Autonomous vehicles: What are the security risks?

With companies like Tesla and Google, we are beginning to see the first signs of a driverless future – and, according to some reports, self-driving…

Security Center of Excellence profile picture

Security Center of Excellence

May 1, 20192 minutes read

Descriptive text explaining the contents of the image.

With companies like Tesla and Google, we are beginning to see the first signs of a driverless future – and, according to some reports, self-driving cars are already here. But while autonomous vehicles are meant to make driving safer and less stressful, they also present a whole new range of security challenges — challenges that must be addressed long before these vehicles hit the road in large quantities.

Consider a futuristic scenario in which a transportation and logistics company has taken drivers out of the equation with self-driving trucks, thus saving millions on employment and insurance costs. What would happen if hackers breached the networks that connect and manage these trucks? They could deactivate key sensors and GPS features. They could drive trucks remotely to undisclosed locations, stealing both the vehicles and their contents. They could even threaten lives.

It may sound far off and far-fetched, but a scenario like this one is the precise reason enterprises must begin assessing the risks and evaluating solutions for their future Internet-connected and autonomous vehicles.

From a security standpoint, new in-vehicle connected technologies—including laser range finders, cameras, ultrasonic devices, wheel sensors, and inertial measurement systems—will all be access points for hackers. If even one of these potential points of compromise is not properly secured, then the entire operation could come crashing down.

In addition to these access points, data and communications flowing between vehicles, mobile devices and the various “things” they connect to will need their own information governance policies to ensure safety. A protected, centralized location in the cloud would likely function as the best interoperability structure for these communications.

As for hackers, one way to prevent breaches would be a centralized secure token service. This would protect the vehicle (and devices connected to the vehicle) each time an action is requested. This way, hackers would not only have to breach the network—they’d also have to compromise the token.

Creating a security infrastructure for autonomous vehicles, of course, is a difficult task when vehicle-to-vehicle and Internet of Things infrastructures have yet to mature. But considering the fact that today’s popular smartphones and mobile applications are routinely hacked, it would be wise for OEMs, suppliers and technology providers to collaborate on security measures before the autonomous vehicle goes mainstream —because the consequences of a hacked car could be the direst yet.

 

Share this post

Share this post to x. Share to linkedin. Mail to
Security Center of Excellence avatar image

Security Center of Excellence

See all posts

More from the author

Threat alerts

Threat alerts

December 2021 December 14, 2021: Log4j Summary: Top US cybersecurity officials have warned of the zero-day vulnerability found in the Java logging library Apache Log4j….

June 3, 2021 1 minute read
Lessons from the SolarWinds attack: How to protect your business

Lessons from the SolarWinds attack: How to protect your business

By the time it was discovered in December, the SolarWinds cyber attack had evaded the security defenses of and penetrated at least 18,000 government agencies,…

March 25, 2021 5 minutes read
The HAFNIUM Attack on the on-premises Microsoft Exchange Server

The HAFNIUM Attack on the on-premises Microsoft Exchange Server

On March 2, Microsoft announced that its on-premises Exchange Server had experienced multiple 0-day exploits. Microsoft commented: “In the attacks observed, the threat actor used…

March 18, 2021 3 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.