{"id":78083,"date":"2015-09-22T20:01:16","date_gmt":"2015-09-23T00:01:16","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2022-10-23T16:59:51","modified_gmt":"2022-10-23T20:59:51","slug":"how-safe-is-your-connected-car","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/how-safe-is-your-connected-car\/","title":{"rendered":"How Safe Is Your Connected Car?"},"content":{"rendered":"<p><a href=\"https:\/\/kaylahawk.deviantart.com\/art\/Crazy-Car-Computers-166768861\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-102804\" title=\"How Safe Is Your Connected Car?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/crazy_car_computers_by_kaylahawk1.jpg?resize=167%2C110&#038;ssl=1\" alt=\"How Safe Is Your Connected Car?\" width=\"167\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/crazy_car_computers_by_kaylahawk1.jpg?resize=150%2C99&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/crazy_car_computers_by_kaylahawk1.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/crazy_car_computers_by_kaylahawk1.jpg?resize=768%2C507&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/crazy_car_computers_by_kaylahawk1.jpg?w=900&amp;ssl=1 900w\" sizes=\"auto, (max-width: 167px) 100vw, 167px\" \/><\/a>There will be <strong>250 million<\/strong> wirelessly <strong>connected cars<\/strong> on the road by 2020 <a href=\"https:\/\/www.gartner.com\/newsroom\/id\/2970017\" target=\"_blank\" rel=\"noopener noreferrer\">according<\/a>\u00a0to <a title=\"Gartner\" href=\"https:\/\/www.gartner.com\/technology\/home.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Gartner<\/a> (<a title=\"NYSE : IT\" href=\"https:\/\/www.nyse.com\/quote\/XNYS:IT\" target=\"_blank\" rel=\"noopener noreferrer\">IT<\/a>). The technical prognosticators <a href=\"http:\/\/www.computerworld.com\/article\/2853775\/150m-passenger-cars-will-connected-to-the-internet-by-2020.html\" target=\"_blank\" rel=\"noopener noreferrer\">believe<\/a> that 60% &#8211; 75% of them will be capable of consuming, creating, and sharing Web-based data. In light of predictions like these and highly publicized car <strong><a href=\"https:\/\/web.archive.org\/web\/20210820084249\/https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/\" target=\"_blank\" rel=\"noopener noreferrer\">network attack<\/a><\/strong> demonstrations car need more security. <a title=\"Intel\" href=\"https:\/\/www.intel.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Intel<\/a> (<a title=\"NASDAQ : INTC\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-INTC\/\" target=\"_blank\" rel=\"noopener noreferrer\">INTC<\/a>) has established the <strong><a href=\"https:\/\/web.archive.org\/web\/20170226045306\/https:\/\/www-ssl.intel.com\/content\/www\/us\/en\/automotive\/automotive-security-review-board.html\" target=\"_blank\" rel=\"noopener noreferrer\">Automotive Security Review Board<\/a><\/strong> (ASRB) to help mitigate cyber-security risks associated with connected automobiles.<\/p>\n<p><a href=\"https:\/\/www.intel.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102806 size-thumbnail\" title=\"Intel logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/intel_old_logo-svg.png?resize=75%2C39&#038;ssl=1\" alt=\"Intel logo\" width=\"75\" height=\"39\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/intel_old_logo-svg.png?resize=75%2C39&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/intel_old_logo-svg.png?resize=150%2C78&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/intel_old_logo-svg.png?w=330&amp;ssl=1 330w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>An <strong>Intel<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20160113151656\/http:\/\/newsroom.intel.com:80\/community\/intel_newsroom\/blog\/2015\/09\/13\/intel-commits-to-mitigating-automotive-cybersecurity-risks\" target=\"_blank\" rel=\"noopener noreferrer\">presser<\/a>\u00a0says ASRB researchers will do ongoing <strong>security tests<\/strong> and audits. They will codify <strong>best practices<\/strong> and design recommendations for advanced cyber-security solutions and products. Intel will publish automotive cyber-security best practices white papers, which the company will update based on ASRB findings. <a href=\"https:\/\/www.linkedin.com\/pub\/christopher-young\/0\/39\/43\" target=\"_blank\" rel=\"noopener noreferrer\">Chris Young<\/a>, senior vice president, and general manager of Intel Security said in the presser.<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em>We can, and must, raise the bar against cyberattacks in automobiles \u2026 Few things are more personal than our safety while on the road, making the ASRB the right idea at the right time.<\/em><\/p>\n<h3>Secure car networks<\/h3>\n<p>It is the right time to secure the networks in cars. A study released by Atlanta-based <a href=\"http:\/\/www.ptclwg.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">PT&amp;C|LWG Forensic Consulting Services<\/a>\u00a0looked at what made <strong>cars vulnerable to attacks<\/strong>.<br \/>\nRobert Gragg, a forensic analyst with PT&amp;C|LWG <a href=\"https:\/\/web.archive.org\/web\/20170813224654\/http:\/\/www.csoonline.com:80\/article\/2983726\/hacktivism\/study-names-the-five-most-hackable-vehicles.html\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> <em><a href=\"http:\/\/www.csoonline.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSO<\/a><\/em> cars with the highest risk of cyber threat tended to have the most features networked together, especially where <strong>radio or Wi-Fi networks are connected to physical components of vehicles<\/strong>.<\/p>\n<p><a href=\"http:\/\/www.rcrwireless.com\/20140626\/carriers\/ltews-vibe-make-telematics-sexy-change-name-connected-cars\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102808\" title=\"radio or Wi-Fi networks are connected to physical components of vehicles\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/connected_car-e1567433942982-137x150.jpg?resize=100%2C109&#038;ssl=1\" alt=\"radio or Wi-Fi networks are connected to physical components of vehicles\" width=\"100\" height=\"109\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/connected_car-e1567433942982.jpg?resize=137%2C150&amp;ssl=1 137w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/connected_car-e1567433942982.jpg?resize=69%2C75&amp;ssl=1 69w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/connected_car-e1567433942982.jpg?w=274&amp;ssl=1 274w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>Today&#8217;s modern automobile uses between <strong>20 and 70 computers<\/strong>, each with its own specialized use. The article explains that <strong>engine control units<\/strong> oversee a wide array of electronic sensors and actuators that regulate the engine and maintain optimal performance. Vehicle manufacturers use the generic term &#8220;electronic control units&#8221; (ECUs) to describe the myriad of computers that manage various vehicle functions.<\/p>\n<p>For example, the author says ECUs control <strong>vehicle safety functions, such as antilock brakes and proximity alerts<\/strong>. The ECU which governs climate control systems receives temperature data from sensors inside the cabin and uses that to adjust airflow, heating, and cooling.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20201027115803\/https:\/\/www.edgefx.in\/importance-of-embedded-systems-in-automobiles-with-applications\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-102810 size-full\" title=\"modern automobile uses between 20 and 70 computers\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/computers_in_cars.png?resize=300%2C186&#038;ssl=1\" alt=\"modern automobile uses between 20 and 70 computers\" width=\"300\" height=\"186\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/computers_in_cars.png?w=300&amp;ssl=1 300w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/computers_in_cars.png?resize=75%2C47&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/computers_in_cars.png?resize=150%2C93&amp;ssl=1 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<h3>What is a controller area network<\/h3>\n<p>Typically, all of a vehicle&#8217;s computer systems can be accessed over a vehicle&#8217;s <strong>controller area network<\/strong> (CAN) via the radio head unit, a computerized system that runs a car&#8217;s or truck&#8217;s communications and entertainment system.<\/p>\n<p><a href=\"https:\/\/betanews.com\/2015\/07\/10\/hacking-collectives-target-major-firms-for-profit\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-102812\" title=\"firmware can be used to compromise the vehicle\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers_three-e1567433789335-150x124.jpg?resize=121%2C100&#038;ssl=1\" alt=\"firmware can be used to compromise the vehicle\" width=\"121\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers_three-e1567433789335.jpg?resize=150%2C124&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers_three-e1567433789335.jpg?resize=75%2C62&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers_three-e1567433789335.jpg?w=236&amp;ssl=1 236w\" sizes=\"auto, (max-width: 121px) 100vw, 121px\" \/><\/a>Many of today&#8217;s modern vehicles can be accessed via <strong>cellular, Bluetooth, or even WiFi connectivity<\/strong>. While no easy task, the <em>CSO<\/em> article says, once a hacker gains access to the vehicle&#8217;s head unit, its <strong>firmware can be used to compromise<\/strong> the vehicle&#8217;s CAN, which speaks to all the ECUs. Then it\u2019s just a matter of discovering which CAN messages can control various vehicle functions.<\/p>\n<h3>Car attacks<\/h3>\n<p>These attacks can happen at a distance. PT&amp;C|LWG study estimated minimum distances from which a vehicle could be hacked according to the wireless communication protocol it is using.\u00a0For example, a passive\u00a0<strong>anti-theft system<\/strong>\u00a0could be access from 10 meters, a radio data system (or radio head unit) could be hacked from 100 meters, a Bluetooth system could be accessed from 10 meters, a\u00a0<strong>smart key<\/strong> from five to 20 meters, and a vehicle equipped with Wi-Fi\u2026 well, it could be hacked from\u00a0<strong>anywhere there\u2019s Internet access <\/strong>(<em><strong>rb-<\/strong>\u00a0I wrote about this vulnerability in\u00a0<a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/hackers-can-target-cars\/\" target=\"_blank\" rel=\"noopener noreferrer\">2011<\/a><\/em>).<\/p>\n<p>That may be a problem. Increasingly, carmakers are coming out with vehicles that include Wi-Fi routers for Internet connectivity. PT&amp;C|LWG\u2019s Gragg said.<\/p>\n<p style=\"padding-left: 40px;\"><em>In more advanced vehicles \u2014 the ones that have infotainment systems \u2014 wireless security and wireless access points are all connected into the navigation system. So those are more susceptible to hacking because there are just more wireless access points \u2026 Anything open to wireless capabilities is susceptible to the hacking.<\/em><\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>In May, both\u00a0<strong>General Motors<\/strong>\u00a0(<a href=\"http:\/\/www.usatoday.com\/story\/money\/cars\/2015\/09\/17\/gm-justice-department-ignition-switch-defect-settlement\/32545959\/\" target=\"_blank\" rel=\"noopener noreferrer\">of\u00a0<strong>ignition switch cover-up<\/strong>\u00a0<\/a>infamy) and the\u00a0<strong><a href=\"http:\/\/www.autoalliance.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Auto Alliance<\/a><\/strong>, the car maker\u2019s\u00a0lobbyist,\u00a0<a href=\"http:\/\/www.slate.com\/blogs\/future_tense\/2015\/05\/22\/gm_and_john_deere_say_they_still_own_the_software_in_cars_customers_buy.html\" target=\"_blank\" rel=\"noopener noreferrer\">testified against<\/a>\u00a0a proposed exemption in copyright law that would allow third-party researchers to get access to vehicle software. A decision in that matter could come any day from the U.S. Copyright Office.<\/em><\/p>\n<p><em><a href=\"https:\/\/web.archive.org\/web\/20210414105321\/https:\/\/www.pophistorydig.com\/topics\/g-m-ralph-nader1965-1971\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Ralph Nader\" src=\"https:\/\/i0.wp.com\/www.pophistorydig.com\/wp-content\/uploads\/2013\/02\/People-mag-1-300.jpg?resize=123%2C161\" alt=\"Ralph Nader\" width=\"123\" height=\"161\" \/><\/a>The Auto Alliance has also threatened to run to Congress should the\u00a0<a href=\"http:\/\/www.copyright.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">Copyright Office<\/a>\u00a0rule in favor of the researchers to <b>cover up<\/b>\u00a0threats to the consumer, like\u00a0<strong><a href=\"http:\/\/www.cnbc.com\/2015\/09\/21\/volkswagen-stock-drops-20-on-us-diesel-recall-probe.html\" target=\"_blank\" rel=\"noopener noreferrer\">Volkswagen<\/a><\/strong>\u00a0and GM. The\u00a0<strong>lobbying group<\/strong>\u00a0calls legitimate researchers attackers in a letter to a\u00a0<a href=\"https:\/\/www.autoblog.com\/2015\/05\/29\/car-hacking-threats-congressional-scrutiny\/\" target=\"_blank\" rel=\"noopener noreferrer\">Congressional subcommittee<\/a>\u00a0investigating the auto industry\u2019s ability to thwart cyber attackers; \u201cAutomakers are facing pressure from the organized efforts of technology pirates and anti-copyright groups to allow the circumvention of protected onboard networks, and to give hackers with the right to attack vehicles carte blanche under the auspices<\/em>\u00a0of research\u201d.<\/p>\n<p><em>This would set a dangerous precedent for devices connected to the\u00a0<a href=\"http:\/\/techcrunch.com\/2015\/01\/31\/how-connected-cars-have-established-a-new-ecosystem-powered-by-iot\/\" target=\"_blank\" rel=\"noopener noreferrer\">Internet of Things<\/a> (IoT) to be unregulated. If the automakers are successful in their\u00a0<a href=\"https:\/\/www.autoblog.com\/2015\/04\/20\/automakers-gearheads-car-repairs\/\" target=\"_blank\" rel=\"noopener noreferrer\">DMCA claims<\/a>, it would be deadly for everyone on the road too.\u00a0<\/em><\/p>\n<p><em>Who remembers \u201c<strong><a href=\"http:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC3020193\/\" target=\"_blank\" rel=\"noopener noreferrer\">Unsafe At Any Speed<\/a><\/strong>\u201c?<\/em><\/p>\n<p><em>\u00a0<\/em><a href=\"https:\/\/web.archive.org\/web\/20161222115001\/http:\/\/www.ptclwg.com\/news\/the-most-hackable-cars-on-the-road-1\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-102800\" title=\"PT&amp;C|LWG infographic\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackable-cars.png?resize=253%2C2590&#038;ssl=1\" alt=\"PT&amp;C|LWG infographic\" width=\"253\" height=\"2590\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackable-cars.png?resize=100%2C1024&amp;ssl=1 100w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackable-cars.png?zoom=2&amp;resize=253%2C2590&amp;ssl=1 506w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackable-cars.png?zoom=3&amp;resize=253%2C2590&amp;ssl=1 759w\" sizes=\"auto, (max-width: 253px) 100vw, 253px\" \/><\/a>Related articles<\/p>\n<ul>\n<li><a href=\"http:\/\/www.zdnet.com\/article\/most-will-connect-to-an-insecure-wi-fi-hotspot-if-its-free-study\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Most will connect to an unsecured Wi-Fi hotspot if its free: study<\/a>\u00a0(zdnet.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Automakers want federal regulations to cover up dangerous connected car flaws by claiming protection under the 1988 Digital Millennium Copyright Act (DMCA).<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[3277,2170,2545,2547,1189,2544,2546,2548,2021,241,67,944,1788,2542,2543,579],"class_list":["post-78083","post","type-post","status-publish","format-standard","hentry","category-cars","tag-3277","tag-attack","tag-audi","tag-auto-alliance","tag-bluetooth","tag-connected-cars","tag-dmca","tag-electronic-control-units","tag-ford","tag-gm","tag-hack","tag-iot","tag-jeep","tag-ralph-nader","tag-volkswagen","tag-wi-fi-2"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/78083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=78083"}],"version-history":[{"count":25,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/78083\/revisions"}],"predecessor-version":[{"id":132651,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/78083\/revisions\/132651"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=78083"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=78083"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=78083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}