Next year, the car information security special working group will be set up, and Japan will start serious about hacking.

Compared with the US and European car companies, there are not many cases in which Japanese auto companies are exposed to information security. The impact does not seem to be large. The response of several car companies to these cases also shows that they have no such thing. Then sit on the heart. Now that the situation has begun to change, the best example is that Japan and Europe will work together to develop an autonomous vehicle cybersecurity program. The main factor that makes them serious about information security is the autonomous car.

The Toyota Prius had already experienced hacking as early as last year when Jeep Cherokee was hacked by a hacker on the road driving, causing Fiat-Chrysler to recall 1.4 million cars.

Next year, the car information security special working group will be set up, and Japan will start serious about hacking.

The hacking that took place in 2013 was also operated by the geeks Charlie Miller and Chris Valasek who later invaded the Jeep driving system. They used a laptop in the back seat of a Prius to slap the car horn, disturb the fuel gauge and speedometer display, and even got control of the steering wheel.

Three years later, Toyota Motor Corporation and other Japanese automakers seem to be slow to respond to the vulnerability of connected cars. But with the advent of autonomous driving technology, Japanese auto companies have finally begun to seriously face cybersecurity issues.

Japanese automakers may start building a common working group as early as next year to share information about hacking and data breaches. They are considering setting up this mutual aid working group under the auspices of the Japan Automobile Manufacturers Association, hoping that it will speed up the identification of relevant security threats and help to discourage those who are ill-intentioned from safe driving.

This may be regarded as a measure to make up for the Japanese auto industry. Last year, the United States established a similar organization, the AutomoTIve InformaTIon Sharing and Analysis Center (Auto-ISAC). Since 2010, the European automotive industry has been developing cybersecurity standards through the German-based Automobilization System Architecture (AUTOSAR).

At a meeting organized by Japan AutomoTIve Software Platform and Architecture, Koji Hirabayashi, Toyota's electronic architecture development manager and director of information security, said: "Everyone said that Japan lags behind Europe and the United States in this respect. We are working hard to catch up.” The organization is made up of 157 Japanese automakers, suppliers, related software and electronics companies.

According to Hirabayashi, their goal is to reach the same level of cybersecurity as American and European manufacturers by 2020. An important reason for this catch-up is that Tokyo will host the Summer Olympics that year, and the country's automakers are using the sporting event to showcase their progress in autonomous driving and connected cars. In such a global arena, it is definitely not what they want to happen if they use hackers to exploit security vulnerabilities.

Japan held a seminar on in-vehicle information encryption security in Tokyo this year, and there is no lack of relevant cases. Software engineers and managers from top Japanese automakers and suppliers have received a variety of training on system security issues. At this meeting, Japan also held the car hackathon for the first time. The hackers demonstrated the way to invade the car computer through different channels, such as OBD, physical port access, Internet or Bluetooth wireless.

According to Mike Ahmadi, director of system security at Synopsys' Software Integrity Research Group and chairman of the SAE Network Security Testing Working Group, by 2020, more than three-quarters of cars will have this capability. But many automakers still lack predictability for this change.

“I don’t think they fully understand the impact of this change,” Ahmadi said. “It’s no exaggeration to say that I have seen that some automakers have not taken any measures.” He believes that Japanese manufacturers are particularly concerned with taking precautionary measures. The reaction is conservative.

“The Japanese are very interested in this issue, but the problem is that they have to take a long time to analyze before making a decision.” Japanese automakers are almost unwilling to publish about their prevention of hacking. Specific details of the measure. According to them, if too much information is leaked, it may be used by criminals.

Honda and Subaru's manufacturer Fuji Heavy Industries said they don't have the knowledge of the hacking attacks on their vehicles. Mazda declined to comment.

Nissan Connect, a Nissan electric vehicle application, was previously released a security hole, and Nissan said the vulnerability has been fixed. Nissan had to temporarily shut down the service in February this year after the hacker found the vulnerability to adjust the climate control inside the car and peek into the driving history of other Leaf vehicles.

However, Leaf will soon be headlined again. Marc Rogers, chief safety researcher from Cloudflare, is also interested in the wind electric vehicle. He said that he has been studying the wind for more than a year. Once the research is completed, he will look for Nissan to discuss his findings privately. Previously, Rogers had found a flaw in the Tesla Model S with his companions.

In response to the hacking of the Prius, a Toyota spokesperson said that it is important to point out that the hacker "needs to physically connect in the car, including partial disassembly of the dashboard and physical wiring of the line", which is obviously for the driver. It is impossible not to be noticed. Toyota believes that the more pressing issue is the attack from outside the car.

The spokesman said: "Toyota has developed very strict and effective firewall technology for remote and wireless services. We believe that our electronic control system is perfect and safe, and we will continue to conduct rigorous testing and continuous improvement."

Toyota declined to say whether they knew about other hacking cases. At the same time, Toyota said they are participating in a discussion about the next steps in the automotive industry in Japan.

Although Japanese automakers will join overseas industry organizations, such as the Auto Information Sharing and Analysis Center (Auto-ISAC), Toyota's Hirabayashi says Japan needs to establish its own association.

“If we build a car in Japan, is the message from North America sufficient? Japan has its own unique regional characteristics,” he said, and the safety measures are “not at all used in the competition”, but should be co-operated by manufacturers. response.

“This is a chicken or egg. Even if a car manufacturer takes countermeasures, hackers may still find loopholes in the system. We need to work together on this issue.”

Inductors

I-Beam Inductors,Chip Inductors,Color Ring Inductor,R-Bar Inductors

Shenzhen Sichuangge Magneto-electric Co. , Ltd , https://www.scginductor.com