Cyber Security Technology To Protect Autonomous Vehicles

Vehicle automation aims to enhance people’s lives, by improving road capacity and simply freeing up time that would have been previously spent on driving. However, safety remains a challenging problem, and several incidents have proven just how important cyber security is to ensure physical safety, as vulnerabilities have previously allowed malefactors to take control of a car.

The communications infrastructure used in cars today (known as a Controller Area Network, or CAN) was mostluy designed  the 1980s and developed for exchanging information between different microcontrollers. Essentially, this comprises and out of date peer-to-peer network.

These networks weren’t built with security in mind, as it wasn’t then a key concern then but over time new functionality has been layered on top of existing functions, all connected to the CAN. This offers no access control or security features but instead leaves vehicle access potentially open to criminals.

In most known cases, bad actors have  exploited code mistakes, unintentionally left by developers. This can happen because modern vehicles are complex systems, making it hard to manage the security of all the components. Moreover, these systems are regularly updated, and it is important to ensure that changes in one component will not affect how a vehicle operates.

Solutions and services for securing vehicles with advanced driver-assistance system (ADAS) functionalities have been developed by Kaspersky, in collaboration with AVL SFR.

Kaspersky has announced the first successful integration of its new automotive KasperskyOS into an electronic control unit (ECU) of an ADAS, developed by AVL SFR. The holistic security solution is located at the level of the operating system and the controller is an open and customisable development platform for both prototype and series development. The secure operating system is designed to protect communications between ADAS components and to safeguard all the autonomous vehicle functions.   

Collaboration between smart car manufacturers and cybersecurity experts is essential to establish standards in this emerging discipline.

KasperskyOS provides strong separation between components, so any unwanted interference is not possible by default.
The interaction between all electronic components is controlled by the Kaspersky Security System, the security policy engine within KasperskyOS. It monitors the launch of processes, as well as communications between each component and with the operating system.

Kaspersky:        I-HLS:     Autonomoud Vehicle International

You Might Also Read: 

5G Will Reduce Car Accidents:

 

« Fake News & Democracy In The Philippines
US Companies Hit With A New Ransomware Campaign »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Webroot

Webroot

Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe.

Mega

Mega

Mega is a secure cloud data storage provider with browser-based high-performance end-to-end encryption.

Odix

Odix

Odix security software neutralizes file embedded targeted cyber attacks before they enter your organization’s network.

Wallix

Wallix

Wallix is a software company offering privileged access management solutions for enterprises, public organizations and cloud service providers

Atos

Atos

Atos provides a unique Cyber Security end to end solution with a data-centric and pre-emptive security approach.

Towergate Insurance

Towergate Insurance

Towergate Insurance is a leading UK specialist insurance broker. Business products include Cyber Liability Insurance.

CalCom

CalCom

CalCom Hardening Solution (CHS) for Microsoft OMS is a security baseline-hardening solution designed to address the needs of IT operations and security teams.

Merlin Cyber

Merlin Cyber

Merlin is a premier cybersecurity platform that leverages security technologies, trusted relationships, and capital to develop and deliver groundbreaking security solutions.

Block Armour

Block Armour

Block Armour is a Mumbai and Singapore based venture focused on harnessing emerging technologies to counter growing Cybersecurity challenges in bold new ways.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

Callsign

Callsign

Callsign’s mission is to seamlessly power the identification of every web, mobile and physical interaction.

Careerjet

Careerjet

Careerjet is a leading online job search engine with a large presence worldwide, sourcing millions of job ads from thousands of websites from all over the world in areas including Cybersecurity.

CyCognito

CyCognito

CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn't even know existed.

Borwell

Borwell

Borwell delivers software and IT solutions to the UK MoD and to UK Government departments, which are secure by design.

Centric Consulting

Centric Consulting

Centric Consulting is an international management consulting firm with unmatched expertise in business transformation, AI strategy, cyber risk management, technology implementation and adoption. 

Xiphera

Xiphera

Xiphera designs and implements proven cryptographic security for embedded systems.