The laser navigation system and sensors of driverless cars can be easily exploited by hackers as they can trick them into getting paralyzed thinking about a probable collision with another person, car or hurdle.
Lidar 3D Imaging System is vulnerable to hack attacks. It is a system used by autonomous vehicles to create an image of the surroundings and navigate through the roads. However, research reveals that a cheap low-power laser attack lets hackers trick this system into thinking that something is blocking their way and forcing the vehicle to slow down, stop and/or take elusive action.
The University of Cork’s Computer Security Group’s former researcher Jonathan Petit identified this vulnerability of the well-known laser powered navigation system while trying to discover the cyber vulnerabilities of self-directed vehicles.
Petit’s research will be presented at the Black Hat Europe security conference that is due in November this year. He explained that the combo of a pulse generator and a low-power laser let him record encrypted or non-coded laser pulses emitting from the high-profile Lidar system.
These pulses can later be replicated with a laser to produce fake objects that can easily trick a driverless car into thinking that there is an obstacle present at the front.
While speaking to IEEE Spectrum, Petit stated:
“I can take echoes of a fake car and put them at any location I want. And I can do the same with a pedestrian or a wall. I can spoof thousands of objects and basically carry out a denial-of-service attack on the tracking system so it’s not able to track real objects.”
He further added that the primary basis of the vulnerability lies in the fact that some driverless cars have poor quality input systems. This means such cars can make wrong decisions if these are fed incorrect data of surrounding environment and/or the road.
“If a self-driving car has poor inputs, it will make poor driving decisions,” said Petit.
However, one wonders that Lunar laser ranging technology is the most expensive and technically advanced one that is currently available in the market, then how can these commit mistakes?
In response to this, Petit says that autonomous cars can be hacked easily and cheaply as
“You can easily do it with a Raspberry Pi or an Arduino. It’s really off the shelf.”
The research reveals that driverless cars are not fully reliable and have inherent security related issues regardless of the fact that the technology has been cleared after being tested on UK roads.
We can comprehend that excessive insertion of connected technology into vehicles nowadays is making our cars prone to risks and threats from hackers.
History of vulnerability in vehicles:
In this Black Hat USA 2015 session, two security researchers namely Charles Miller and Chris Valasek will give a presentation about their discoveries related to the security vulnerability they found in the onboard infotainment system of all the vehicles manufactured by Fiat Chrysler Automobiles, leaving more than 470,000 vehicles vulnerable to these similar hacking attempts.
Using this vulnerability, both of these hackers managed to remotely take control of the vehicle, which allowed them to manipulate the vehicle’s brakes, acceleration, entertainment system and what not.
During the same the DefCon and BlackHat security conferences researchers also exposed how hackers could easily exploit the vulnerabilities found within the Megamos Crypto to start the vehicle without any key, and the vulnerability could be exploited within 60 minutes!
Suggest ideas, report typos and corrections to email@example.com
[src src=”source” url=”http://spectrum.ieee.org/cars-that-think/transportation/self-driving/researcher-hacks-selfdriving-car-sensors”]IEEE[/src]