SlideShare a Scribd company logo
1 of 9
SecureIoT
Connected Vehicles
21.10.2020
This project has received funding from the European Union’s
Horizon 2020 research and innovation programme under
grant agreement No 779899
• The modern vehicle is a complex architecture
of interconnected subsystems
• To keep up with market demand, connectivity
is progressively integrated
into the vehicle.
Connected Vehicle
The Connected Vehicle at risk
SecureIoT – Connected / Autonomous Vehicles
The Connected Vehicle at risk
Example: Jeep Cherokee Attack
• Remote (internet) control over a targeted vehicle
• Malicious actors could take control over vehicle functionality
• Vulnerability affected thousands of vehicles
Attack-Surface
• Telematics unit of vehicle was accessible over IP
• This unit was connected to other vehicle subsystems
• Such systems involved control of critical vehicle functionality.
• Knowledge of the IP address allows malicious actors to remotely
influence vehicle functionality while on the road
SecureIoT – Connected / Autonomous Vehicles
SecureIoT capabilities
• Security of the operating status is unknown.
We must observe the operation independently of the
vehicle systems. SecureIoT is independent observer and
analyst
• Process Monitoring - Detection of process anomalies
(Security Analytics) monitors process data to:
• detect attacks
• detect abnormal use by driver
• detect abnormal vehicle behaviour in early stage
supporting predictive maintenance
• Trustworthiness enables Secure Access (Developer Support)
• Automated IIoT Configuration Audit (Compliance Audit)
SecureIoT – Connected / Autonomous Vehicles
SecureIoT capabilities
• Probes deployed at both the vehicle and IoT platform
• Enables intimate analytics and integration with SecureIoT
SECaaS.
SecureIoT – Continuous OT Security Monitoring
SecureIoT – Detection and Prediction of Attacks
The Connected Vehicle at risk
Part
Order
Attack
Attack
Attacker
• Attacking at the vehicle level
• Attacking at the IoT infrastructure
Connected Vehicle Telematics Unit
Attack
Vehicle OBU (Telematics Unit)
• Uploading data (e.g. Insurance Pay as You Drive)
• Interacting with other vehicle systems
• Edge level aggregation
IoT Platform
• Ingest data from vehicles
• ML based on vehicle
information
Takeaways
Vehicles developed now must be able to
handle the vulnerabilities in 5-10 years
time.
Innovative attacks require extraordinary
detection and analytics
Integration with SecureIoT can monitor the
data at several layers of the data inception
and delivery.
Benefit of knowledge of similar attacks
methods in other industries.
Thank you

More Related Content

Similar to SecureΙοΤ CCAD use case pitch presentation

autonomous vehicles org ppt.pptx
autonomous vehicles org ppt.pptxautonomous vehicles org ppt.pptx
autonomous vehicles org ppt.pptxADISHPRAMOD
 
SOFTWARE REQUIREMENT SPECIFICATION.pptx
SOFTWARE REQUIREMENT SPECIFICATION.pptxSOFTWARE REQUIREMENT SPECIFICATION.pptx
SOFTWARE REQUIREMENT SPECIFICATION.pptxAnmolMogalai
 
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET Journal
 
Connected Vehicles: An Overview on Evolution, Challenges, Forecasts and Trends
Connected Vehicles: An Overview on Evolution, Challenges, Forecasts and TrendsConnected Vehicles: An Overview on Evolution, Challenges, Forecasts and Trends
Connected Vehicles: An Overview on Evolution, Challenges, Forecasts and TrendsMadhur Gupta
 
Key Technologies Impacting Autonomous Driving
Key Technologies Impacting Autonomous DrivingKey Technologies Impacting Autonomous Driving
Key Technologies Impacting Autonomous Drivingmanoharparakh
 
IRJET- Vehicle Security System using IoT Application
IRJET-  	  Vehicle Security System using IoT ApplicationIRJET-  	  Vehicle Security System using IoT Application
IRJET- Vehicle Security System using IoT ApplicationIRJET Journal
 
Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?Gilad Bandel
 
Key Technologies for Autonomous Driving
Key Technologies for Autonomous DrivingKey Technologies for Autonomous Driving
Key Technologies for Autonomous Drivingmanoharparakh
 
IRJET- Automative Impregnable Driving System
IRJET-  	  Automative Impregnable Driving SystemIRJET-  	  Automative Impregnable Driving System
IRJET- Automative Impregnable Driving SystemIRJET Journal
 
Internet of Things Based Vehicle Monitoring System
Internet of Things Based Vehicle Monitoring SystemInternet of Things Based Vehicle Monitoring System
Internet of Things Based Vehicle Monitoring SystemIRJET Journal
 
IoT in Transportation Sector
IoT in Transportation SectorIoT in Transportation Sector
IoT in Transportation SectorMd. Sohag Miah
 
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road MapSecurity and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road MapMaanak Gupta, Ph.D.
 
IRJET- Vehicle Detection and Tracking System IoT based: A Review
IRJET- Vehicle Detection and Tracking System IoT based: A ReviewIRJET- Vehicle Detection and Tracking System IoT based: A Review
IRJET- Vehicle Detection and Tracking System IoT based: A ReviewIRJET Journal
 
Airport Its Design Guide R1.3
Airport Its Design Guide R1.3Airport Its Design Guide R1.3
Airport Its Design Guide R1.3Peter Ashley
 
management system live gps tracking system.pptx
management system live gps tracking system.pptxmanagement system live gps tracking system.pptx
management system live gps tracking system.pptx21ccu104
 
IRJET - Smart Transportation Monitoring System
IRJET - Smart Transportation Monitoring SystemIRJET - Smart Transportation Monitoring System
IRJET - Smart Transportation Monitoring SystemIRJET Journal
 

Similar to SecureΙοΤ CCAD use case pitch presentation (20)

autonomous vehicles org ppt.pptx
autonomous vehicles org ppt.pptxautonomous vehicles org ppt.pptx
autonomous vehicles org ppt.pptx
 
What is Telematics & How Does It Work?
What is Telematics & How Does It Work?What is Telematics & How Does It Work?
What is Telematics & How Does It Work?
 
SOFTWARE REQUIREMENT SPECIFICATION.pptx
SOFTWARE REQUIREMENT SPECIFICATION.pptxSOFTWARE REQUIREMENT SPECIFICATION.pptx
SOFTWARE REQUIREMENT SPECIFICATION.pptx
 
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
 
Connected Vehicles: An Overview on Evolution, Challenges, Forecasts and Trends
Connected Vehicles: An Overview on Evolution, Challenges, Forecasts and TrendsConnected Vehicles: An Overview on Evolution, Challenges, Forecasts and Trends
Connected Vehicles: An Overview on Evolution, Challenges, Forecasts and Trends
 
Key Technologies Impacting Autonomous Driving
Key Technologies Impacting Autonomous DrivingKey Technologies Impacting Autonomous Driving
Key Technologies Impacting Autonomous Driving
 
IRJET- Vehicle Security System using IoT Application
IRJET-  	  Vehicle Security System using IoT ApplicationIRJET-  	  Vehicle Security System using IoT Application
IRJET- Vehicle Security System using IoT Application
 
Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?
 
Key Technologies for Autonomous Driving
Key Technologies for Autonomous DrivingKey Technologies for Autonomous Driving
Key Technologies for Autonomous Driving
 
IRJET- Automative Impregnable Driving System
IRJET-  	  Automative Impregnable Driving SystemIRJET-  	  Automative Impregnable Driving System
IRJET- Automative Impregnable Driving System
 
Internet of Things Based Vehicle Monitoring System
Internet of Things Based Vehicle Monitoring SystemInternet of Things Based Vehicle Monitoring System
Internet of Things Based Vehicle Monitoring System
 
IoT in Transportation Sector
IoT in Transportation SectorIoT in Transportation Sector
IoT in Transportation Sector
 
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road MapSecurity and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
 
Attinad Software IoT offerings
Attinad Software IoT offeringsAttinad Software IoT offerings
Attinad Software IoT offerings
 
IoT Connected Car Insights from Patents
IoT Connected Car Insights from PatentsIoT Connected Car Insights from Patents
IoT Connected Car Insights from Patents
 
IRJET- Vehicle Detection and Tracking System IoT based: A Review
IRJET- Vehicle Detection and Tracking System IoT based: A ReviewIRJET- Vehicle Detection and Tracking System IoT based: A Review
IRJET- Vehicle Detection and Tracking System IoT based: A Review
 
Strategies to Develop In-Vehicle Infotainment System
Strategies to Develop In-Vehicle Infotainment SystemStrategies to Develop In-Vehicle Infotainment System
Strategies to Develop In-Vehicle Infotainment System
 
Airport Its Design Guide R1.3
Airport Its Design Guide R1.3Airport Its Design Guide R1.3
Airport Its Design Guide R1.3
 
management system live gps tracking system.pptx
management system live gps tracking system.pptxmanagement system live gps tracking system.pptx
management system live gps tracking system.pptx
 
IRJET - Smart Transportation Monitoring System
IRJET - Smart Transportation Monitoring SystemIRJET - Smart Transportation Monitoring System
IRJET - Smart Transportation Monitoring System
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

SecureΙοΤ CCAD use case pitch presentation

  • 1. SecureIoT Connected Vehicles 21.10.2020 This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 779899
  • 2. • The modern vehicle is a complex architecture of interconnected subsystems • To keep up with market demand, connectivity is progressively integrated into the vehicle. Connected Vehicle The Connected Vehicle at risk
  • 3. SecureIoT – Connected / Autonomous Vehicles The Connected Vehicle at risk Example: Jeep Cherokee Attack • Remote (internet) control over a targeted vehicle • Malicious actors could take control over vehicle functionality • Vulnerability affected thousands of vehicles Attack-Surface • Telematics unit of vehicle was accessible over IP • This unit was connected to other vehicle subsystems • Such systems involved control of critical vehicle functionality. • Knowledge of the IP address allows malicious actors to remotely influence vehicle functionality while on the road
  • 4. SecureIoT – Connected / Autonomous Vehicles SecureIoT capabilities • Security of the operating status is unknown. We must observe the operation independently of the vehicle systems. SecureIoT is independent observer and analyst • Process Monitoring - Detection of process anomalies (Security Analytics) monitors process data to: • detect attacks • detect abnormal use by driver • detect abnormal vehicle behaviour in early stage supporting predictive maintenance • Trustworthiness enables Secure Access (Developer Support) • Automated IIoT Configuration Audit (Compliance Audit)
  • 5. SecureIoT – Connected / Autonomous Vehicles SecureIoT capabilities • Probes deployed at both the vehicle and IoT platform • Enables intimate analytics and integration with SecureIoT SECaaS.
  • 6. SecureIoT – Continuous OT Security Monitoring
  • 7. SecureIoT – Detection and Prediction of Attacks The Connected Vehicle at risk Part Order Attack Attack Attacker • Attacking at the vehicle level • Attacking at the IoT infrastructure Connected Vehicle Telematics Unit Attack Vehicle OBU (Telematics Unit) • Uploading data (e.g. Insurance Pay as You Drive) • Interacting with other vehicle systems • Edge level aggregation IoT Platform • Ingest data from vehicles • ML based on vehicle information
  • 8. Takeaways Vehicles developed now must be able to handle the vulnerabilities in 5-10 years time. Innovative attacks require extraordinary detection and analytics Integration with SecureIoT can monitor the data at several layers of the data inception and delivery. Benefit of knowledge of similar attacks methods in other industries.

Editor's Notes

  1. „Nichts geliefert bekommen, was nicht bestellt ist“