is full of driverless cars, but such a bright future brings opportunities for cyber hackers. Given the increasing number of illegal cyber attacks and data theft in the past few years, ensuring drivers are protected from cyber threats has become a development focus and challenge for the automotive safety industry.
Driverless cars can even have no steering wheel, they have more electronic components than "traditional" cars, and rely on sensors, radar, GPS and various artificial intelligence to make automatic driving possible. These new electronic components and security systems must be integrated into the in-vehicle electronic system, connected to the manufacturer via a wireless network, and even provide third-party services over the Internet.
This is the origin of the cyber threat problem. Hackers can remotely access the vehicle and control an in-vehicle electronic system, resulting in a range of risks, including stealing user privacy and business data, and posing real threats to personal property.
Here are some of the possible cyber threats to self-driving cars:Increase access and inter-system dependencies: Not all in-vehicle systems and networks are built on the same architecture, and attackers look for the lowest-definition service vulnerabilities in the system, such as entertainment systems. And try to reach the more sensitive and advanced location of the car system through the in-vehicle network. For example, between the engine management system and the entertainment system, there are a small number of communication signals that can be utilized to display an alarm (such as "engine failure" or "active cruise start").
System Stability and Predictability: Traditional automotive systems are often independent and usually come from a single manufacturer. Automated car systems are scalable, and they are likely to need to work with a variety of software vendors (including open source software). Information technology is different from industrial control systems and is not well predictable. In fact, information technology often fails in an unpredictable way. For a website, the failure to restart the server can be tolerated, but if it happens in a car, the consequences are often more serious and difficult to accept. .
Just as known cyber threats adapt to new platforms, a variety of known cyber threats have expanded from ordinary laptops and smartphones to intelligently networked self-driving cars. E.g:
Blackmail software: Blackmail software is quite popular on both the computer and mobile phones, but a driverless car is a more ideal target. Imagine a scenario where a hacker informs the owner through a car monitor that his car is locked and only handed over. A ransom will allow the car to return to normal use. This threat makes it easier for laptops and mobile phones to recover without a significant loss, but it's a different matter for cars, and car owners may suffer a greater loss.
Of course, some auto repair shops will be familiar with such problems, and with the help of experts can reset the affected components. The repair price is not cheap, and the car may be towed away. The blackmail ransom is higher than the traditional computer ransomware, but it is cheaper than the related maintenance costs. How will the owner choose?
Spyware: Perhaps it is more attractive for hackers to collect your information through cars. A lot of information includes your favorite destination, travel route, home location and even who you are with. Imagine if a hacker knows that you are far away from home and sells this information to a criminal group, they can break into your home or steal your online account to empty your bank deposit.
There is also a risk that your unmanned connected car will likely become an electronic trading gateway, such as paying for your daily coffee or parking, or even paying for vehicle repairs. Sensitive personal information will be in the car, and the car becomes another vehicle that can capture your personal information. With the maturity of RFIDs (Radio Frequency Identification) and NFC (Near Field Communication Technology), hackers can use these technologies to obtain personal information about you and passengers.
Finally, it is still a question of legitimacy and reliability. Will we use the location information recorded by the vehicle as an accurate reference? In other words, if the vehicle record report says that you open the door one day, enter the car, and drive to a certain location, will we completely imagine the passage of everything based on this record? This issue needs to be taken seriously.
Similarly, if the software for a car is provided by several different suppliers, who should be responsible for the accident if a safety incident occurs? Is it a software defect? Or the fault of network management? Or is it the fault of the lack of training in the car?
In the final analysis, the question remains: How to make autonomous cars safer?The first step must be to give manufacturers a deeper understanding of potential cyber threats. Although manufacturers have extensive experience in car safety, they still have no experience dealing with hackers. Manufacturers and the Internet security industry can work together to win-win, and ISAC (Information Sharing and Analysis Center) is a precedent.
In the second step, whether to improve the user's driving experience or improve the performance of the car, when more and more technology is integrated into the car, the risks and threats must be weighed. Although there are no regulatory requirements, it is important to ensure that these technologies are properly and forcefully applied to the appropriate systems.
In addition, in many IoT devices, there is a growing problem: many devices use a common set of communication programs that do not have built-in security. The immediate consequence of this is that device data is extremely insecure. We need to establish a more robust network standard for autonomous vehicles than the current IoT.
At the same time, manufacturers must work with technology and communications providers to clarify the whereabouts of vehicle sales and ensure a stable and secure network connection to the vehicle.
Car safety can be divided into three different "domains", which in some cases can use similar techniques.
For internal communication, smart cars have several different in-vehicle control systems, such as car control systems, entertainment systems, passenger networks, and third-party systems that are loaded by the owner of the car. To some extent, these systems need to “communicate with each other†to provide new services, but these “communications†need to be built in close monitoring and control. The software responsible for detection and control has firewalls and intrusion prevention systems. Distinguish whether "communication" is normal and legal.
External communication, most in-vehicle systems require Internet-based service communication, such as maintenance, software updates, passenger networking, navigation, service requests, shopping, and backup data. External communication is two-way, which means that all data entering and leaving the vehicle needs to be checked and managed securely, with interception capabilities for illegal activities.
Communication between vehicles and service infrastructure is likely to be used by cellular networks such as 3G and 4G data services. While these data services already provide Internet services to billions of smartphones and other devices around the world, it is still difficult to avoid network hazards. Obviously, autonomous vehicles need a more complete cellular network. Otherwise, the current cellular network is used for data transmission. Once attacked by the network, it may cause tens of thousands of cars to be accidental. It is therefore necessary to ensure that the cellular network used for vehicle communication is sufficiently secure to avoid potential risks.
Finally, a highly secure identity and access control system needs to be designed for the machine. The vehicle itself monitors and screens information about critical systems entering and exiting the vehicle, and requests to log in to the cloud or transmit (such as fueling or paying) are subject to vehicle identity verification.
24W Interchangeable Power Adapter
24W Interchangeable Power Adapter,24V1A Interchangeable Power Adapter,Detachable Plug 12V2A Power Adapter,U L Cul Vi Switching Dc Adaptor
Guangdong Mingxin Power Technologies Co.,Ltd. , https://www.mxpowersupply.com