Cyber Security Technology To Protect Autonomous Vehicles

Vehicle automation aims to enhance people’s lives, by improving road capacity and simply freeing up time that would have been previously spent on driving. However, safety remains a challenging problem, and several incidents have proven just how important cyber security is to ensure physical safety, as vulnerabilities have previously allowed malefactors to take control of a car.

The communications infrastructure used in cars today (known as a Controller Area Network, or CAN) was mostluy designed  the 1980s and developed for exchanging information between different microcontrollers. Essentially, this comprises and out of date peer-to-peer network.

These networks weren’t built with security in mind, as it wasn’t then a key concern then but over time new functionality has been layered on top of existing functions, all connected to the CAN. This offers no access control or security features but instead leaves vehicle access potentially open to criminals.

In most known cases, bad actors have  exploited code mistakes, unintentionally left by developers. This can happen because modern vehicles are complex systems, making it hard to manage the security of all the components. Moreover, these systems are regularly updated, and it is important to ensure that changes in one component will not affect how a vehicle operates.

Solutions and services for securing vehicles with advanced driver-assistance system (ADAS) functionalities have been developed by Kaspersky, in collaboration with AVL SFR.

Kaspersky has announced the first successful integration of its new automotive KasperskyOS into an electronic control unit (ECU) of an ADAS, developed by AVL SFR. The holistic security solution is located at the level of the operating system and the controller is an open and customisable development platform for both prototype and series development. The secure operating system is designed to protect communications between ADAS components and to safeguard all the autonomous vehicle functions.   

Collaboration between smart car manufacturers and cybersecurity experts is essential to establish standards in this emerging discipline.

KasperskyOS provides strong separation between components, so any unwanted interference is not possible by default.
The interaction between all electronic components is controlled by the Kaspersky Security System, the security policy engine within KasperskyOS. It monitors the launch of processes, as well as communications between each component and with the operating system.

Kaspersky:        I-HLS:     Autonomoud Vehicle International

You Might Also Read: 

5G Will Reduce Car Accidents:

 

« Fake News & Democracy In The Philippines
US Companies Hit With A New Ransomware Campaign »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Council of Europe - Cybercrime Programme Office (C-PROC)

Council of Europe - Cybercrime Programme Office (C-PROC)

The Cybercrime Programme Office of the Council of Europe is responsible for assisting countries worldwide in strengthening their legal systems capacity to respond to cybercrime

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

Vera Security

Vera Security

Vera is a data security platform that provides 360-degree visibility and control over critical business data, anywhere it's shared or stored.

Inspired eLearning

Inspired eLearning

Inspired eLearning deliver solutions that help clients nurture and enhance workforce skills, protect themselves against cyberattacks and regulatory violations.

DG Technology

DG Technology

DG Technology is a customer-centric technology expert and business consultant that delivers services and products to minimize your information security, compliance, and business risks.

Data443 Risk Mitigation

Data443 Risk Mitigation

Data443 Risk Mitigation provides next-generation cybersecurity products and services in the area of data security and compliance.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

Ackcent Cybersecurity

Ackcent Cybersecurity

Ackcent's mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialised professional services.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

DataFleets

DataFleets

DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance.

Tego Cyber

Tego Cyber

Tego Cyber delivers a state-of-the-art threat intelligence platform that helps enterprises deploy the proper resolution to an identified threat before the enterprise is compromised.

Proaxiom

Proaxiom

Proaxiom are focused on erasing cyber driven panic paralysis for Small and Medium Enterprises through brilliant cyber technologies which drive productivity and support growth.

Sage IT

Sage IT

Sage IT offer a wide range of professional and consulting services to help organizations overcome the challenges of today's ever-changing business environment.

Yondu

Yondu

Yondu empowers businesses across various industries through a wide array of innovative technology solutions to help them scale in the new digital economy.

New Relic

New Relic

After inventing application performance monitoring (APM), New Relic stands at the forefront of observability with the most advanced platform for eliminating digital interruptions.

Keystrike

Keystrike

Keystrike secures remote connections. Our technology ensures that commands made by an employee were physically made on their computer, rather than by a remote attacker.