SlideShare a Scribd company logo
1 of 4
Download to read offline
Connected Vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected Vehicles – Some not so Great Stories
We all heard of July 2015 story where Ethical Hackers, took control of a 2014 Jeep Cherokee’s steering
remotely, even turning off the car’s transmission and drove it into a ditch. It led to recall of 8,000 Jeeps
(2015 Renegades). Similarly, August 2015 saw, researchers taking control of a Tesla Model S and turing
it off at low speed.
More server and tragic, in May 2016, a driver was killed in an accident involving autonomous feature
guided car. In a more controlled environment, Tesla’s Bug Bounty Program in September 2016
discovered a major security flaw. In February 2017, a “simulated hack” reportedly disabled a number of
different Connected Vehicles of different models in UK.
Recent reports on thefts using Remote Keyless Entry vulnerabilities, amplifying the generated signals or
intercepting the door-opening code for later playback were common sometime back.
But Evolution happens with history of Bad Stories
Just like any new technology, like Smart cards, its all about consumer trust. If people trust their connected
car—to keep them safe, to make their lives easier, and to treat their information appropriately— the may
willingly give up their information. Likewise, they expect their data to remain private and secure,
Vulnerability Areas
Relatively common features such as
1. Remote Key and Keyless Access
2. Bluetooth Connectivity (Chesterfield County municipality, VA, forbids Bluetooth in Govt. vehicles)
3. OBD Ports
4. Wi-Fi, DSRC, Cellular, NFC connection
5. Unauthorized Infrastructure Signaling
All above could all contribute to the vulnerability of a vehicle, forming part of a potential “attack surface”.
Even over-the-air (OTA) updates to close the vulnerability are vulnerable to hacker target. Like what we
saw in Jeep’s case, sending a USB stick with self-installing firmware updates to the user, or doing
updates only in secure locations by the car dealer, is often the best solution.
It isn’t just the electronic control units (ECUs) deep within the vehicle itself that can be dangerous if
hacked. Instead, relatively harmless appearing Infotainment unit hacking can kill if the driver is distracted
or surprised at the wrong time. Its an easy target due to the connectivity it requires from various web
services (Weather, Traffic, Streaming Audio etc). All it takes is a single vulnerability (e.g., misconfigured
server, unencrypted API call) for an attacker to exploit the rest of the system.
Devices plugged into a vehicle’s on-board diagnostics port (OBD-II) may contain a GPS receiver, cellular
chip etc. They can communicate with vehicle’s CAN bus as well as with service provider to share data on
vehicle’s operation. A remote, unauthenticated attacker may be able to execute arbitrary code on the
device causing vehicle damage or injuries if the device is compromised. Enabling connectivity to once-
closed CAN bus can result in harmful effects if security engineering principles are not properly applied.
Reasons for such Vulnerabilities
In 1st phase of Connected Vehicle evolution, automakers added more and more technology components,
but soon realized that they had to protect their systems since secure architecture was not at fore front
while designing these systems. Instead what was the easiest and cheapest way to do that? Add layer
over layer, patch over patch of security across a single, flat network.
That is a problem. In a connected car, all systems share a network, meaning if you access one you may
be able to access them all. In real life, this means a hacker might be able to expose vulnerabilities in a
driver’s smart phone to steal information from vehicle systems the device is connected to or even take
control of a car’s operational systems, like its engines and brakes.
Why there are Concerns for Vehicle’s Telematics Data
Security and privacy concerns surrounding connected car technologies affect not only the individual
consumers but also corporate, municipal, law enforcement and other business and government interests.
Telematics systems that track and wirelessly communicate the location, movement, behavior and health
of a vehicle in real time are most vulnerable components of the Connective-Vehicle eco-system.
Following are some of the example attacks. Results can vary from controlling vehicle’s non-safety-critical
operations, disabling critical or non-critical systems controls to potentially loosing total control.
Attack
 Exploit an unauthenticated API (e.g., remote features) used in a CV
 Exploit a vulnerability in a mobile application used to connect to a CV
 Monitor a CV’s messaging traffic for an extended period of time
 Knowledge of vehicle location, regular routes taken, and duration of stay.
 Coordinated attack on vehicles & infrastructure, Denial of Service, Internet & wireless (jamming)
 Ransomware restricting the use of features or using as DDoS attack node against infrastructure
 Exploit a CV’s weak cryptographic features or unchanged/weak passwords
 Spoof the vehicle’s sensors (e.g., LIDAR, GPS)
 Reverse engineer CVs firmware, modify MCUs to bypass security controls or change functionality
 Physically interface with a CV (e.g. via its USB port) to install malware
 Learning protected information e.g. Private keys using cryptanalysis of algorithms/signed
messages
 Re-playing system message at a different (than original) time and/or location.
 Modifying the sensor inputs on a single or multiple vehicles before the vehicle uses them to
generate and send system messages (For example, by GPS spoofing)
Recommendations for securing the Connected Vehicle Environment
Securing the overall ecosystem of CVs requires coordinated planning and execution across multiple
stakeholders like OEMs, suppliers, aftermarket developers, Controlling & Compliance authorities or
Government Institutions. Guidance is needed at various layers of the technology stack on:
 Security of the CV platforms, which includes:
• Protection of control systems (CANBus, OBD-II port access, OBE)
• Protection of Infotainment Systems
• Protection against use of insecure third-party devices and applications
• Recommendations about software security engineering
• Hardware security controls (e.g., to protect MCUs)
• Software Maintenance
 Security of the smartphone applications interacting with vehicles and communication systems
 Events monitoring , Authentication/Authorization & cryptographic key management methods
 Security of messaging and communication protocols for interaction (e.g., DSRC, cloud , 5G)
Recommended Security Counter Measures
 Key Management, Crypto Modules, Libraries and Protocols
 Strong random number generators (RNGs)
 Protections for cryptographic keys including secure storage and Zeroization capability
 Support for key Transfer & management and management of certificate trust anchors.
 Root chain validation for the certificate issued by any trusted party.
 Hardware Security Modules (HSMs) and tamper protection.
 Bluetooth Low Energy (BLE) protocol offers flexible options for pairing devices, including a
mode that requires mutual authentication. Designs must include secure pairing mechanisms.
 Strong Segmentation, Secure Updates & Data Integrity
 Multiple CAN busses separating safety-critical features (brakes, lane detection) from non-
safety-critical features (like door controls, lights).
 Secure Update Processes & Recovery for Failed Rollbacks
 Maintaining data integrity (e.g. Vehicle readings) to avoid spoofing/manipulation.
 Using pool of certificates that digitally sign all message traffic originating from an OBE.
 API Security Guidelines for authenticating transactions, encrypting and integrity checking.
 Access Control with the concept of “least privilege” and ‘need to know’ or ‘need to have’
 Mobile Application Security Certificate pinning to prevent man-in-the-middle (MITM) attacks
over untrusted networks.
 Interface Filtering
 Filtering of all interface traffic
 prevention of malformed messages from being transmitted
 Defining and bounding the data types which can be included in messages.
 Compromise or Misbehavior Detection
 Who is responsible for misbehavior detection?
 Can APIs support new methods for communicating misbehavior?
 Monitoring of driver habits using Pseudonym Certificate Authorities and specialized devices
like Location Obscurer Proxies (LOPs).
 Continued Research and Development
 BlockChain as an alternative mechanism for applying integrity and authenticity protections
like Guardtime’s Keyless Signature Infrastructure (KSI).
 Evaluation of Certificate Transparency (CT) logs which can help certificate authorities (CAs)
determine if certificates have been mistakenly issued or maliciously used
 Analytics on
o Safety data (edge cases, near-misses, early warning, crash reconstruction)
o Maintenance and monitoring (OTA firmware/software updates, prognostics)
o Traffic operations (Speed harmonization, signal priority, routing, incident management)
o Situational awareness (HD maps, objects and events, cooperative localization)
Areas needing Attention due to such Vulnerabilities
 Vehicle to wider Network: Encryption, VPN, Secure Tunnel to OEM
 In Vehicle Protection: Firewall, Intrusion Prevention, Anti-virus/Malware protection
 On Demand Secure Connectivity: V2V, V2I, V2X
 Easy of Deploy and to Manage: Centralized Identity and Policy Management, Authentication,
Authorization, Accounting
Technical challenges
Some of the obstacles assessed overtime for CV eco-system to overcome are:
 Testing every conceivable scenario
 Understanding unusual situations
 Cybersecurity – the vehicle must be impregnable
 Interaction between driver, vehicle and eco-system
 Liability, both civil and criminal, for the crashes when the car is in control
Data Ownership and Regulations
In this era of heightened technical advancement, personal data is particularly sensitive, as it is subjected
to data protection legislation. Especially Telematics data which creates understandable concerns about
whether third-parties will have equal and open access to this data at little or no extra cost.
 An innocent e-Com application onboard car Headunit, may be tuned to exchange some corporate
information, work-related communications and financial info like credit card information
 An individual vehicle’s control systems can be targeted or chained in an attack involving personal
information of drivers and passengers.
With increasing connectivity and integration among the connected car, other devices and infrastructure,
vehicles have access to volumes of information. With loads of data being collected, Automakers & OEMs
face new set of challenges about data usage and ownership. What data to collect and what to not, what
may need a consent? Any laws or regulations regarding allowed data uses?
Also the important question, where does all of this data go? Complexity gets further magnified by multiple
clouds being interconnected. The data could very well gets shared across different industry stakeholders
(and their respective clouds) like Carmakers, Content delivery entities, advertisers, regulatory or
governmental organizations.
The OEM or a carmaker, may well be responsible to the consumer for the use and distribution the data.
One day, the Consumer may well ask to revoke the right to use such data, in that case it must be revoked
across the ecosystem. This is huge, since it means the whereabouts of this data, the entire trail much be
known so that it can be managed.
Author feels that in 2nd phase of Connected Vehicle Evolution, all clouds of concerns will be clear
clearing a way for 3rd phase of Real world of Connected and Autonomous vehicles.

More Related Content

What's hot

Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
150 0046-001 cost-lte_outages_industryinsights_final
150 0046-001 cost-lte_outages_industryinsights_final150 0046-001 cost-lte_outages_industryinsights_final
150 0046-001 cost-lte_outages_industryinsights_finalTerry Young
 
Android security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesAndroid security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesLeMeniz Infotech
 
Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Ankit Singh
 
Owasp top-10-mobile-risks-v-1-3 publish
Owasp top-10-mobile-risks-v-1-3 publishOwasp top-10-mobile-risks-v-1-3 publish
Owasp top-10-mobile-risks-v-1-3 publishAli Kazmi
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET Journal
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor AuthenticationRonnie Isherwood
 
NSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsNSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsRonald Bartels
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Controljwpiccininni
 
Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networksPositiveTechnologies
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET Journal
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution TaarakMohit8780
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationPositiveTechnologies
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market TrendsForgeRock
 
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsMuhammad FAHAD
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor AuthenticationDilip Kr. Jangir
 
Anti-Fraud Datasheet
Anti-Fraud DatasheetAnti-Fraud Datasheet
Anti-Fraud DatasheetMani Rai
 

What's hot (20)

Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
150 0046-001 cost-lte_outages_industryinsights_final
150 0046-001 cost-lte_outages_industryinsights_final150 0046-001 cost-lte_outages_industryinsights_final
150 0046-001 cost-lte_outages_industryinsights_final
 
Android security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesAndroid security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defenses
 
Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)
 
Owasp top-10-mobile-risks-v-1-3 publish
Owasp top-10-mobile-risks-v-1-3 publishOwasp top-10-mobile-risks-v-1-3 publish
Owasp top-10-mobile-risks-v-1-3 publish
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
 
Multi factor authentication issa0415-x9
Multi factor authentication issa0415-x9Multi factor authentication issa0415-x9
Multi factor authentication issa0415-x9
 
NSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threatsNSA advisory about state sponsored cybersecurity threats
NSA advisory about state sponsored cybersecurity threats
 
Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networks
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
 
CA Day 2014
CA Day 2014 CA Day 2014
CA Day 2014
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market Trends
 
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control Systems
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
Anti-Fraud Datasheet
Anti-Fraud DatasheetAnti-Fraud Datasheet
Anti-Fraud Datasheet
 

Similar to Connected vehicles: An Overview on Security, Vulnerabilities and Remedies

Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive IndustrySasken Technologies Ltd.
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWKapil Kanugo
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsSymantec
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...IJCI JOURNAL
 
IRJET- Automative Impregnable Driving System
IRJET-  	  Automative Impregnable Driving SystemIRJET-  	  Automative Impregnable Driving System
IRJET- Automative Impregnable Driving SystemIRJET Journal
 
Classification and review of security schemes
Classification and review of security schemesClassification and review of security schemes
Classification and review of security schemesHabitamuAsimare
 
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDRELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDIJCI JOURNAL
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersFireEye, Inc.
 
connected-cars-the-open-road-for-hackers
connected-cars-the-open-road-for-hackersconnected-cars-the-open-road-for-hackers
connected-cars-the-open-road-for-hackersChristopher Porter
 
Connected Cars - The Open Road for Hackers
Connected Cars - The Open Road for HackersConnected Cars - The Open Road for Hackers
Connected Cars - The Open Road for HackersNick Rossmann
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securitypptSachin Roy
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfDorleControls
 
Prevent Automotive Counterfeiting with Secure Authentication
Prevent Automotive Counterfeiting with Secure AuthenticationPrevent Automotive Counterfeiting with Secure Authentication
Prevent Automotive Counterfeiting with Secure AuthenticationAbacus Technologies
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)ParthaS
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromeSAT Publishing House
 
10 embedded systems1
10 embedded systems110 embedded systems1
10 embedded systems1vinodanytime
 
A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV IJECEIAES
 
Yared Hankins Wireless Key
Yared Hankins Wireless KeyYared Hankins Wireless Key
Yared Hankins Wireless Keysolvecore
 

Similar to Connected vehicles: An Overview on Security, Vulnerabilities and Remedies (20)

Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive Industry
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
 
Algorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous CarsAlgorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous Cars
 
IRJET- Automative Impregnable Driving System
IRJET-  	  Automative Impregnable Driving SystemIRJET-  	  Automative Impregnable Driving System
IRJET- Automative Impregnable Driving System
 
Classification and review of security schemes
Classification and review of security schemesClassification and review of security schemes
Classification and review of security schemes
 
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDRELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For Hackers
 
connected-cars-the-open-road-for-hackers
connected-cars-the-open-road-for-hackersconnected-cars-the-open-road-for-hackers
connected-cars-the-open-road-for-hackers
 
Connected Cars - The Open Road for Hackers
Connected Cars - The Open Road for HackersConnected Cars - The Open Road for Hackers
Connected Cars - The Open Road for Hackers
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securityppt
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdf
 
Prevent Automotive Counterfeiting with Secure Authentication
Prevent Automotive Counterfeiting with Secure AuthenticationPrevent Automotive Counterfeiting with Secure Authentication
Prevent Automotive Counterfeiting with Secure Authentication
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents from
 
10 embedded systems1
10 embedded systems110 embedded systems1
10 embedded systems1
 
A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV
 
Final report
Final reportFinal report
Final report
 
Yared Hankins Wireless Key
Yared Hankins Wireless KeyYared Hankins Wireless Key
Yared Hankins Wireless Key
 

Recently uploaded

GREEN VEHICLES the kids picture show 2024
GREEN VEHICLES the kids picture show 2024GREEN VEHICLES the kids picture show 2024
GREEN VEHICLES the kids picture show 2024AHOhOops1
 
Alia +91-9537192988-Experience the Unmatchable Pleasure with Model Ahmedabad ...
Alia +91-9537192988-Experience the Unmatchable Pleasure with Model Ahmedabad ...Alia +91-9537192988-Experience the Unmatchable Pleasure with Model Ahmedabad ...
Alia +91-9537192988-Experience the Unmatchable Pleasure with Model Ahmedabad ...Niya Khan
 
Delhi Call Girls East Of Kailash 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls East Of Kailash 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls East Of Kailash 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls East Of Kailash 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP Kolkata Call Girl Kasba 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kasba 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kasba 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kasba 👉 8250192130 Available With Roomdivyansh0kumar0
 
Hyundai World Rally Team in action at 2024 WRC
Hyundai World Rally Team in action at 2024 WRCHyundai World Rally Team in action at 2024 WRC
Hyundai World Rally Team in action at 2024 WRCHyundai Motor Group
 
Vip Hot🥵 Call Girls Delhi Delhi {9711199012} Avni Thakur 🧡😘 High Profile Girls
Vip Hot🥵 Call Girls Delhi Delhi {9711199012} Avni Thakur 🧡😘 High Profile GirlsVip Hot🥵 Call Girls Delhi Delhi {9711199012} Avni Thakur 🧡😘 High Profile Girls
Vip Hot🥵 Call Girls Delhi Delhi {9711199012} Avni Thakur 🧡😘 High Profile Girlsshivangimorya083
 
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhiHauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhiHot Call Girls In Sector 58 (Noida)
 
新南威尔士大学毕业证(UNSW毕业证)成绩单原版一比一
新南威尔士大学毕业证(UNSW毕业证)成绩单原版一比一新南威尔士大学毕业证(UNSW毕业证)成绩单原版一比一
新南威尔士大学毕业证(UNSW毕业证)成绩单原版一比一nsrmw5ykn
 
꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...
꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...
꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...Hot Call Girls In Sector 58 (Noida)
 
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...shivangimorya083
 
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdfSales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdfAggregage
 
如何办理爱尔兰都柏林大学毕业证(UCD毕业证) 成绩单原版一比一
如何办理爱尔兰都柏林大学毕业证(UCD毕业证) 成绩单原版一比一如何办理爱尔兰都柏林大学毕业证(UCD毕业证) 成绩单原版一比一
如何办理爱尔兰都柏林大学毕业证(UCD毕业证) 成绩单原版一比一mjyguplun
 
The 10th anniversary, Hyundai World Rally Team's amazing journey
The 10th anniversary, Hyundai World Rally Team's amazing journeyThe 10th anniversary, Hyundai World Rally Team's amazing journey
The 10th anniversary, Hyundai World Rally Team's amazing journeyHyundai Motor Group
 
加拿大温尼伯大学毕业证(UBC毕业证书)成绩单原版一比一
加拿大温尼伯大学毕业证(UBC毕业证书)成绩单原版一比一加拿大温尼伯大学毕业证(UBC毕业证书)成绩单原版一比一
加拿大温尼伯大学毕业证(UBC毕业证书)成绩单原版一比一nsrmw5ykn
 
(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...
(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...
(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...Hot Call Girls In Sector 58 (Noida)
 
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Full night Service for more than 1 person
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Full night Service for more than 1 personDelhi Call Girls Saket 9711199171 ☎✔👌✔ Full night Service for more than 1 person
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Full night Service for more than 1 personshivangimorya083
 
Call me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
Call me @ 9892124323 Call Girl in Andheri East With Free Home DeliveryCall me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
Call me @ 9892124323 Call Girl in Andheri East With Free Home DeliveryPooja Nehwal
 
VIP Russian Call Girls in Jamshedpur Deepika 8250192130 Independent Escort Se...
VIP Russian Call Girls in Jamshedpur Deepika 8250192130 Independent Escort Se...VIP Russian Call Girls in Jamshedpur Deepika 8250192130 Independent Escort Se...
VIP Russian Call Girls in Jamshedpur Deepika 8250192130 Independent Escort Se...Suhani Kapoor
 
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111Sapana Sha
 

Recently uploaded (20)

GREEN VEHICLES the kids picture show 2024
GREEN VEHICLES the kids picture show 2024GREEN VEHICLES the kids picture show 2024
GREEN VEHICLES the kids picture show 2024
 
Alia +91-9537192988-Experience the Unmatchable Pleasure with Model Ahmedabad ...
Alia +91-9537192988-Experience the Unmatchable Pleasure with Model Ahmedabad ...Alia +91-9537192988-Experience the Unmatchable Pleasure with Model Ahmedabad ...
Alia +91-9537192988-Experience the Unmatchable Pleasure with Model Ahmedabad ...
 
Delhi Call Girls East Of Kailash 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls East Of Kailash 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls East Of Kailash 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls East Of Kailash 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP Kolkata Call Girl Kasba 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kasba 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kasba 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kasba 👉 8250192130 Available With Room
 
Hyundai World Rally Team in action at 2024 WRC
Hyundai World Rally Team in action at 2024 WRCHyundai World Rally Team in action at 2024 WRC
Hyundai World Rally Team in action at 2024 WRC
 
Vip Hot🥵 Call Girls Delhi Delhi {9711199012} Avni Thakur 🧡😘 High Profile Girls
Vip Hot🥵 Call Girls Delhi Delhi {9711199012} Avni Thakur 🧡😘 High Profile GirlsVip Hot🥵 Call Girls Delhi Delhi {9711199012} Avni Thakur 🧡😘 High Profile Girls
Vip Hot🥵 Call Girls Delhi Delhi {9711199012} Avni Thakur 🧡😘 High Profile Girls
 
Stay Cool and Compliant: Know Your Window Tint Laws Before You Tint
Stay Cool and Compliant: Know Your Window Tint Laws Before You TintStay Cool and Compliant: Know Your Window Tint Laws Before You Tint
Stay Cool and Compliant: Know Your Window Tint Laws Before You Tint
 
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhiHauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
 
新南威尔士大学毕业证(UNSW毕业证)成绩单原版一比一
新南威尔士大学毕业证(UNSW毕业证)成绩单原版一比一新南威尔士大学毕业证(UNSW毕业证)成绩单原版一比一
新南威尔士大学毕业证(UNSW毕业证)成绩单原版一比一
 
꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...
꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...
꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...
 
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
 
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdfSales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
 
如何办理爱尔兰都柏林大学毕业证(UCD毕业证) 成绩单原版一比一
如何办理爱尔兰都柏林大学毕业证(UCD毕业证) 成绩单原版一比一如何办理爱尔兰都柏林大学毕业证(UCD毕业证) 成绩单原版一比一
如何办理爱尔兰都柏林大学毕业证(UCD毕业证) 成绩单原版一比一
 
The 10th anniversary, Hyundai World Rally Team's amazing journey
The 10th anniversary, Hyundai World Rally Team's amazing journeyThe 10th anniversary, Hyundai World Rally Team's amazing journey
The 10th anniversary, Hyundai World Rally Team's amazing journey
 
加拿大温尼伯大学毕业证(UBC毕业证书)成绩单原版一比一
加拿大温尼伯大学毕业证(UBC毕业证书)成绩单原版一比一加拿大温尼伯大学毕业证(UBC毕业证书)成绩单原版一比一
加拿大温尼伯大学毕业证(UBC毕业证书)成绩单原版一比一
 
(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...
(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...
(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...
 
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Full night Service for more than 1 person
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Full night Service for more than 1 personDelhi Call Girls Saket 9711199171 ☎✔👌✔ Full night Service for more than 1 person
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Full night Service for more than 1 person
 
Call me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
Call me @ 9892124323 Call Girl in Andheri East With Free Home DeliveryCall me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
Call me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
 
VIP Russian Call Girls in Jamshedpur Deepika 8250192130 Independent Escort Se...
VIP Russian Call Girls in Jamshedpur Deepika 8250192130 Independent Escort Se...VIP Russian Call Girls in Jamshedpur Deepika 8250192130 Independent Escort Se...
VIP Russian Call Girls in Jamshedpur Deepika 8250192130 Independent Escort Se...
 
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
 

Connected vehicles: An Overview on Security, Vulnerabilities and Remedies

  • 1. Connected Vehicles: An Overview on Security, Vulnerabilities and Remedies Connected Vehicles – Some not so Great Stories We all heard of July 2015 story where Ethical Hackers, took control of a 2014 Jeep Cherokee’s steering remotely, even turning off the car’s transmission and drove it into a ditch. It led to recall of 8,000 Jeeps (2015 Renegades). Similarly, August 2015 saw, researchers taking control of a Tesla Model S and turing it off at low speed. More server and tragic, in May 2016, a driver was killed in an accident involving autonomous feature guided car. In a more controlled environment, Tesla’s Bug Bounty Program in September 2016 discovered a major security flaw. In February 2017, a “simulated hack” reportedly disabled a number of different Connected Vehicles of different models in UK. Recent reports on thefts using Remote Keyless Entry vulnerabilities, amplifying the generated signals or intercepting the door-opening code for later playback were common sometime back. But Evolution happens with history of Bad Stories Just like any new technology, like Smart cards, its all about consumer trust. If people trust their connected car—to keep them safe, to make their lives easier, and to treat their information appropriately— the may willingly give up their information. Likewise, they expect their data to remain private and secure, Vulnerability Areas Relatively common features such as 1. Remote Key and Keyless Access 2. Bluetooth Connectivity (Chesterfield County municipality, VA, forbids Bluetooth in Govt. vehicles) 3. OBD Ports 4. Wi-Fi, DSRC, Cellular, NFC connection 5. Unauthorized Infrastructure Signaling All above could all contribute to the vulnerability of a vehicle, forming part of a potential “attack surface”. Even over-the-air (OTA) updates to close the vulnerability are vulnerable to hacker target. Like what we saw in Jeep’s case, sending a USB stick with self-installing firmware updates to the user, or doing updates only in secure locations by the car dealer, is often the best solution. It isn’t just the electronic control units (ECUs) deep within the vehicle itself that can be dangerous if hacked. Instead, relatively harmless appearing Infotainment unit hacking can kill if the driver is distracted or surprised at the wrong time. Its an easy target due to the connectivity it requires from various web services (Weather, Traffic, Streaming Audio etc). All it takes is a single vulnerability (e.g., misconfigured server, unencrypted API call) for an attacker to exploit the rest of the system. Devices plugged into a vehicle’s on-board diagnostics port (OBD-II) may contain a GPS receiver, cellular chip etc. They can communicate with vehicle’s CAN bus as well as with service provider to share data on vehicle’s operation. A remote, unauthenticated attacker may be able to execute arbitrary code on the device causing vehicle damage or injuries if the device is compromised. Enabling connectivity to once- closed CAN bus can result in harmful effects if security engineering principles are not properly applied. Reasons for such Vulnerabilities
  • 2. In 1st phase of Connected Vehicle evolution, automakers added more and more technology components, but soon realized that they had to protect their systems since secure architecture was not at fore front while designing these systems. Instead what was the easiest and cheapest way to do that? Add layer over layer, patch over patch of security across a single, flat network. That is a problem. In a connected car, all systems share a network, meaning if you access one you may be able to access them all. In real life, this means a hacker might be able to expose vulnerabilities in a driver’s smart phone to steal information from vehicle systems the device is connected to or even take control of a car’s operational systems, like its engines and brakes. Why there are Concerns for Vehicle’s Telematics Data Security and privacy concerns surrounding connected car technologies affect not only the individual consumers but also corporate, municipal, law enforcement and other business and government interests. Telematics systems that track and wirelessly communicate the location, movement, behavior and health of a vehicle in real time are most vulnerable components of the Connective-Vehicle eco-system. Following are some of the example attacks. Results can vary from controlling vehicle’s non-safety-critical operations, disabling critical or non-critical systems controls to potentially loosing total control. Attack  Exploit an unauthenticated API (e.g., remote features) used in a CV  Exploit a vulnerability in a mobile application used to connect to a CV  Monitor a CV’s messaging traffic for an extended period of time  Knowledge of vehicle location, regular routes taken, and duration of stay.  Coordinated attack on vehicles & infrastructure, Denial of Service, Internet & wireless (jamming)  Ransomware restricting the use of features or using as DDoS attack node against infrastructure  Exploit a CV’s weak cryptographic features or unchanged/weak passwords  Spoof the vehicle’s sensors (e.g., LIDAR, GPS)  Reverse engineer CVs firmware, modify MCUs to bypass security controls or change functionality  Physically interface with a CV (e.g. via its USB port) to install malware  Learning protected information e.g. Private keys using cryptanalysis of algorithms/signed messages  Re-playing system message at a different (than original) time and/or location.  Modifying the sensor inputs on a single or multiple vehicles before the vehicle uses them to generate and send system messages (For example, by GPS spoofing) Recommendations for securing the Connected Vehicle Environment Securing the overall ecosystem of CVs requires coordinated planning and execution across multiple stakeholders like OEMs, suppliers, aftermarket developers, Controlling & Compliance authorities or Government Institutions. Guidance is needed at various layers of the technology stack on:  Security of the CV platforms, which includes: • Protection of control systems (CANBus, OBD-II port access, OBE) • Protection of Infotainment Systems • Protection against use of insecure third-party devices and applications • Recommendations about software security engineering • Hardware security controls (e.g., to protect MCUs) • Software Maintenance  Security of the smartphone applications interacting with vehicles and communication systems  Events monitoring , Authentication/Authorization & cryptographic key management methods  Security of messaging and communication protocols for interaction (e.g., DSRC, cloud , 5G)
  • 3. Recommended Security Counter Measures  Key Management, Crypto Modules, Libraries and Protocols  Strong random number generators (RNGs)  Protections for cryptographic keys including secure storage and Zeroization capability  Support for key Transfer & management and management of certificate trust anchors.  Root chain validation for the certificate issued by any trusted party.  Hardware Security Modules (HSMs) and tamper protection.  Bluetooth Low Energy (BLE) protocol offers flexible options for pairing devices, including a mode that requires mutual authentication. Designs must include secure pairing mechanisms.  Strong Segmentation, Secure Updates & Data Integrity  Multiple CAN busses separating safety-critical features (brakes, lane detection) from non- safety-critical features (like door controls, lights).  Secure Update Processes & Recovery for Failed Rollbacks  Maintaining data integrity (e.g. Vehicle readings) to avoid spoofing/manipulation.  Using pool of certificates that digitally sign all message traffic originating from an OBE.  API Security Guidelines for authenticating transactions, encrypting and integrity checking.  Access Control with the concept of “least privilege” and ‘need to know’ or ‘need to have’  Mobile Application Security Certificate pinning to prevent man-in-the-middle (MITM) attacks over untrusted networks.  Interface Filtering  Filtering of all interface traffic  prevention of malformed messages from being transmitted  Defining and bounding the data types which can be included in messages.  Compromise or Misbehavior Detection  Who is responsible for misbehavior detection?  Can APIs support new methods for communicating misbehavior?  Monitoring of driver habits using Pseudonym Certificate Authorities and specialized devices like Location Obscurer Proxies (LOPs).  Continued Research and Development  BlockChain as an alternative mechanism for applying integrity and authenticity protections like Guardtime’s Keyless Signature Infrastructure (KSI).  Evaluation of Certificate Transparency (CT) logs which can help certificate authorities (CAs) determine if certificates have been mistakenly issued or maliciously used  Analytics on o Safety data (edge cases, near-misses, early warning, crash reconstruction) o Maintenance and monitoring (OTA firmware/software updates, prognostics) o Traffic operations (Speed harmonization, signal priority, routing, incident management) o Situational awareness (HD maps, objects and events, cooperative localization) Areas needing Attention due to such Vulnerabilities  Vehicle to wider Network: Encryption, VPN, Secure Tunnel to OEM  In Vehicle Protection: Firewall, Intrusion Prevention, Anti-virus/Malware protection  On Demand Secure Connectivity: V2V, V2I, V2X
  • 4.  Easy of Deploy and to Manage: Centralized Identity and Policy Management, Authentication, Authorization, Accounting Technical challenges Some of the obstacles assessed overtime for CV eco-system to overcome are:  Testing every conceivable scenario  Understanding unusual situations  Cybersecurity – the vehicle must be impregnable  Interaction between driver, vehicle and eco-system  Liability, both civil and criminal, for the crashes when the car is in control Data Ownership and Regulations In this era of heightened technical advancement, personal data is particularly sensitive, as it is subjected to data protection legislation. Especially Telematics data which creates understandable concerns about whether third-parties will have equal and open access to this data at little or no extra cost.  An innocent e-Com application onboard car Headunit, may be tuned to exchange some corporate information, work-related communications and financial info like credit card information  An individual vehicle’s control systems can be targeted or chained in an attack involving personal information of drivers and passengers. With increasing connectivity and integration among the connected car, other devices and infrastructure, vehicles have access to volumes of information. With loads of data being collected, Automakers & OEMs face new set of challenges about data usage and ownership. What data to collect and what to not, what may need a consent? Any laws or regulations regarding allowed data uses? Also the important question, where does all of this data go? Complexity gets further magnified by multiple clouds being interconnected. The data could very well gets shared across different industry stakeholders (and their respective clouds) like Carmakers, Content delivery entities, advertisers, regulatory or governmental organizations. The OEM or a carmaker, may well be responsible to the consumer for the use and distribution the data. One day, the Consumer may well ask to revoke the right to use such data, in that case it must be revoked across the ecosystem. This is huge, since it means the whereabouts of this data, the entire trail much be known so that it can be managed. Author feels that in 2nd phase of Connected Vehicle Evolution, all clouds of concerns will be clear clearing a way for 3rd phase of Real world of Connected and Autonomous vehicles.