Sophisticated cars are built to offer convenience to their drivers, but at the same time, hackers are given a new challenge. The thought of having your car's security breached and someone controlling it remotely can seem like a scene out of a sci-fi movie. However, car hacking and data breaches have been in existence since 2005 (Jensen, 2016). In 2019 alone, the number of carjacking incidences through technology doubled from the previous year's figure (Greenberg, 2017). The rate at which car manufacturers are installing connectivity without improving security measures or creating awareness about car hacking is concerning. Three years ago, two security researchers illustrated how they could hack a moving Jeep's car systems and take control ( Jensen, 2016) . Another example of an attack that was actually deemed the highlight of car hacking with increased public awareness happened in 2015 when a Wired Journalist went for a ride with two IOActive researchers ( Jensen, 2016) . While the car was moving at 70mph, the radio station turned itself on, frozen air started coming out of the air conditioning system, the wiper fluid spurted onto the windshield with the wipers in motion, and eventually, the car ran itself off the road.
For a hacker to access the security system and database or a car, they usually target vulnerable areas. Computer Scientist students from the University of South California and Washington managed to hack a car's systems by attacking their telematics vulnerabilities. The students demonstrated how they physically accessed the car through the media player, tampered with the diagnostic port and Bluetooth, completely compromising the car (Osborne, 2018). Also, a 2010 Toyota Ford Escape and a 2010 Toyota Prius were hacked by two security experts who cut off power to the steering, took control of the GPS and horn, as well as displays on the dashboard.
Delegate your assignment to our experts and they will do the rest.
As car manufacturers implement technological advances and more integration and connectivity, so do the abilities of those who can manipulate these systems. Several automotive companies have taken measures and approaches that mitigate the number of car hacking incidences. For instance, Tesla rewarded two Chinese hackers who posted a video online showing how they had managed to take control of a Tesla Model S. Tesla responded by having a team fix the bug within 10 days and stated that as much as attacks are not tangible, they are also not negligible. Automotive manufacturers have also changed operations by isolating critical control systems away from the 'infotainment' area (Greenberg, 2017). However, the efficacy of this strategy has been challenged and said to vary from implementation to implementation.
Students at the University of Rutgers and South Carolina recently tampered with the tire-pressure monitoring systems (TPMS) and managed to track the car. Using low-budget equipment, the team was able to affect the sensors and the antenna, which displayed wrong tire pressure to the dashboard (Osborne, 2018). Carmakers should, however, use encryption everywhere to avoid such cases. Besides, they also suggested that in the case of hacking due to telematics vulnerabilities, the course of action would be to stack cookies that help identify an attack. Picking inbound calls is also discouraged. Instead, call back a number you trust immediately.
Wi-Fi, Bluetooth, NFC, and RFID are the basis of connectivity in a car's system. Through this connectivity, security is built and enhanced, allowing authentication and authorization only from real owners. While Bluetooth and Wi-Fi require manual input from the users, NFC connects almost immediately. ( Obodoeze & Odegwo, 2019). However, NFC only functions over short-range distances. In car hacking, most hackers target this area, hoping to track the movements of the car or fully control it.
References
Jensen, L. S. (2016). The 5 scariest car hacks — including some that could make you crash . VentureBeat. https://venturebeat.com/2016/06/27/the-5-scariest-car-hacks-including-some-that-could-make-you-crash/
Greenberg, A. (2017). A deep flaw in your car lets hackers shut down safety features . Wired. https://www.wired.com/story/car-hack-shut-down-safety-features/
Osborne, C. (2018). The most interesting internet-connected vehicle hacks on record . ZDNet. https://www.zdnet.com/article/these-are-the-most-interesting-ways-to-hack-internet-connected-vehicles/
Obodoeze, F., & Odegwo, I. (2019). Near Field communication (NFC): Issues, capabilities and applications in vehicle anti- Theft security systems . ResearchGate. https://www.researchgate.net/publication/338282277_Near_Field_Communication_NFC_Issues_Capabilities_And_Applications_In_Vehicle_Anti-_Theft_Security_Systems