• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Write for Us
  • Contact
  • Advertise
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Do Not Sell My Personal Information
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

Connected Vehicles Need more than Firewall Protection

Updated on Jul 25, 2015 by Guest Authors

A recent demonstration hack performed on a Chrysler jeep sheds light on the greater need for a protection that goes beyond just a firewall system to something more far-ranging in scope in an age of connected devices and appliances.

Experts recommend that the auto industry reconsider its approach toward security by targeting the strategy of hackers. That means developing a security protocol that tries to identify an attack and predict its behavior before it can be used by the bad guys.

connected-vehicles

Experts believe the automakers are lagging behind in keeping the operational security of their connected vehicles safe from attackers. The lax security measure among the players in the auto industry is said to emanate from the confident assumption that hackers will face difficulty in penetrating the security infrastructure of the connected cars.

That assumption has been shattered when a team of researchers successfully hacked through the head unit of a Chrysler model. The unit is called UConnect, which serves as the perimeter security for the vehicle. During the demonstration, the vehicle’s cellular network connection was used to gain access to the Chrysler’s  control area network, which functions as a gateway to the car’s electronic parts. Access to CAN helps to locate electronic messages that control certain components of the vehicle such as the wheel, brakes, acceleration and other crucial parts. The messages on CAN bus are easy to predict, according to one of the researchers.

And this vulnerability could spread to other types of vehicles as the network of connected cars become increasingly linked, thus making it easier for attackers to penetrate whatever system they want to target.

Admittedly, the growing adoption of connected, self-driving vehicles poses greater threats to passengers. So there is, as well, a greater need to protect the computer systems of these connected vehicles from any form of attack. It is now a crucial task.

The researchers have already shared their findings with Chrysler and the automaker has released a fix for the security flaw in the head unit of the vehicle. For users, the software patch must be downloaded and saved in a flash drive before updating the Chrysler Jeep’s software with the fix.

But other potential risks may still be in existence that could replace the remote flaw presently in question. According to the researchers, there is hardly a method for securing the computer system of a vehicle, therefore other security holes could be found in the Chrysler sooner or later. The same prognosis goes for other vehicle brands.

Disclosure: As an Amazon Associate, I earn from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Keychron K4 Wireless Mechanical Keyboard Review – The Biggest & The Best?

Keychron K6 Wireless Mechanical Keyboard Review – Nice Balance Between Design and Function

AuthenTrend AT.Wallet Fingerprint Cryptocurrency Wallet Review – The Coolest One You Can Buy

Yeedi K650 Robot Vacuum Review – A Good Basic Vacuum

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • Samsung Galaxy S21 Ultra Model Number SM-G998* Differences
  • Samsung Galaxy S21+ 5G Model Number SM-G996* Differences
  • Samsung Galaxy S21 5G Model Number SM-G991* Differences
  • How to Read and Write to NTFS Drives on Apple M1 Mac?

Copyright © 2021 · All Rights Reserved