Article count:1511 Read by:4580472

Account Entry

Interpretation of "2023 Intelligent Connected Vehicle Network Security Report"

Latest update time:2024-01-30
    Reads:

This article is excerpted from the "2023 Intelligent Connected Vehicle Network Security Report" jointly released by Pengcheng Laboratory and Weichen Xin'an. It combines the background and challenges of domestic intelligent connected vehicles, combined with typical smart vehicle network security incidents around the world, to provide an analysis of the 2023 Intelligent Connected Vehicle Network Security Report. Make a study and judgment on the overall situation of smart car network security in 2020. This article mainly introduces the automotive network security panorama , the automotive network security situation in 2023, analysis of typical and new attack methods, regulations and standards .


Send the keyword " AES37 " in the background of the official account to get the full text of the report PDF!















01.
Automotive Cybersecurity Panorama

Security is a relative concept. We cannot pursue absolute unlimited security. We need to meet compliance requirements and ensure business
Maintain a balance between operational safety and ensuring normal functioning of functions. A single security protection no longer meets the security needs of internal and external connections in the car. Security solutions need to be based on the car's "V model" and run through the entire life cycle of the car from the concept stage to launch operation. It also needs to run through the "cloud-pipe-end". Form an in-depth protection system.

Send the keyword " AES37 " in the background of the official account to obtain the high-definition full-text PDF of the report!


02.
Automotive Cybersecurity Situation in 2023


Among the safety incidents reported in public news on the Internet of Vehicles in 2023, the number of large-scale accidents that caused widespread malicious impact increased by 38% compared with 2022 .



Among the 1,000+ vehicle models and parts studied by Weichen Security Lab, the monitored attack events and the situation of the attacked objects are as shown in the following figure:




03.
Analysis of typical and new attack methods


Common vulnerable objects include T-BOX, vehicle-machine system, vehicle system, and vehicle business. Common attack methods are listed as follows according to their classification:

  • T-BOX

T-BOX is the vehicle's telematics and communication unit, usually used for remote monitoring, vehicle positioning, emergency call (eCall) and other functions. Common attack points include:

  • Communication interface attack

T-BOX communicates with the outside world through cellular networks, Wi-Fi or other wireless technologies, and its communication interface may be used by hackers to conduct man-in-the-middle attacks (MITM) to intercept or tamper with data.

  • Data privacy breach

Vehicle data collected by T-BOX may contain sensitive information, and hackers may try to steal the data.

  • Vehicle system

The vehicle computer system is an interface inside the vehicle used to provide entertainment, information transmission and vehicle settings. Common attack points include:

  • Physical interface attack

Malicious devices through physical interfaces such as USB and SD cards can cause the vehicle system to be infected with malware.

  • Bluetooth and Wi Fi Attacks

Unencrypted or weakly encrypted wireless connections can allow hackers to gain unauthorized access and capture data.

  • Operating system and application vulnerabilities

There may be vulnerabilities in the vehicle's operating system and applications, and hackers can use RCE vulnerabilities to obtain system permissions and data.

  • Vehicle system

The vehicle system refers to all electronic control units (ECUs) and networks of the vehicle. Common attack points include:

  • CAN bus attack-OBD interface

The CAN bus is the main communication network between ECUs within the vehicle. An attacker can inject malicious instructions into the vehicle's diagnostic interface OBD to interfere with vehicle operation.

  • Wireless access point attacks

Intelligent connected vehicles have multiple wireless access points, such as TPMS tire pressure monitoring system, PEPS keyless system, etc.

  • sensor spoofing

Intelligent connected vehicles rely on various sensors, such as radars, cameras, etc., and can interfere with the vehicle perception system by deceiving the sensors.

  • One of the typical attacks on the vehicle business - PEPS relay attack


PEPS low-frequency signals generally act within a range of about 1 to 2 meters around the vehicle, and are ineffective beyond the distance. Relay attacks can expand the range of low-frequency signals. Relays are divided into wired relays and wireless relays. Wired relays require network cables to connect. Therefore, intelligent connected cars are usually attacked by wireless relays. The basic principles of the attacks are as follows:

  • attacker location

The attacker will place two repeaters near device A (such as a smart key) and device B (such as a vehicle). "Repeater A" communicates with device A (such as a smart key), and "repeater B" "Communicate with device B (e.g. vehicle).

  • signal relay

When "repeater B" near device B (such as a vehicle) receives a signal from device B (such as a vehicle), "repeater B" will relay the signal to "repeater A", and "repeater B" "Device A" communicates with device A (such as a smart key) and completes a relay. In the laboratory scenario, the key will reply to a high-frequency signal.


04.
Regulations and standards put safety on the agenda


The lack of safety in intelligent connected cars will directly expose society and even the country to safety risks. In recent years
In recent years, a number of regulations and standards for intelligent connected vehicle network security have been introduced at home and abroad in an effort to reduce overall industry risks through official guidance.

It is worth noting that in May 2023, the Ministry of Industry and Information Technology issued the "Technical Requirements for Automobile Information Security"
Drafts for comments on four mandatory national standards including vehicle external connection safety requirements, vehicle communication security
Detailed technical specifications and standard implementation requirements have been made for vehicle safety, vehicle software upgrades, vehicle data code security, vehicle information security requirements testing and verification methods, etc.

It can be seen that whether it is for the domestic market or the global market, within the time specified by regulations and standards
Quickly and compliantly building a network security system for intelligent connected cars in front of the node has become an urgent need in the market.


— END —



Send the keyword " AES37 " in the background of the official account to obtain the full text PDF of the report!



Latest articles about

 
EEWorld WeChat Subscription

 
EEWorld WeChat Service Number

 
AutoDevelopers

About Us Customer Service Contact Information Datasheet Sitemap LatestNews

Room 1530, Zhongguancun MOOC Times Building,Block B, 18 Zhongguancun Street, Haidian District,Beijing, China Tel:(010)82350740 Postcode:100190

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号