Endpoint
2/6/2014
03:51 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Security Innovation Applauds U.S. DOT Decision To Move Forward With 'Talking Cars' Program

US DOT research indicates that safety applications using V2V technology can reduce the majority of crashes

Wilmington, Mass., February 5, 2014 – Dr. William Whyte, principal advisor of the US DOT-sponsored VII Proof of Concept project for secure vehicle communications, is proud to have played a part in developing the technology behind yesterday's announcement by the US DOT's National Highway Traffic Safety Administration (NHTSA) to enable vehicle-to-vehicle (V2V) communication technology for light vehicles. The technology will improve safety by allowing vehicles to "talk" to each other and avoid collisions by exchanging data such as speed and position hundreds of times per second.

Before this life-saving technology can be widely adopted, it has to be reliable and secure. As co-author of the IEEE 1609.2 standard for connected vehicle security, Dr. Whyte and his team have been working within the Intelligent Transportation Systems (ITS) community to ensure privacy and security are guaranteed and that communication between vehicles cannot be maliciously altered or used to track driver behavior or location. "We are thrilled that the US Government has taken this bold step to significantly reduce fatalities and serious injury through the adoption of robust technology," said Dr. Whyte. "With this announcement, Security Innovation will accelerate our collaboration with chip designers, wireless providers, on-board equipment manufacturers, infrastructure providers and car makers to ensure that security and privacy remain the number one priority."

US DOT research indicates that safety applications using V2V technology can reduce the majority of crashes, with survivability improvements expected to be even greater than from the introduction of seatbelts. When widely deployed, secure vehicle communications could prevent 80% of unimpaired driver accidents. Additionally, a recent DOT safety pilot program concluded that V2V standards and technologies are mature enough to work in full-scale production. Security Innovation's AeroLink&trade secure communications product was a key element in this success.

As an active and influential practitioner in this field, Security Innovation's understanding of the technical specifications and interoperability required to provide highly secure platforms for V2V will help improve automobile safety worldwide. The company does this through independent research and as a contributing member to organizations such as ITS America, OmniAir, ETSI (European Telecommunications Standards Institute), CAMP (Collision Avoidance Metrics Partnership), and the European Car2Car Consortium.

About Aerolink&trade

Aerolink&trade is the industry-leading implementation of high-speed communications security for connected vehicles based on the IEEE 1609.2 standard. It is the result of years of research and development in anticipation of the day when vehicles travelling at highway speed can communicate effectively while their occupant's remain confident of information security and privacy.

About Security Innovation

Security Innovation specializes in Software Security and Data Privacy for the world's most demanding environments. For over a decade, the company has helped organizations build and deploy more secure software systems and harden their data protection efforts. Security Innovation is privately held and is headquartered in Wilmington, MA USA. Visit the company at www.securityinnovation.com or on Twitter @SecInnovation.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7877
Published: 2014-10-30
Unspecified vulnerability in the kernel in HP HP-UX B.11.31 allows local users to cause a denial of service via unknown vectors.

CVE-2014-3051
Published: 2014-10-29
The Internet Service Monitor (ISM) agent in IBM Tivoli Composite Application Manager (ITCAM) for Transactions 7.1 and 7.2 before 7.2.0.3 IF28, 7.3 before 7.3.0.1 IF30, and 7.4 before 7.4.0.0 IF18 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof s...

CVE-2014-3668
Published: 2014-10-29
Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument t...

CVE-2014-3669
Published: 2014-10-29
Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function ...

CVE-2014-3670
Published: 2014-10-29
The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly exec...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.