Solution Overviews

Solution overview: Trucking Cyberthreats

Issue link:

Contents of this Issue


Page 0 of 1

An architecture open to attack A major issue for commercial vehicle manufacturers is the potential for the vehicle bus, such as the J1939 bus, to be compromised by a nefarious actor and used as an access point into an Engine Control Module or ECM. The open architecture allows for flexibility and efficiency within the industry in terms of integrating new components onto the bus. The downside is that it also renders the vehicle vulnerable to cyberattacks, since access to one component can potentially provide access to others. The traditional 'listening' components - dash control cluster, body controller, transmission controller, antilock braking system controller and emissions systems are now joined by a new breed of components. Electronic Logging Devices or ELDs, Telematics Systems and other in-vehicle software actively accesses ECM components for data. All this connected technology offers huge benefits in increased safety, fleet uptime and fuel efficiency, whilst reducing paperwork. The connectedness, however, via USB ports or cellular/ Wi-Fi telemetry, offers more cyberattack surfaces. From vehicle to fleet Malware can, for example, be hidden on a USB thumb drive and uploaded to an ECM. As a fleet inspection officer takes the USB drive from one truck to the next to collect data, the infection can spread. If the payload Irdeto protects you from cyber threats today and in the future. How protected are you? Let's be frank. Cyber threats are real. And they continue to get more prevalent and more sophisticated as commercial vehicles become more connected to the Internet and each other. While hackers can still use a device attached to the vehicle's data bus, they are able to exploit connected vehicles without any physical access. The implications can be data theft, downtime, delays or even loss of critical system control. If Irdeto Secure Environment is deployed on your commercial vehicle fleet, this risk can be avoided. We'll tell you why… was timer-activated, a whole fleet could be downed at a peak time, wreaking havoc to the Company and to a city's road infrastructure. With increased hacker sophistication allied to widespread ELD adoption, this risk is rising. Commercial sector is more vulnerable than cars Researchers at the University of Michigan have shown that it is possible to alter a truck instrument panel, affect acceleration, or disable the brakes. They concluded that computer systems in trucks were easier to hack than those in cars. Added to this, there is general concern within the US Department of Homeland Security on the potential of a 'class attack' that could interrupt commerce and road infrastructure by disabling fleets. Going forward, it is crucial that Commercial vehicle manufacturers (OEMS) adopt adequate cybersecurity posture - right from design and manufacture, to preserve safety, brand reputation and competitiveness. Fleet platooning is a prime target Cyberattacks could be particularly effective in the area of 'Truck Platooning', where a number of trucks equipped with state-of-the-art driving support systems, closely follow each other behind a lead truck driven by a human. With the benefits of near © 2018 Irdeto. All Rights Reserved

Articles in this issue

Links on this page

view archives of Solution Overviews - Solution overview: Trucking Cyberthreats