Sign Up

Captcha Click on image to update the captcha.

Have an account? Sign In Now

Sign In

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

You must login to add post.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

Find Authority

Find Authority Logo Find Authority Logo

Find Authority Navigation

  • Home

Mobile menu

Close
Ask a Question
  • Home
  • Recent Questions
  • Topics
  • Home
Home/Questions/Q 866
Next
In Process
Gayle
  • 2
Gayle
Asked: November 18, 20192019-11-18T23:49:00+00:00 2019-11-18T23:49:00+00:00In: Information Technology, Transport

What are the most common places where hackers can penetrate vehicles?

  • 2
What are the most common places where hackers can penetrate vehicles?

Vehicles are increasingly becoming connected, and the attack surface is getting broadened. Autonomous technology is also under testing stages. What would be the common areas in the vehicles through which hackers can gain access?

cyber securityhacking
  • 1 1 Answer
  • 0
Share
  • Facebook

    Leave an answer
    Cancel reply

    You must login to add an answer.

    Forgot Password?

    Need An Account, Sign Up Here

    1 Answer

    • Oldest
    1. Broderick Barreras Level 1
      2019-11-19T00:11:28+00:00Added an answer on November 19, 2019 at

      Below are some attack surfaces.

      OBD-II

      OBD-II is located under the hood and is a mandatory device in the car. Car hacking through the OBD-II requires physical access to the car. Through OBD-II port, hackers can access car’s Controller Area Network (CAN). The CAN bus is a self-contained network. In other words, if a user gets command of the OBD-II or CAN bus, the user gets full control of a vehicle.

      CD, USB & portable devices

      Almost all cars are sold with some sort of entertainment system. A driver can connect a device to a vehicle and transmit malicious software. The problem is that the entertainment systems are not stand-alone systems anymore. They are typically interconnected with a CAN bus, or interact with car systems (like hands-free features), or support a path of updating firmware or software. All critical systems can be compromised.

       

      Bluetooth

      Bluetooth became a norm in almost all new car models. In addition, Bluetooth allows synchronisation of a smartphone with a vehicle (address book, pictures and music). Synchronising a device with a car requires selecting a smartphone device on vehicle’s computer and then entering the PIN number on a smartphone. An intruder can access the PIN number via an unpaired device or access the system after a device was paired (involves physical access).

      Remote keyless entry

      Currently, almost all new medium and upper-class vehicles have a Remote Keyless Entry (RKE) system. This system allows drivers to remotely open doors, start the engine, turn on lights, and activate the alarm. When the button is pressed, information is sent from a key fob to the car’s receiver, and then the signal is decoded by a transmitter and passed on to the CAN bus to perform an operation. It is possible to make a vehicle deny access to the car or unlock/start a vehicle without a key fob.

       

      Immobiliser

      The immobiliser is a technology which prevents a car being started with an incorrect key. A reader near the steering column scans a Radio Frequency Identification (RFID) tag, usually embedded in a key, and then if the ID is correct, it unlocks the engine system. Technically, intruders can create a denial of service; however, they need to be in a proximity of around 1cm.

       

      TPMS

      Tyre Pressure Monitoring System (TPMS) is a sensor that monitors tyre pressure. It alerts drivers if tyres are over or underinflated. These sensors are mandatory for all new cars sold in the US. It is possible to sabotage the TPMS and make the car think that there is a problem with the car’s tyres. An indicator will also not flash if there are problems with tyre pressure.

       

      DSRC

      DSRC is a mean of communication between connected cars, and each connected car communicates with other connected car passing information between OBUs. It is the biggest vulnerability of a connected car. One infected connected car has a capacity to pass on malicious content to another vehicle over DSRC causing pandemic.

       

      GPS, RDS & TMC

       

      GPS, RDS and TMC are implemented in a car’s media system. The role of these systems is to provide updates on traffic jams, road works and similar information. These systems provide access to other important car’s electric control units. Intruders can insert incorrect messages to mislead the GPS and other warning services that use RDS or TMC, or both.

       

      Remote Telematics Systems

      Remote telematics systems offer features like eCall, anti-theft tracking, diagnostics, crash reporting, or hands-free navigation to driving directions or weather forecast. Major OEMs provide such services. Remote telematics systems give the widest scope of attack opportunities as they use a cellular connection and in newer car models WiFi hotspots. Even though the telematics module is not connected to the CAN bus, it can transmit data to another location if hacked.

      • 1
      • Reply
      • Share
        Share
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
        • Share on WhatsApp

    Sidebar

    Advanced Search
    Ask A Question

    Related Questions

    • Do I need technical skills to use a Video Production ...

    • Customer Login Using FME Extensions in Magento 2

    • E-Commerce Migration is Difficult. How to Make it Easy?

    • What is the impact of the pandemic on global LMS ...

    • How big is the global mobile middleware market?

    Explore

    • Home
    • Recent Questions
    • Topics

    Footer

    Find Authority

    Find Authority

    Find Authority is a professional networking and crowdsourcing platform which helps enhance members credentials and create opportunities.

    About Us

    • About Us
    • Careers
    • Contact Us

    Legal Stuff

    • Terms and Conditions
    • Privacy Policy
    • Cookie Policy

    Supprt

    • Help Centre
    • Badges

    Follow

    © 2020 Find Authority. All Rights Reserved

    Insert/edit link

    Enter the destination URL

    Or link to existing content

      No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.