18 Jun 2022

423

Security Essentials On car Hacking

Format: APA

Academic level: University

Paper type: Essay (Any Type)

Words: 547

Pages: 2

Downloads: 0

Sophisticated cars are built to offer convenience to their drivers, but at the same time, hackers are given a new challenge. The thought of having your car's security breached and someone controlling it remotely can seem like a scene out of a sci-fi movie. However, car hacking and data breaches have been in existence since 2005 (Jensen, 2016). In 2019 alone, the number of carjacking incidences through technology doubled from the previous year's figure (Greenberg, 2017). The rate at which car manufacturers are installing connectivity without improving security measures or creating awareness about car hacking is concerning. Three years ago, two security researchers illustrated how they could hack a moving Jeep's car systems and take control ( Jensen, 2016) . Another example of an attack that was actually deemed the highlight of car hacking with increased public awareness happened in 2015 when a Wired Journalist went for a ride with two IOActive researchers ( Jensen, 2016) . While the car was moving at 70mph, the radio station turned itself on, frozen air started coming out of the air conditioning system, the wiper fluid spurted onto the windshield with the wipers in motion, and eventually, the car ran itself off the road. 

For a hacker to access the security system and database or a car, they usually target vulnerable areas. Computer Scientist students from the University of South California and Washington managed to hack a car's systems by attacking their telematics vulnerabilities. The students demonstrated how they physically accessed the car through the media player, tampered with the diagnostic port and Bluetooth, completely compromising the car (Osborne, 2018). Also, a 2010 Toyota Ford Escape and a 2010 Toyota Prius were hacked by two security experts who cut off power to the steering, took control of the GPS and horn, as well as displays on the dashboard. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

As car manufacturers implement technological advances and more integration and connectivity, so do the abilities of those who can manipulate these systems. Several automotive companies have taken measures and approaches that mitigate the number of car hacking incidences. For instance, Tesla rewarded two Chinese hackers who posted a video online showing how they had managed to take control of a Tesla Model S. Tesla responded by having a team fix the bug within 10 days and stated that as much as attacks are not tangible, they are also not negligible. Automotive manufacturers have also changed operations by isolating critical control systems away from the 'infotainment' area (Greenberg, 2017). However, the efficacy of this strategy has been challenged and said to vary from implementation to implementation. 

Students at the University of Rutgers and South Carolina recently tampered with the tire-pressure monitoring systems (TPMS) and managed to track the car. Using low-budget equipment, the team was able to affect the sensors and the antenna, which displayed wrong tire pressure to the dashboard (Osborne, 2018). Carmakers should, however, use encryption everywhere to avoid such cases. Besides, they also suggested that in the case of hacking due to telematics vulnerabilities, the course of action would be to stack cookies that help identify an attack. Picking inbound calls is also discouraged. Instead, call back a number you trust immediately. 

Wi-Fi, Bluetooth, NFC, and RFID are the basis of connectivity in a car's system. Through this connectivity, security is built and enhanced, allowing authentication and authorization only from real owners. While Bluetooth and Wi-Fi require manual input from the users, NFC connects almost immediately. ( Obodoeze & Odegwo, 2019). However, NFC only functions over short-range distances. In car hacking, most hackers target this area, hoping to track the movements of the car or fully control it. 

References 

Jensen, L. S. (2016).  The 5 scariest car hacks — including some that could make you crash . VentureBeat.  https://venturebeat.com/2016/06/27/the-5-scariest-car-hacks-including-some-that-could-make-you-crash/ 

Greenberg, A. (2017).  A deep flaw in your car lets hackers shut down safety features . Wired.  https://www.wired.com/story/car-hack-shut-down-safety-features/ 

Osborne, C. (2018).  The most interesting internet-connected vehicle hacks on record . ZDNet.  https://www.zdnet.com/article/these-are-the-most-interesting-ways-to-hack-internet-connected-vehicles/ 

Obodoeze, F., & Odegwo, I. (2019).  Near Field communication (NFC): Issues, capabilities and applications in vehicle anti- Theft security systems . ResearchGate.  https://www.researchgate.net/publication/338282277_Near_Field_Communication_NFC_Issues_Capabilities_And_Applications_In_Vehicle_Anti-_Theft_Security_Systems 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Security Essentials On car Hacking.
https://studybounty.com/security-essentials-on-car-hacking-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Technology

Implementation Roadmap

AT&T is a telecommunication company that has a platform for selling phones and provision of internet and other services. Implementation of big data analytics in the company requires the completion of a particular...

Words: 545

Pages: 2

Views: 70

17 Sep 2023
Technology

Big Data in Fraud Detection: How It is Used and What to Expect

Chameleon Carriers The replication of trucking companies and trucks under different business names has grown rampant, as the Federal Motor Carrier Safety Administration (FMCSA) program reports. A large...

Words: 508

Pages: 2

Views: 437

17 Sep 2023
Technology

The 5G Networks: How They Work, and What They Mean for the Future

The world of technology is rapidly developing with the reliance of the internet at its core. 4G has been the primary platform of the internet but based on the slow speed, and the high dependence of technology has led...

Words: 284

Pages: 1

Views: 112

17 Sep 2023
Technology

How to Write a Successful Business Case

A successful business case is based on a need. One of the most disturbing problems in the health sector is cybercrime. We intend to develop a strategy that will leverage IT-based techniques and measures to reduce...

Words: 263

Pages: 1

Views: 63

17 Sep 2023
Technology

The 5nm Transistor: The Future of Computing

The November 16th, 1904 invention of the vacuum tube was the humble beginning of the modern-day transistor. The first working transistors were developed at Bell Labs by William Shockley, John Bardeen, and Walter...

Words: 2221

Pages: 4

Views: 55

17 Sep 2023
Technology

Wireless Communication Technologies

Wireless communication taken analogically simply refers to the channel of telephony communication that does not apply the use of wires (Bose, 2010) . Such a channel makes use of electromagnetic waves available in the...

Words: 1046

Pages: 4

Views: 159

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration