• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Malware  /  Dealing with cybersecurity threats in the age of autonomous vehicles
Dealing with cybersecurity threats in the age of autonomous vehicles
06 November 2019

Dealing with cybersecurity threats in the age of autonomous vehicles

Written by Seqrite
Seqrite
Malware

In 2015, security researchers Charlie Miller and Chris Valasek remotely took control of a Jeep Cherokee vehicle as an experiment. By exploiting vulnerabilities in the vehicle’s Internet-connected entertainment and navigation systems, the two researchers activated the windshield wipers, turned on the radio and even turned off the engine in the middle of the highway. It was a frightening experiment which compelled automotive major Fiat Chrysler to recall 1.4 million cars. This remote hijack was also a reminder that as vehicles become more connected and autonomous, their cybersecurity risks will only grow.

The different levels of automation

The Society of Automotive Engineers (SAE), a US-based organization which defines standards in automotives, classifies autonomous vehicles into five different levels, based on the level of autonomy. Fully autonomous vehicles are categorized as Level 5 and are defined as a level of automation where the steering wheel is optional and no human intervention is required whatsoever.

While most automotive experts agree that Level 5 vehicles are still far into the future, the cybersecurity aspects of how these vehicles will operate cannot be ignored. Already, vehicles nowadays have some level of automation, whether it is through cruise control, parking assistance, lane assist or GPS features. Cars are getting increasingly connected to each other over wider networks more than ever before. This dependence will only increase as humanity progresses towards the first fully autonomous vehicle.

Troubling scenarios

Security experts have warned of potentially disastrous repercussions if cybercriminals start taking disadvantage of autonomous vehicles at scale. A few scenarios that have been hypothetically put forward include:

  • Criminals gaining access to autonomous vehicles through backdoors and vulnerabilities in the vehicle’s operating system and remotely controlling them
  • In a fully autonomous world, cars will be connected to each other and also to a wider transport system regulating transportation of an entire city or region. If cybercriminals hack into the transport system, they can bring down entire transport networks, causing extensive damage
  • Data theft is also a lucrative industry for automotive and the advent of autonomous cars would lead to a rise of such vehicles being targeted for data misuse

As research continues on autonomous vehicles, the levels of cybersecurity threats that will be needed to deal with will only become clearer. But cybersecurity experts have already started working on recommendations on the aspects that will need to be kept in mind.

Regulations and standards

To ensure that autonomous vehicles are not caught out by cybersecurity threats, it is imperative that automotive bodies and cybersecurity enterprises start working together to create regulations and standards. Encouragingly enough, some developments are happening in this regard – a new automotive cybersecurity standard, ISO/SAE 21434 is currently under development and could be published as early as 2020. Concurrently, the World Forum for Harmonization of Vehicle Regulations (WP.29) is also working on regulatory proposals for vehicles.

Invest in R&D for securing FOTA updates

Most of the latest automotive models have operating systems providing infotainment and other features. In the near future, autonomous vehicles will run completely on software systems which will receive regular updates, like mobile devices and operating systems. However, it is imperative that automotive companies start investing in research & development to ensure that these Firmware Over The Air (FOTA) updates take place in a secure framework.

Understand the unique security requirements of autonomous vehicles

Autonomous vehicles will need unique security requirements which will differ from the requirements for mobile devices or enterprise security. As an example, autonomous vehicles will require seamless vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. At the same time, these communications need to be encrypted to prevent unauthorized access which will necessitate ultra-fast cryptography solutions.

Cybersecurity as part of the entire manufacturing process

Automotive manufacturing is an extended process with many suppliers working on different aspects of the vehicle. When it comes to the manufacture of autonomous vehicles, cybersecurity will need to be an integral part of the entire manufacturing process. All aspects of the supply chain must be on the same page to ensure that the final product is safe and secure.

Whether it’s Google, Ford, Mercedes-Benz or Uber, the world’s biggest technology companies have stated serious research and testing on autonomous vehicles. While the era of the fully autonomous car may still be a while away, it is important that cybersecurity remains a core component of this research to ensure that the end-user gets the most secure experience.

Get in touch if you would like for us to assess the cybersecurity posture of your business.

 Previous PostHackers bypass UTM user credentials with simple Shell Scripts
Next Post  The cybersecurity threats drones face and how to mitigate them
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • SnakeKeylogger: A Multistage Info Stealer Malware Campaign

    March 25, 2025
  • SVC New Stealer on the Horizon

    March 21, 2025
  • 5th January and The Tale of Joshi Virus: India’s First Global Computer Virus

    December 26, 2024
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies