• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

Connected Vehicles Need more than Firewall Protection

Updated on Jul 25, 2015 by Guest Authors

A recent demonstration hack performed on a Chrysler jeep sheds light on the greater need for a protection that goes beyond just a firewall system to something more far-ranging in scope in an age of connected devices and appliances.

Experts recommend that the auto industry reconsider its approach toward security by targeting the strategy of hackers. That means developing a security protocol that tries to identify an attack and predict its behavior before it can be used by the bad guys.

connected-vehicles

Experts believe the automakers are lagging behind in keeping the operational security of their connected vehicles safe from attackers. The lax security measure among the players in the auto industry is said to emanate from the confident assumption that hackers will face difficulty in penetrating the security infrastructure of the connected cars.

That assumption has been shattered when a team of researchers successfully hacked through the head unit of a Chrysler model. The unit is called UConnect, which serves as the perimeter security for the vehicle. During the demonstration, the vehicle’s cellular network connection was used to gain access to the Chrysler’s  control area network, which functions as a gateway to the car’s electronic parts. Access to CAN helps to locate electronic messages that control certain components of the vehicle such as the wheel, brakes, acceleration and other crucial parts. The messages on CAN bus are easy to predict, according to one of the researchers.

And this vulnerability could spread to other types of vehicles as the network of connected cars become increasingly linked, thus making it easier for attackers to penetrate whatever system they want to target.

Admittedly, the growing adoption of connected, self-driving vehicles poses greater threats to passengers. So there is, as well, a greater need to protect the computer systems of these connected vehicles from any form of attack. It is now a crucial task.

The researchers have already shared their findings with Chrysler and the automaker has released a fix for the security flaw in the head unit of the vehicle. For users, the software patch must be downloaded and saved in a flash drive before updating the Chrysler Jeep’s software with the fix.

But other potential risks may still be in existence that could replace the remote flaw presently in question. According to the researchers, there is hardly a method for securing the computer system of a vehicle, therefore other security holes could be found in the Chrysler sooner or later. The same prognosis goes for other vehicle brands.

Disclosure: As an Amazon Associate, I earn from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

POLONO PL60Thermal Label Printer Review

DaranEner NEO2000 Power Station Review – A Beast In A Portable Design

Autonomous SmartDesk Junior Review – Kid Standing Desk with Pegboard and Adjustable Height

OKP Life K2P Robot Vacuum Cleaner Review – Who Should Buy this Vacuum?

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • BLUETTI Valentine’s Day Deals for Canada
  • BLUETTI’s Romantic Deals this Valentine – Up to 30% Off
  • Google Is Launching Bard to Fight ChatGPT, Here Is How It Works
  • POLONO PL60Thermal Label Printer Review

Copyright © 2023 · All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}