Cyber Security Technology To Protect Autonomous Vehicles

Vehicle automation aims to enhance people’s lives, by improving road capacity and simply freeing up time that would have been previously spent on driving. However, safety remains a challenging problem, and several incidents have proven just how important cyber security is to ensure physical safety, as vulnerabilities have previously allowed malefactors to take control of a car.

The communications infrastructure used in cars today (known as a Controller Area Network, or CAN) was mostluy designed  the 1980s and developed for exchanging information between different microcontrollers. Essentially, this comprises and out of date peer-to-peer network.

These networks weren’t built with security in mind, as it wasn’t then a key concern then but over time new functionality has been layered on top of existing functions, all connected to the CAN. This offers no access control or security features but instead leaves vehicle access potentially open to criminals.

In most known cases, bad actors have  exploited code mistakes, unintentionally left by developers. This can happen because modern vehicles are complex systems, making it hard to manage the security of all the components. Moreover, these systems are regularly updated, and it is important to ensure that changes in one component will not affect how a vehicle operates.

Solutions and services for securing vehicles with advanced driver-assistance system (ADAS) functionalities have been developed by Kaspersky, in collaboration with AVL SFR.

Kaspersky has announced the first successful integration of its new automotive KasperskyOS into an electronic control unit (ECU) of an ADAS, developed by AVL SFR. The holistic security solution is located at the level of the operating system and the controller is an open and customisable development platform for both prototype and series development. The secure operating system is designed to protect communications between ADAS components and to safeguard all the autonomous vehicle functions.   

Collaboration between smart car manufacturers and cybersecurity experts is essential to establish standards in this emerging discipline.

KasperskyOS provides strong separation between components, so any unwanted interference is not possible by default.
The interaction between all electronic components is controlled by the Kaspersky Security System, the security policy engine within KasperskyOS. It monitors the launch of processes, as well as communications between each component and with the operating system.

Kaspersky:        I-HLS:     Autonomoud Vehicle International

You Might Also Read: 

5G Will Reduce Car Accidents:

 

« Fake News & Democracy In The Philippines
US Companies Hit With A New Ransomware Campaign »

Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DataVantage

DataVantage

DataVantage data masking and data management software helps you prevent data breaches, pass compliance audits and meet regulatory requirements such as HIPAA and PCI DSS.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

Massive Alliance

Massive Alliance

Massive is a global service agency providing internet monitoring, data & security threat surveillance and reputation management.

herdProtect

herdProtect

herdProtect is a second line of defense malware scanning platform powered by 68 anti-malware engines in the cloud.

Suprema

Suprema

Suprema is a leading global provider of access control and biometrics solutions.

RIGCERT

RIGCERT

RIGCERT provides training, audit and certification services for multiple fields including Information Security.

NoLeak

NoLeak

The NoLeak DeepAuth platform uses scientific-proven techniques to learn the unique behaviors of online users and continuously authenticate them.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

M2M Intelligence

M2M Intelligence

M2M Intelligence is a global provider of secure, resilient IoT connectivity solutions.

SuperCom

SuperCom

SuperCom are a global secure solutions integrator and technology provider for governments and other consumers facing organizations around the world.