• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

Over-the-air Software Updates Raise Autonomous Vehicle Safety Concerns

Philip Piletic / 5 min read.
December 22, 2021
Datafloq AI Score
×

Datafloq AI Score: 80.33

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/3gzlj

In order to provide a greater degree of functionality as well as safety, cars with even the most basic of autonomous functions would need to have regular software updates. Each time engineers identified a potential issue, there’s a high probability that they would have to push out new code in order to reduce the risk of said issue actually happening while out on the road. This is especially true of the very few real world use cases where totally driverless motor vehicles are actually permitted to operate without an extremely careful level of overwatch.

Since they need to install these safety updates extremely quickly, automakers are already starting to rely on over-the-air update systems. These have been rolled out in large numbers even for traditional cars, which still need more code than ever to control not only their motor functions but also all of the onboard entertainment options that are baked into modern automobiles. Ironically, cybersecurity researchers are warning that there’s a possibility bad actors could hijack these update processes and turn them over to some remote command and control center, which would then have a healthy amount of control over a car.

Updates are a necessary part of life to plug software holes that could act as an attack vector, so it becomes extremely concerning when these updates become an attack vector in their own right. Firms that use robotics for agricultural processes have already started to see this kind of issue become a serious problem. Once someone circumvents the trust of a system, they suddenly have the power to do whatever they would like with it and can therefore interrupt workflows.

When those workflows play out on a real-life highway, however, they can quickly become deadly.

Ensuring Trust in an Update Chain

Seizing control of the actual functioning of an internal combustion engine is surprisingly easy, assuming that said engine is hooked up to a car that receives over-the-air updates over something akin to a 5G cellular network. Engine control units and modules can be compromised simply by intercepting the codes that are used to identify a legitimate update. Once an organization has access to these, they could theoretically execute whatever arbitrary code that they want to.

This could include suddenly causing the automobile’s engine to cease firing, which could be a serious issue while at highway speeds. Even the most conventional of automobiles are filled with various components that could theoretically be networked, which allows the potential for this kind of an attack to flourish even in areas that have strict bans against autonomous technology.

Regardless of the status of a vehicle, it’s likely to have at least some connection between these components as long as there’s some form of in-vehicle wireless connection. One proposal has been to use blockchain-based ledgers to ensure trust between every single link in the chain. Assuming that the security system leaves an updated record in the cryptographic ledger each time it’s done, this would almost be foul-proof. However, there are still problems with this approach owing to the fact that many cryptographic hashing functions have already been broken.

Failed Cryptographic Functions as a Threat Vector

Ronald Rivest‘s famous and innovative MD5 function was unfortunately broken as early as 2008, but there are still a large amount of secure systems that rely on it. This is due in part to the fact that the reference implementation, Unix’s md5sum, is a core utility for GNU/Linux distros and therefore it’s easy for programmers to deploy in their own applications. That’s why it’s so commonly seen as a hashing function for things like login credentials in spite of its relative age.


Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

Consent

Developers who continue to pick out these kinds of failed algorithms for inclusion in their software could be adding unforeseen holes in them whether they’re aware of the fact that said hashing functions have been retired or not. Automakers are often under a fair amount of pressure to get vehicles to market, which has unfortunately helped to spur on the adaptation of hashing functions that are tested and mature in spite of the fact that they may no longer be advisable for usage.

Semiconductor industry shortages are only serving to make this problem that much worse.

How a Lack of Semiconductors Encourages a Lack of Security

Over-the-air updates have to be checked out by at least some hashing function in order to ensure that they were issued by the authorities who claimed to send them out. The function selected is probably picked more for performance than anything else. As chip shortages worsen, automakers are likely to opt for hashing functions that can reasonably run on weaker hardware.

General Motors has already elected to cease production of Bolt electric vehicles until the middle of October. This is due to the aforementioned lack of chips. Assuming that vehicles are to be put back into production, it’s likely that weaker off the shelf semiconductor platforms would have to be adopted.

Most of the hashing work is currently done in silicon, but generic chips would probably have to accomplish the same job through an emulation layer. Cybersecurity experts have, nonetheless, come up with some interesting ways to alleviate this issue.

Employing an Outside Security Monitor

It’s important to have an outside auditor in any situation where identity theft impacts the very individuals who are supposed to be trusted. Such an agency would essentially serve as a neutral party and, therefore, quickly find whenever someone had seized control of credentials that didn’t belong to them.

Experts are still concerned that there’s a risk that such an auditor could become compromised in certain situations, but it never hurts to have a second pair of eyes. This is the concept behind open source development, for instance. The large numbers of people all working on a single project together make it far more likely that said project will ship free of bugs.

It doesn’t seem like anyone in the industry is a dedicated automotive security advisor at the moment. That is likely to change as more automakers seek to get their systems squared away in preparation for greater adoption of the technologies they’re marketing. In fact, it might even be looked at as a major business opportunity by some organizations that seek to provide for under-served market segments.

Categories: Artificial Intelligence, Cybersecurity
Tags: AI, Autonomous driving, connected cars, Data security, hacking

About Philip Piletic

My primary focus is a fusion of technology, small business, and marketing. I'm a writer, marketing consultant and guest author at several authority websites. In love with startups, the latest tech trends and helping others get their ideas off the ground. You can find me on LinkedIn.

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post

Related Articles

A Beginner’s Guide to Reverse ETL: Concept and Use Cases

March 22, 2023 By Tehreem Naeem

How Data Analytics is Revolutionizing Talent Acquisition Leadership

March 20, 2023 By Monika Sangwan

Storing the World in a Sugar Cube: The DNA Data Revolution Unfolds

March 20, 2023 By Dr Mark van Rijmenam

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics application applications Artificial Intelligence benefits BI Big Data business China Cloud Companies company costs crypto Data design development digital engineer environment experience future Google+ government Group health information learning machine learning mobile news public research security services share skills social social media software strategy technology

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Related Online Courses

  • Data 2030 Summit MEA 2023
  • Nordic Data Science And Machine Learning Summit
  • Modern Data Strategy and Architecture June 2022 Enterprise Data & AI event
More courses

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • How Is Robotic Micro Fulfillment Changing Distribution?
  • IoT protocol and commnication standards
  • Top 6 Cybersecurity Certification Programs in 2023
  • How To Build a Leading Stock Trading Mobile App Platform? Complete Process with Tech Stack & Cost
  • A Beginner’s Guide to Reverse ETL: Concept and Use Cases

Search

Tags

AI Amazon analysis analytics application applications Artificial Intelligence benefits BI Big Data business China Cloud Companies company costs crypto Data design development digital engineer environment experience future Google+ government Group health information learning machine learning mobile news public research security services share skills social social media software strategy technology

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

settings

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!