Commercial vehicles – the next target for cyber attacks?
【Summary】Connected, commercial vehicles are becoming an appealing target for cyber criminals.

There's been a lot of hype around passenger cars and trucks being hacked. Commercial vehicles, though, could pose even more of a threat. Think of the havoc a digitally hi-jacked big rig, or bulldozer, could cause. Cyber-criminals who have attacked governments and corporations are beginning to see commercial vehicles as a useful target.
Connectivity leads to vulnerability
Most modern commercial vehicles are connected, just like their civilian counterparts. As such, protecting them from digital attacks is becoming a necessity. Fortunately, commercial vehicle companies can build on the defenses created by other industries.
Experts generally agree that there must be multiple layers of commercial vehicle security. Every aspect of the vehicle – from a single processor to the overall machine – must have its own line of defense. That way, no matter how deep hackers dig, they can't take control.
This layered architecture would use a range of technologies. Each would be built into the vehicle design, instead of being added on after development.
Open source provides pros and cons
Before, commercial vehicles used connections that were largely proprietary. This made each make and model a time consuming, unappealing endeavor for hackers. With the invention of the internet of things and other new technologies, that has changed. The majority of commercial vehicles now share hardware and software sourced from a handful of suppliers. This makes them much easier targets.
"We see the need for open platforms," said Sanjay Ravi, Managing Director Automotive at Microsoft Cloud Services. "Open application programming interfaces make it possible to include several players, from startups to very large automotive companies."
Open source means more companies will be using the same base development tools. This has its drawbacks but also its perks. Since the software has been tested by countless engineers, many vulnerabilities have already been fixed.
End users share responsibility for cyber security
The final piece of the puzzle is the end user. Owners and operators must use passwords and other means of identification to prevent security leaks. In the end, the human factor still plays a big role in implementing cyber security.
Sources: SAE
-
Mercedes EQ and Formula E Team Up for Select Races
-
Amsterdam Airport Uses Heliox Chargers to Power Fleet of 100 Electric Buses
-
Study Finds Nissan Leaf Battery Degrades Quicker than Expected
-
IEEE Spectrum Announces 2018’s Top 10 Tech Cars
-
VW’s 1.5L TSI Engine Touts Diesel Efficiency without the Cost
-
New Volkswagen Touareg Plug-in Hybrid Announced in China
-
SAE Showcases Vehicles that Pioneered Autonomous Technology
-
Wyoming Implements Connected Semi Trucks to Limit I-80 Fatalities
- Wyoming Implements Connected Semi Trucks to Limit I-80 Fatalities
- SAE Showcases Vehicles that Pioneered Autonomous Technology
- Study Finds Nissan Leaf Battery Degrades Quicker than Expected
- Waymo Releases a 360° Video to Show What it's Like Riding in its Self-Driving Minivans
- Tesla to Operate its California Assembly Line 24 Hrs a Day to Increase Model 3 Production
- Volkswagen and Toyota Agree on Self-Driving Truck Partnership
- Autonomous Cars are Giving Mapmakers a Chance to Compete with Larger Companies
- Volkswagen Offers to Buy Back Diesel Vehicles if German Cities Ban Them
- Porsche Planning for Electrified Cars to Account for 25 Percent of Car Sales by 2025
- NVIDIA CEO Reveals DRIVE SIM, a VR Autonomous Driving Simulator at GTC 2018