Cars play a vital role in daily commuting and cargo transportation. Smart cars are playing an important role in our everyday life. Semi-automatic and fully automatic cars have become a hot topic, with the UK, France and Switzerland already testing autonomous vehicles on the road. Information technology research and analysis company Gartner believes that by 2030, driverless cars will occupy 25% of the automotive market. Imagine that all high-speed roads are driverless cars, but this beautiful future will bring opportunities for cyberhackers. In view of the increasing number of illegal cyber attacks and theft of data in the past few years, ensuring drivers’ protection from cyber threats has become a development focus and challenge for the automotive safety industry. Driverless cars can even be without a steering wheel, they have more electronic components than "traditional" cars, and rely on sensors, radar, GPS and various artificial intelligence to make automatic driving possible. These new electronic components and security systems must be integrated into the on-board electronics system, connected to manufacturers via wireless networks, and even provide third-party services over the Internet. This is the origin of the cyber threat problem. Hackers can remotely access vehicles and control a certain onboard electronic system, leading to a series of risks, including the theft of user privacy and business data and the actual threat to personal and property. Self-driving car network security Here are some possible cyber threats in self-driving cars: Improve access rights and system interdependence: Not all on-board systems and networks are built on the same architecture, and attackers will look for the lowest defenses in the system, such as entertainment systems. And try to reach the on-board system through the in-vehicle network more sensitive to the advanced location. For example, between the engine management system and the entertainment system, there are few communication signals that can be utilized to display alarms (such as "engine failure" or "active cruise start"). System Stability and Predictability: Traditional automotive systems tend to be independent and often come from a single manufacturer. The systems of self-driving cars are scalable, and they are likely to need to work with a variety of software vendors (including open source software). Information technology is different from industrial control systems and it is not very predictable. In fact, information technology often fails in an unpredictable way. For a website, this failure can be tolerated when the server is restarted. However, if it occurs in the car, the consequences are often more serious and difficult to accept. . Just as known cyber threats adapt to new platforms, various known cyber threats have expanded from ordinary laptops and smart phones to intelligently networked self-driving cars. E.g: Extortion software: Extortion software is prevalent on both computers and mobile phones, but a driverless car is a more desirable goal. Imagine a scenario where a hacker informs the owner through an on-board monitor that his car has been locked. A ransom can restore the car to normal use. This threat can be recovered more easily for laptops and mobile phones without significant loss, but this is a different matter for cars, and car owners may suffer even greater losses. Of course, some car repair shops will be familiar with solving such problems and with the help of experts can reset the affected components. The repair price is not cheap, and the car may still be towed away. While ransom ransom is higher than traditional computer ransomware, it is cheaper than the related maintenance fees. What will the owner choose? Spyware: Perhaps it's more attractive for hackers to collect your information through the car. A lot of information includes your favorite destination, travel route, place of residence and even who you are with. Imagine if hackers learned that you were away from home and sold this information to a criminal group, they could break into your home or use your online account to empty your bank account. There is also a risk that your unmanned connected car will likely become an electronic transaction gateway, such as paying for coffee or parking for you every day, or even paying for vehicle maintenance. Sensitive personal information will be in the car, and the car will become another carrier that can get your personal information. As RFIDs (Radio Frequency Identification Technology) and NFC (Near Field Communication Technology) mature, hackers can use these technologies to obtain personal information data for you and passengers. The last point is still the issue of legality and reliability. Will we use the location information recorded by the vehicle as an accurate reference? In other words, if the vehicle records a report saying that you opened the door on a certain day, entered the car, and drove to a certain location, would we completely imagine the passage of all things based on this record? This issue needs attention. Similarly, if a car's software is provided by several different suppliers, who should be responsible for the accident if there is a security incident? Is it a software defect? Or the fault of network management? Or is it the lack of training in the car? In the final analysis, the question remains: How to make autonomous vehicles more secure? The first step must be to make manufacturers more aware of potential cyber threats. Although manufacturers have extensive experience in vehicle safety, they still do not have to deal with the experience of cyberhackers. The cooperation between manufacturers and the Internet security industry can be a win-win situation. ISAC (Information Sharing and Analysis Center) is a precedent. The second step, whether it is to improve the user's driving experience or improve the performance of the car, when more and more technologies are integrated into the car, the risks and threats that exist are weighed. Although there are no regulatory requirements, it is also necessary to ensure that these technologies are correctly applied to the corresponding systems. In addition, in many IoT devices, there is a growing problem: many devices use a common set of communications programs, and this set of programs does not have built-in security. The direct consequence of this is that device data is extremely insecure. We need to establish a more robust network standard for self-driving cars than the current Internet of Things. At the same time, manufacturers must cooperate with various technology and communication suppliers to clarify the whereabouts of vehicle sales and ensure that the network connection with the vehicles is stable and secure. Car safety can be divided into three different “domains†that can use similar technologies in certain situations. Internal communications, smart cars will have several different on-board control systems, such as car control systems, entertainment systems, passenger networks, and third-party systems that are loaded by the owner’s personal needs. To some extent, these systems need to “communicate with each other†to provide new services, but these “communications†need to be established in close monitoring and control. The software responsible for detection and control has firewalls and intrusion prevention systems. They can Distinguish whether "communication" is normal and legal. For external communications, most on-board systems require Internet-based service exchanges such as maintenance, software updates, passenger networking, navigation, service requests, shopping, and backup data. External communications are two-way, which means that all data coming in and going out of the vehicle needs to be checked and managed safely, and interception is required for illegal activities. The communication between the vehicle and the service infrastructure is likely to use cellular networks such as 3G and 4G data services. Although these data services have provided Internet services for billions of smart phones and other devices in the world, it is still difficult to avoid network harm. Obviously, self-driving cars need a more complete cellular network. Otherwise, using the current cellular network for data transmission can cause tens of thousands of cars to be accidental when attacked by the network. Therefore, it must be ensured that the cellular network used for vehicle communication is sufficiently safe to avoid potential risks. Finally, there is a need to design a highly secure identification and access control system for the machine. The vehicle itself monitors and screens information coming in and out of the vehicle's critical system, and the owner's identity is verified by logging into the cloud or sending a request (such as refueling or paying). Commercial Nebulizer,Big Nebulizer For Commerical,Big Nebulizer ,Big Nebulizer Machine Ningbo Glory King Imp&Exp Co., Ltd. , https://www.nbglory.com
What are the dangers when talking about safe driving in cyberspace?