Join or Sign in

Register for your free membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration

Connected cars are here. Now how do we secure them?

Connected cars are here. Now how do we secure them?
Automation is becoming an integral part of several industries. While this process had begun early in verticals like manufacturing, it is, perhaps, going to be most visible in the automobile sector.
Automation is becoming an integral part of several industries. While this process had begun early in verticals like manufacturing, it is, perhaps, going to be most visible in the automobile sector. Self-driving and connected vehicles are no long a theoretical proposition. As the technology becomes more affordable, which it inevitably will, our streets will be filled with cars that communicate with each other to perform more efficiently and effectively.

But, and there is always a but, to become ubiquitous, connected cars must face the challenge of making their communications secure from cyberattacks. This is not an easy task as computers and connected devices are increasingly coming under the attack of malicious hackers who are smart enough to find loopholes in the system.

According to Monique Lance, Marketing Director of Argus Cyber Security, hundreds of millions of connected cars are expected on the streets by 2020. Not only will automotive cybersecurity be necessary if we are to achieve total vehicle autonomy, but there is already a clear and present threat to millions of connected vehicles on the road today.

“In July 2015, two cyber researchers demonstrated their ability to hack into a Jeep Cherokee, waking many industry stakeholders up to the scope of the problem, and resulting in the first ever vehicle cyber recall of 1.4 million vehicles,” Lance said. “More recently, a KPMG study revealed that 82 percent of consumers would be ‘wary’ or would ‘never buy again’ from an automaker if they had been hacked.”

This growing awareness is also reflected in the US Congress. Recently, a US House of Representatives committee approved a revised bipartisan bill that will help speed self-driving cars to market. The bill makes it illegal in the US to sell or even exhibit an automated vehicle without a cybersecurity plan that includes an Intrusion Detection and Prevention System (IDPS), and demands ongoing measures for taking preventative and corrective action against cyber vulnerabilities. The British government has also released guidelines mandating that automakers put in place adequate cyber security protection to shield drivers from hackers, and holding company board members personally accountable for automotive cyber safety.

Why a comprehensive solution is required

While there are several attempts being made to counter this concern, not many companies have the experience or the expertise that Argus can provide. The Tel-Aviv, Israel-based company is the largest independent automotive cybersecurity firm in the world, working with the major private and commercial OEMs, Tier 1 suppliers, aftermarket connectivity providers and fleet managers to address the growing security challenges posed by increasing vehicle connectivity. Argus provides multi-layered, end-to-end solutions that embed security into the vehicle from the concept stage through production and across the entire vehicle lifespan.

“Argus’ uniqueness comes down to scale and experience,” Lance said. “As the largest independent automotive cyber security company in the world today, we offer the most comprehensive solution suites, while most other companies offer only one or two products. Our technology is based on a combined 30 granted and pending patents – the fruit of more than 50,000 hours of Argus automotive cyber research across different combinations of operating systems, communication protocols and automotive architecture – while our competitors typically have no more than one or two patents.”

To protect connected vehicles today and into the future, solutions need to be technologically innovative, multi-layered and should combine cyber security know-how with automotive best practices. Lance added that Argus’ combination of cyber-technology expertise and automotive industry experience is extremely unique, and gives them a leg up in a fast-growing industry requiring proficiency in both.

The software and its AI-enabled future

Argus is a software company. Its developers work with latest technologies across multiple disciplines from in-vehicle communication protocols, operating systems, applications and cloud technologies. The company’s multi-layered solution suites enable cyber security software to be embedded in a vehicle’s hardware components. “To accomplish this, we have partnered with multiple automotive suppliers and chip manufacturers and including Continental, Elektrobit, Intel, Infineon, NXP, and more,” Lance said.

And the future is definitely going to be influenced by the development of artificial intelligence. Lance pointed out that there is a potential for machine learning to have an impact on automotive cyber security products. Machine learning can be used to analyze data gathered from in-vehicle solutions and other sources including OEM data and cyber intelligence to gain insight into emerging patterns and thereby help predict attacks. In this way, preventative measures may be taken to mitigate future cyber-attacks.

Customer response to Argus’ products have been positive. The company already works with all the major OEMs and Tier 1 suppliers from around the world.

“As awareness of connectivity breeding vulnerability increases, thanks in part to our research efforts, our clients become more and more aware of the need for our solutions,” Lance said. “And with automotive cyber security regulation imminent in both the US and the UK, other countries will be quick to follow suit, making customers even more responsive.”
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: