Sei sulla pagina 1di 2

IEEE CNS 2014 Poster Session

Approaches for Vehicle Cyber Security


Hiro Onishi
Alpine Electronics Research of America, Inc.
honishi@alpine-la.com

Abstract— Vehicle cyber security that recently arouse society remote control, financial charges, and personal information
concerns have more complicated vulnerabilities, compared to stolen)’. These types of malware threaten smart phone users
ordinary computer and internet cyber security. In addition, more because of financial damage or the leakage of
frequent connection between vehicle and smart phone with confidential/privacy information [4].
limited security mechanism is considered to raise security risks.
In this paper, we will first analyze these vehicle cyber risks and
then introduce various industrial approaches for vehicle cyber
security. Finally, we will introduce the well-integrated
connectivity between vehicle and smart phone that may enhance
vehicle cyber security.

Keywords—vehicle cyber security; vehicle cyber risk analysis;


connectivity between vehicle and smart phone

I. VEHICLE AND SMART PHONE CONNECTIVITY Fig. 1. TER (Threats Exposure Rate) for PCs and Android devices [3] [11]

Recently, smart phones have been more frequently


integrated within a vehicle to provide more convenient II. ENLARGED VEHICLE CYBER RISKS
functions such as, concierge services, emergency call, and Passenger-vehicles with over 20,000 components
remote diagnosis to drivers and passengers [1]. Vehicle and potentially have higher security risks compared to ordinary
smart phone connectivity becomes applied not only to after- PCs with approximate 2000 components. Furthermore as
market or dealer installation systems, but also to OEM factory modern intelligent vehicles have approximately 100 CPUs and
installation systems. TABLE I shows smart phone integration several hundred MB of software code to target autonomous
applied to factory installation systems observed at the Los driving ultimately, vehicle cyber risk has become a serious
Angeles Auto show 2011 [2]. social concern [5]. In addition more frequent connections
TABLE I FACTORY INSTALLATION SMART PHONE INTEGRATION between vehicle and smart phone with limited security
(OBSERVED IN LOS ANGELES AUTOSHOW 2011) [2] mechanism are considered to increase vehicle cyber risks (Fig.
2.) [6].

Fig. 2. Cyber risks caused by carry-in devices (smart phones) [6]


In comparison to ordinary computer or internet cyber
security, vehicle cyber security has the following additional
complicated vulnerabilities [6],
• Limited vehicle external connectivity causes
On one hand, smart phones with limited security
difficulty in updating security software and in
mechanism used at multiple locations and connected to
monitoring automotive electronics status
various sites to download various applications become targets
• Limited computational performance, due to high
of cyber attacks next to PCs. In multiple countries, Android
endurance and long vehicle life-cycle (over 10
devices (one type of smart phones) have higher TER (Threats
years) causes difficulty in competing against
Exposure Rate) than PCs do (Fig. 1.) [3] [11]. Smart phones
hacker’s latest high computational performance PC
have three major types of malware, i.e. ‘installation
• Need of real-time operation
(repackaging, update attack and drive-by download)’,
• Vehicle complexity as it consists of numerous
‘activation’, and ‘malicious payload (privilege escalation,

978-1-4799-5890-0/14/$31.00 ©2014 IEEE 506


IEEE CNS 2014 Poster Session

components and parts • Certification by security authority(=anchor)


• Unpredictable attack scenarios and threats • Remedy of infected components
• Hazard of drivers and passengers lives Especially, on-the-fly security software update has enhanced
the security of vehicles ordinary over 10 years in the market.
III. APROACHES FOR VEHICLE CYBER SECURITY Considering these features, the well-considered smart phone
A. Develop industrial security guidelines integration has the possibilities to strengthen vehicle cyber
security.
In resonse to the increased vehicle cyber risks,
governments and industrial organizations are developing IV. CONCLUSIONS
vehicle security guidelines (TABLE II). These guidelines are In response to the increasing concern about vehicle cyber
providing the following benefits to the industry [7], risks, many approaches are taken place in the industry, for
• Awareness and outreach example,
• Well-defined threats and risk analysis • Develop vehicle security guidelines
• Cyber security techniques and architectures • Mitigate hazards caused by cyber attacks
• Handling and mitigating of cyber incidents • Utilize external connectivity, especially smart phone
TABLE II GUIDELINES FOR VEHICLE CYBER SECURITY [8] [9] [10] connectivity, for security features
Though initially the connectivity to smart phones were
considered to increase vehicle cyber risks, on the contrary,
well-integrated smart phones can be utilized for many security
features for example, on-the-fly security software update to
enhance vehicle cyber security.
Ordinary security techniques in ICT have the capabilities
to enhance vehicle cyber security, but we have to be aware
B. Mitigate hazards that there are many specific challenges to deploy them in
For the most critical mission in vehicle cyber security, i.e. vehicle environment for example, real-time operation within a
to maintain ‘safety’ even when ‘security’ is compromised, we few hundred milliseconds.
would like to introduce two types of approaches. First, in ACKNOWLEDGMENT
vehicle-level approaches, ‘Infotainment (Information and
Entertainment)’ area which is frequently connected to the The author thanks Mehrdad S. Sharbaf of California State
University Dominguez Hills for offering useful information
external ICT (Information Communication Technology) world
and advice in this research.
is divided from safety critical areas (Fig. 3.). Samples of
individual techniques are [6], REFERENCES
• Install firewalls between Infotainment and safety [1] M. Paula, “In Four Years, Most Cars Will Work With Smart Phones”
critical areas (May ’12). Available at
• Review commands/messages from Infotainment www.forbes.com/sites/matthewdepaula/2012/05/19/in-four-years-most-
areas to safety critical areas cars-will-work-with-smart-phones/
• Protect against software manipulation [2] H. Onishi, “Paradigm Change of Vehicle Cyber Security” in CyCon ’12
(Tallinn, Estonis, Jun.)
In component-level approaches, critical functions should [3] “Mobile Security Solution – Sophos Mobile Control” (Japanese)
have redundancy with hard-switches or analog back-ups [6]. [4] Y. MA and M. Sharbaf, “Investigation of Static and Dynamic Android
Anti” IEEE International Conference on Information Technology : New
Generations ’13 (Las Vegas, NV, Apr.)
[5] A. Weimerskirch, “Security Considerations for Connected Vehicles” in
SAE Government /Industry Meeting ’12 (Washington DC, Jan.)
[6] H. Onishi, “Approaching Vehicle Cyber Security by Applying the
Functional Safety Concept“, in ITS World Congress ’13 (Tokyo, Japan,
Oct.)
[7] H. Onishi, “Guidelines for Vehicle Cyber Security”, in ITS World
Fig. 3. Hazard mitigation – Vehicle-level [6] Congress ’14 (Detroit, MI)
[8] EVITA deliverable D2.3 “Security requirements for automotive on-
C. Utilize smart phone connectivity board networks based on dark-side scenarios” (’09)
Though the connectivity between vehicle and smart [9] Information-Technology Promotion Agency, “Approaches for Vehicle
phones is considered to increase vehicle cyber risks, on the Information Security”, (Apr. ’13). Available at
contrary, this connectivity can provide the following useful http://www.ipa.go.jp/files/000033402.pdf
security features efficiently. [10] SAE-International, “J3061 – Cybersecurity Guidebook for Cyber-
Physical Automotive Systems” (under development)
• On-the-fly (security) software update (i.e. security [11] Sophos, “Sophos Security Threat Report 2013”. Available at
patch) www.sophos.com/en-
• Electric components’ status monitoring us/medialibrary/PDFs/other/sophossecuritythreatreport2013.pdf

507

Potrebbero piacerti anche