Automotive

  • Secures communications within and between vehicles and ground stations
  • Protects driver information and confidentiality
  • Secures the automotive supply chain

Automotive Cybersecurity

The automotive market is changing rapidly and the advancements in Advanced Driver Assistance Systems (ADAS) will be changing our driving experiences and safety for the future. 

We must secure communications to, from, and within the vehicle

Features such as adaptive cruise control which maintains a set distance from the vehicle in front of you, or lane departure warning system which will tell you when your vehicle is getting too close or leaving the current lane of traffic by vibrating the steering wheel, are becoming highly integrated systems within the vehicle itself.

Protecting passenger, driver, and even vehicle identify must be configurable

However, even more, advanced systems are becoming the reality of today, where vehicles are becoming more autonomous and will communicate with other vehicles i.e. vehicle to vehicle communications (V2X) without any driver intervention or even knowledge that that is happening.  In this scenario, vehicles will let each other know where they are and other operational parameters such as speed, direction, destination (if appropriate) to improve safety or even mediate traffic flow. This is the real world now and there is true momentum to fully autonomous driving, with no driver behind the wheel.  Secure autonomous vehicles will bring tremendous benefits however communications and on-board systems must be secure and authenticated.

 

Communication within the Vehicle

Security will enable safer, more efficient, and more cost-effective travel

With a large number of computers in today's vehicles, all commonly connected through a bus called CAN, there is significant and real risk in directed attacks propagating throughout the vehicle. In practice, the braking systems, suspension control, and cruise control systems may all be connected to the same core bus and therefore share the same conduit as the rest of the communication in the vehicle, increasing the attack surface and risk.  Furthermore, a common if not global interface to virtually all vehicles at this time is the OBD-II port, enabling maintenance and diagnostic information to be retrieved and transmitted to the vehicle and across the CAN bus.  This port presents another significant vulnerability to the outside world.  To address these problems, vehicles must operate with StealthPath Trusted data to ensure safe and efficient operation of the vehicle within its intended environment of operation.

Vehicle to Vehicle (V2V) Communications

StealthPath: Secures the supply chain, V2X (vehicle to everything) communications, communications within the vehicle, and passenger and vehicle data

There is tremendous opportunity for the future of automobile transportation to be made more efficient and safer by vehicle to vehicle communications.

As vehicles become more and more autonomous and capable we will see our vehicles communicating with each other without us knowing to negotiate driving routes, turns, and patterns, all with intention to relieve humans of the “burden” of driving.  Automobiles will operate without emotion and without fatigue, ideally eliminating a majority of issues caused by humans being humans.

Ground system traffic control

Imagine traffic patterns being monitored and controlled to minimize travel delays for everyone or your vehicle being automatically routed to consume less time or less fuel, or travel closer to desired roadside facilities and venues.  All this will be enabled by communication, both from vehicles to vehicles and from remote monitoring and control stations, observing and controlling traffic patterns.  With V2X (Vehicle to everything) communication comes tremendous opportunity to us as consumers however for that communication to enable safer, more efficient, and more cost-effective travel, that communication must guarantee that the data is always protected and Trusted, at rest in the vehicle or in the control station, or in transit between the vehicles and the control systems.

Automotive Supply Chain

Supply chain is vulnerable and must be secured

There is no question that effective collaboration and communication between the automobile original equipment manufacturers (OEMs) and their suppliers is critical to the safety of the passengers of the vehicles they produce as well as the business of the OEMs and the suppliers themselves. Systems and communication must be protected to ensure that the data confidentiality, integrity and availability is maintained throughout the design, development, and maintenance process.  We can only imagine the effects on business if any of the supply chain is infiltrated by hackers, rippling the effect and damage throughout the entire chain.

Automotive Industry in the Future can be Secure

For all these challenges in the automotive market, there is a better option.  By using StealthShield™ technology in the automobiles and systems and devices that connect to them, as well as the computer systems and technology that enable supply chain communication, you can assure that these automobiles and will continue to operate safely, securely, and address the functional requirements they were designed to perform. StealthShield ensures only StealthPath Trusted parties with authenticated messages and StealthPath Trusted data will be able to share information.  That means communication between automobiles (V2X) and the networks that support them will be assured and dependable. StealthShield provides the Pathway to Impenetrable Cybersecurity™.

StealthShield :

  • Operates autonomously
  • Requires no human intervention
  • Is simple to install
  • Is not detectable by cyber attackers

Contact Us To Learn More

Find out how StealthPath can help your company operate securely.