Endpoint
2/6/2014
03:51 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Security Innovation Applauds U.S. DOT Decision To Move Forward With 'Talking Cars' Program

US DOT research indicates that safety applications using V2V technology can reduce the majority of crashes

Wilmington, Mass., February 5, 2014 – Dr. William Whyte, principal advisor of the US DOT-sponsored VII Proof of Concept project for secure vehicle communications, is proud to have played a part in developing the technology behind yesterday's announcement by the US DOT's National Highway Traffic Safety Administration (NHTSA) to enable vehicle-to-vehicle (V2V) communication technology for light vehicles. The technology will improve safety by allowing vehicles to "talk" to each other and avoid collisions by exchanging data such as speed and position hundreds of times per second.

Before this life-saving technology can be widely adopted, it has to be reliable and secure. As co-author of the IEEE 1609.2 standard for connected vehicle security, Dr. Whyte and his team have been working within the Intelligent Transportation Systems (ITS) community to ensure privacy and security are guaranteed and that communication between vehicles cannot be maliciously altered or used to track driver behavior or location. "We are thrilled that the US Government has taken this bold step to significantly reduce fatalities and serious injury through the adoption of robust technology," said Dr. Whyte. "With this announcement, Security Innovation will accelerate our collaboration with chip designers, wireless providers, on-board equipment manufacturers, infrastructure providers and car makers to ensure that security and privacy remain the number one priority."

US DOT research indicates that safety applications using V2V technology can reduce the majority of crashes, with survivability improvements expected to be even greater than from the introduction of seatbelts. When widely deployed, secure vehicle communications could prevent 80% of unimpaired driver accidents. Additionally, a recent DOT safety pilot program concluded that V2V standards and technologies are mature enough to work in full-scale production. Security Innovation's AeroLink&trade secure communications product was a key element in this success.

As an active and influential practitioner in this field, Security Innovation's understanding of the technical specifications and interoperability required to provide highly secure platforms for V2V will help improve automobile safety worldwide. The company does this through independent research and as a contributing member to organizations such as ITS America, OmniAir, ETSI (European Telecommunications Standards Institute), CAMP (Collision Avoidance Metrics Partnership), and the European Car2Car Consortium.

About Aerolink&trade

Aerolink&trade is the industry-leading implementation of high-speed communications security for connected vehicles based on the IEEE 1609.2 standard. It is the result of years of research and development in anticipation of the day when vehicles travelling at highway speed can communicate effectively while their occupant's remain confident of information security and privacy.

About Security Innovation

Security Innovation specializes in Software Security and Data Privacy for the world's most demanding environments. For over a decade, the company has helped organizations build and deploy more secure software systems and harden their data protection efforts. Security Innovation is privately held and is headquartered in Wilmington, MA USA. Visit the company at www.securityinnovation.com or on Twitter @SecInnovation.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7407
Published: 2014-10-22
Cross-site request forgery (CSRF) vulnerability in the MRBS module for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

CVE-2014-3675
Published: 2014-10-22
Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.

CVE-2014-3676
Published: 2014-10-22
Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."

CVE-2014-3677
Published: 2014-10-22
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.

CVE-2014-4448
Published: 2014-10-22
House Arrest in Apple iOS before 8.1 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information from a Documents directory by obtaining this UID.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.