Connected Car Security

Smarter Security for Smart Cars

Cars are changing. Smart cars, cars that adopted ICT for an easier and safer driving, are now being commercialized. Now, a car becomes a wheeled data center and the car manufacturer becomes a software developer. However, as more and more components of cars become connected to the Internet, risk will greatly widen. Hackers can remotely access and manipulate functions in the car including in-vehicle information systems, automatic braking systems, or even cutting off the engine while the vehicle is in transit.

Networks of Consideration for Connected Car Security

There are different networks that one needs to consider when thinking about car security – not simply within the vehicle in itself.

自動車

V2V = Vehicle-to-Vehicle:  

Through the Communication Control Unit (CCU), a car can communicate with another car to transfer traffic-related information, including traffic status. Communication between a car and a neighboring car helps to prevent car accidents in advance and allows the car to be driven in a more secure way through a temporary network, including roadside units and cars.

V2I : Vehicle-to-Infrastructure

With infrastructure, a smart car configures a traffic system. Through road-side units (RSUs) that communicate with cars, smart cars can configure a comprehensive network and be provided with various services. The RSU communicates with cars on the road to reduce traffic and provides drivers with a more agile navigation system. An Information Transportation System (ITS) is configured by integrating the elements of the existing traffic systems such as cars, RSUs, and roads and signaling systems. Through the ITS, the efficiency and safety of traffic can be enhanced dramatically.

V2D : Vehicle-to-Device

A driver can figure out the status of the car and which element should be maintained by using a smart device such as smartphone or tablet. In addition, he or she can even control the car remotely from that device.

The Need For a Solution

Threat to these networks pose a very real threat to human life. As car manufacturers roll out new features and update the code, they need to keep security at the forefront. This presents challengers for developers as the development lifecycle for cars takes long to complete. Vehicle programming also contains some of the most complicated coding in all computer technology.

At Penta Security, we saw the dangers and began work on researching security for exposed areas. Considering all gateways or points of access for the car and developing methods of securing the channels of communication via encryption, we also delved into public key infrastructure (PKI) to authenticate the many different endpoints . This comprehensive connected car security solution resulted in AutoCrypt.