Ensuring cybersecurity is vital for a driverless future
Erik Silfversten and Nathan Ryan of RAND Europe discuss why built-in cybersecurity is as important a safety concern as any for manufacturers and legislators involved in the autonomous-vehicle space
The UK government aims to address cyberscurity concerns surrounding driverless cars, such as this prototype Nissan Leaf travelling around London, before they become a feature of UK roads Credit: Philip Toscano/PA Archive/PA Images
High-profile accidents involving autonomous vehicles (AVs) have led to recent discussions about the physical safety of people. In 2016, there was a fatality of a US man using the Tesla Autopilot system. The first crash of Google’s self-driving vehicles also occurred in 2016, when it changed lanes and put itself in the path of an oncoming bus.
However, it could be argued that consumers and manufacturers should be equally, if not more, concerned about the potential cybersecurity vulnerabilities in AVs. In July 2017, Tesla CEO Elon Musk warned the biggest concern for AVs is “someone achieving a fleet-wide hack”.
In this regard, the UK government’s Department for Transport (DfT) is ahead of the curve. In August 2017, it issued new cybersecurity principles to the automotive sector to raise the standards of cybersecurity practices of AV manufacturers. The unprecedented move by the UK government signals that cybersecurity involving AVs is as much a transport issue as a critical national infrastructure matter.
The principles aim to address cybersecurity concerns before autonomous vehicles come onto UK roads. In November 2017, UK chancellor Phillip Hammond said this could happen as early as 2021.
- Government invests £51m in driverless car schemes
- Peer floats idea of converting entire Southern Rail network to autonomous vehicle roadway
- UK must not let progress on autonomous vehicles be derailed by lack of public support
DfT’s eight principles cover a broad range of cybersecurity concerns, from technical solutions, such as securely patching and updating software, to people and processes, such as organisational accountability at board level and assessing third-party risk on the supply-chain.
The level of effort and technical sophistication across the principles vary. For example, providing product aftercare and incident response to ensure the AV systems are secure, designing the AV system to be resilient to attacks and respond appropriately when its defences fail, and ensuring the secure storage and transmission of data, could all pose challenges to companies that are not familiar with digital technologies.
Large technology companies that already have their own AV pilots, such as Google and Apple, will be more familiar with these principles and may have a slight advantage over traditional automotive companies. That being said, the cybersecurity principles do offer timely guidance for other companies looking to develop their own line of AVs before the technology becomes more widespread.
The publication of the cybersecurity principles signals a shift in UK policymaking, away from reactionary and problem-driven policy, and towards an attempt to shape and influence the development of AVs prior to their uptake. It is also an example of the UK government attempting to keep pace with rapid technological change, which can often accelerate ahead before meaningful policy decisions take place.
Overall, the cybersecurity principles should be seen as incremental steps to guide manufacturers and encourage safe and secure innovations around AVs. Cybersecurity, combined with measures around physical safety, could help drive the UK and the automotive car industry towards a safe and secure driverless future.
Sadiq Khan publishes smart-city strategy for the capital
Theresa May uses speech in Macclesfield to announce plans to work with technology sector and NHS to improve diagnoses
Changes to the legislation made last year – which had been expected to have a big impact on IT contractors – have also brought in £410m in extra revenue, the tax agency claims
Department issues contract notice seeking external supplier for two-year contract to install unified communications environment
The cautionary tale of the Leicestershire teenager who hacked high-ranking officials of NATO allies shows the need for improved password security
Calm has turned a section of the 57,509-word EU document into a sleep-inducing audio book
Which? said a lack of knowledge about data among consumers had led to suspicion and doubt over useful innovations
BT's Konstantinos Karagiannis explains ethical hacking and why it's important to exploit vulnerabilities