Ensuring cybersecurity is vital for a driverless future
Erik Silfversten and Nathan Ryan of RAND Europe discuss why built-in cybersecurity is as important a safety concern as any for manufacturers and legislators involved in the autonomous-vehicle space
The UK government aims to address cyberscurity concerns surrounding driverless cars, such as this prototype Nissan Leaf travelling around London, before they become a feature of UK roads Credit: Philip Toscano/PA Archive/PA Images
High-profile accidents involving autonomous vehicles (AVs) have led to recent discussions about the physical safety of people. In 2016, there was a fatality of a US man using the Tesla Autopilot system. The first crash of Google’s self-driving vehicles also occurred in 2016, when it changed lanes and put itself in the path of an oncoming bus.
However, it could be argued that consumers and manufacturers should be equally, if not more, concerned about the potential cybersecurity vulnerabilities in AVs. In July 2017, Tesla CEO Elon Musk warned the biggest concern for AVs is “someone achieving a fleet-wide hack”.
In this regard, the UK government’s Department for Transport (DfT) is ahead of the curve. In August 2017, it issued new cybersecurity principles to the automotive sector to raise the standards of cybersecurity practices of AV manufacturers. The unprecedented move by the UK government signals that cybersecurity involving AVs is as much a transport issue as a critical national infrastructure matter.
The principles aim to address cybersecurity concerns before autonomous vehicles come onto UK roads. In November 2017, UK chancellor Phillip Hammond said this could happen as early as 2021.
- Government invests £51m in driverless car schemes
- Peer floats idea of converting entire Southern Rail network to autonomous vehicle roadway
- UK must not let progress on autonomous vehicles be derailed by lack of public support
DfT’s eight principles cover a broad range of cybersecurity concerns, from technical solutions, such as securely patching and updating software, to people and processes, such as organisational accountability at board level and assessing third-party risk on the supply-chain.
The level of effort and technical sophistication across the principles vary. For example, providing product aftercare and incident response to ensure the AV systems are secure, designing the AV system to be resilient to attacks and respond appropriately when its defences fail, and ensuring the secure storage and transmission of data, could all pose challenges to companies that are not familiar with digital technologies.
Large technology companies that already have their own AV pilots, such as Google and Apple, will be more familiar with these principles and may have a slight advantage over traditional automotive companies. That being said, the cybersecurity principles do offer timely guidance for other companies looking to develop their own line of AVs before the technology becomes more widespread.
The publication of the cybersecurity principles signals a shift in UK policymaking, away from reactionary and problem-driven policy, and towards an attempt to shape and influence the development of AVs prior to their uptake. It is also an example of the UK government attempting to keep pace with rapid technological change, which can often accelerate ahead before meaningful policy decisions take place.
Overall, the cybersecurity principles should be seen as incremental steps to guide manufacturers and encourage safe and secure innovations around AVs. Cybersecurity, combined with measures around physical safety, could help drive the UK and the automotive car industry towards a safe and secure driverless future.
Examining the language of each party’s manifesto reveals significant differences in the amount and focus of proposals related to technology and data policy – as well as in the wider themes of each...
Rounding up the Tories’ key pledges in the area of digital and data, including a new cybercrime force and tax incentives for investments in cloud computing
Officers can finally begin using technology almost two years after it was first purchased
President’s national security adviser gives dossier to ministers
BT offers expert perspectives on how to orchestrate successful cloud adoption
Take away all the boundaries in security testing, and protect your organisation from the dark side, with red teaming to evaluate your defences and expect the unexpected - BT explains how
To have the best chance of an effective response and a full recovery, organisations should have a robust incident response strategy in place, says BT
We hear from BT about why delivering a great customer experience depends on your network visibility