{"id":843,"date":"2025-01-15T11:14:08","date_gmt":"2025-01-15T02:14:08","guid":{"rendered":"https:\/\/www.saesol.tech\/?post_type=blog&p=843"},"modified":"2025-01-15T11:14:09","modified_gmt":"2025-01-15T02:14:09","slug":"countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions","status":"publish","type":"blog","link":"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/","title":{"rendered":"Countermeasures Against Hacking Risks for Connected Cars and Infrastructure: V2X Security Solutions"},"content":{"rendered":"\n

While V2X technology maximizes traffic efficiency and safety by enabling communication between vehicles and infrastructure or vehicles themselves, it also increases the attack surface that hackers can exploit. In March 2024, two cybersecurity researchers from Mysk, an independent cybersecurity research team, identified a security vulnerability that allowed them to generate a digital key to unlock a specific electric vehicle. Despite the presence of two-factor authentication, they successfully hacked the car using a $169 Flipper Zero device and a Wi-Fi board to open the vehicle\u2019s doors.<\/p>\n\n\n\n

<\/p>\n\n\n\n

\"\"<\/figure>\n\n\n\n

Source : https:\/\/www.bleepingcomputer.com\/news\/security\/flipper-zero-can-be-used-to-launch-ios-bluetooth-spam-attacks<\/a><\/p>\n\n\n\n

By equipping the Flipper Zero with a Wi-Fi expansion module, attackers can create fake public Wi-Fi networks at service centers or charging stations. When unsuspecting users attempt to log in, their credentials\u2014including email addresses, passwords, and two-factor authentication codes\u2014can be intercepted. The hackers can then add a digital key to their app, allowing them to unlock the vehicle later.<\/span>

Beyond direct hacking methods like identity theft, other significant threats include interfering with On-Board Diagnostics (OBD) systems, disrupting Controller Area Network (CAN) message protocols, or exploiting vulnerabilities in Bluetooth Low Energy (BLE) to bypass digital locks without a key.<\/p><\/p>\n\n\n\n

\u25a0\u00a0Increased Hacking Risks with IoT Advancements<\/p>\n\n\n\n

\"\"<\/figure>\n\n\n\n

Source : WIRED :\u00a0https:\/\/www.youtube.com\/watch?v=MK0SrxBC1xs<\/a><\/p>\n\n\n\n

\"\"<\/p>\n\n\n\n

Source : adac :\u00a0https:\/\/www.youtube.com\/watch?v=0AHSDy6AiV0<\/a><\/p>\n\n\n\n

In the past, cars were perceived as analog, mechanical devices. However, with rapid advancements in IoT technologies, vehicles have transformed into digital systems connected to surrounding infrastructure through Vehicle-to-Everything (V2X) communication. Consequently, hackers can now target not just the vehicle itself but also the broader traffic infrastructure and network protocols.<\/p>\n\n\n\n

\u25a0\u00a0Technological Countermeasures for Enhancing V2X Contextual Security<\/p>\n\n\n\n

How can we respond to potential security breaches as digitalization progresses? Here are some key technological countermeasures to strengthen security in the V2X context:<\/p>\n\n\n\n

\n

1. Establishing V2X Security Credential Management Systems (SCMS)
<\/strong>\u2013 Introduce systems like the U.S. Department of Transportation’s SCMS to create secure communication environments.
\u2013 Assign roles to multiple certification authorities to manage the issuance of registration and security certificates.
\u2013 Develop and operate systems to issue, renew, and revoke certificates.<\/p>\n\n\n\n

2. Privacy Protection Through Certificates
<\/strong>\u2013 Use anonymized certificates to protect personal information, such as vehicle location, and periodically update temporary IDs to safeguard unique vehicle identifiers.
\u2013 Issue separate types of certificates for special and general vehicles.<\/p>\n\n\n\n

3. Development of V2X Security Modules and Protocols
<\/strong>\u2013 Design and deploy hardware security modules to securely store encrypted communication, certificates, and private keys.
\u2013 Develop and implement security protocols tailored for V2X communication.<\/p>\n\n\n\n

4. Message Authentication and Integrity Verification
<\/strong>\u2013 Authenticate the sender of messages received by vehicles and verify the integrity of the messages before accessing their content.
\u2013 Ensure confidentiality through encrypted communications.<\/p>\n\n\n\n

5. Intrusion Detection and Prevention Systems (IDS\/IPS)<\/strong>
<\/strong>\u2013 Monitor abnormal traffic in real time within vehicles and V2X communication networks using anomaly detection algorithms.
\u2013 Detect and mitigate threats such as Denial of Service (DoS) attacks or data tampering early.<\/p>\n<\/div><\/div>\n\n\n\n

To implement these measures, it is essential to expand V2X security platforms not only for vehicles but also for personal mobility devices like e-bikes and surrounding infrastructure. Furthermore, constructing Public Key Infrastructure (PKI)-based security authentication systems and establishing testing and certification infrastructures to verify compliance with authentication protocols are crucial.<\/p>\n\n\n\n

\u25a0\u00a0Saesol Tech: From Connected Car Security to Integrated Mobility Security<\/strong><\/p>\n\n\n\n

\"\"<\/figure>\n\n\n\n

Saesol Tech is strengthening the V2X security platform with the following three product lines:<\/p>\n\n\n\n

\n

1. V2X Security Platform<\/strong>
<\/strong>\u2013 Provides non-repudiation by ensuring the integrity of transmitted data and verifying the sender’s identity.
\u2013 Offers world-class performance in terms of speed, security, and reliability.<\/p>\n\n\n\n

2. PKI-Based Security Authentication Server<\/strong>
<\/strong>\u2013 Delivers various authentication methods and issues certificates at ultra-high speeds.
\u2013 Ensures scalability, reliability, and high availability using cloud architecture, supporting integrated security per ISO 21177 standards.<\/p>\n\n\n\n

3. V2X Mobility Testing\/Certification Equipment<\/strong>
<\/strong>\u2013 Offers testing and certification solutions to evaluate compliance with security authentication systems and platform security.
\u2013 Identifies malfunctions, errors, and vulnerabilities in communication software through V2X fuzz testing tools attached to test devices.<\/p>\n<\/div><\/div>\n\n\n\n

Using these product lines, Saesol Tech makes it difficult to compromise identity by securely managing private keys and authentication methods on PKI systems. Additionally, by leveraging fuzz testing, vulnerabilities in communication software can be identified and addressed preemptively. Saesol Tech remains committed to advancing the fields of micro-mobility, electric vehicles, autonomous vehicles, and traffic infrastructure to safeguard human lives and personal information.<\/p>\n\n\n\n

\n
Learn More About Saesol Tech’s V2X Security Solution<\/a><\/div>\n<\/div>\n\n\n\n

Do you have any questions about Saesol Tech\u2019s V2X security solutions?<\/strong><\/p>\n\n\n\n

Contact the Saesol Tech team now!<\/strong><\/p>\n\n\n\n

\n
Contact Us <\/a><\/div>\n<\/div>\n","protected":false},"featured_media":849,"parent":0,"menu_order":0,"template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false},"blog_categories":[20],"yoast_head":"\nCountermeasures Against Hacking Risks for Connected Cars and Infrastructure: V2X Security Solutions - \uc0c8\uc194\ud14c\ud06c<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Countermeasures Against Hacking Risks for Connected Cars and Infrastructure: V2X Security Solutions - \uc0c8\uc194\ud14c\ud06c\" \/>\n<meta property=\"og:description\" content=\"While V2X technology maximizes traffic efficiency and safety by enabling communication between vehicles and infrastructure or vehicles themselves, it also increases the attack surface that hackers can exploit. In March 2024, two cybersecurity researchers from Mysk, an independent cybersecurity research team, identified a security vulnerability that allowed them to generate a digital key to unlock […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"\uc0c8\uc194\ud14c\ud06c\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-15T02:14:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.saesoltech.io\/wp-content\/uploads\/2025\/01\/V2X-Security-Solutions.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"5\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/\",\"url\":\"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/\",\"name\":\"Countermeasures Against Hacking Risks for Connected Cars and Infrastructure: V2X Security Solutions - \uc0c8\uc194\ud14c\ud06c\",\"isPartOf\":{\"@id\":\"https:\/\/www.saesol.tech\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.saesoltech.io\/wp-content\/uploads\/2025\/01\/V2X-Security-Solutions.png\",\"datePublished\":\"2025-01-15T02:14:08+00:00\",\"dateModified\":\"2025-01-15T02:14:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/#primaryimage\",\"url\":\"https:\/\/www.saesoltech.io\/wp-content\/uploads\/2025\/01\/V2X-Security-Solutions.png\",\"contentUrl\":\"https:\/\/www.saesoltech.io\/wp-content\/uploads\/2025\/01\/V2X-Security-Solutions.png\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\ud648\",\"item\":\"https:\/\/www.saesol.tech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Countermeasures Against Hacking Risks for Connected Cars and Infrastructure: V2X Security Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.saesol.tech\/#website\",\"url\":\"https:\/\/www.saesol.tech\/\",\"name\":\"\uc0c8\uc194\ud14c\ud06c\",\"description\":\"V2X \ud1b5\uc2e0 \ubcf4\uc548 \uc194\ub8e8\uc158\uc758 \uae00\ub85c\ubc8c \ud50c\ub808\uc774\uc5b4\",\"publisher\":{\"@id\":\"https:\/\/www.saesol.tech\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.saesol.tech\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.saesol.tech\/#organization\",\"name\":\"\uc0c8\uc194\ud14c\ud06c\",\"url\":\"https:\/\/www.saesol.tech\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.saesol.tech\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.saesol.tech\/wp-content\/uploads\/2024\/05\/1.-\uc0c8\uc194\ud14c\ud06c-\ub85c\uace0-\uc6d0\ubcf8\ud30c\uc77c-1.png\",\"contentUrl\":\"https:\/\/www.saesol.tech\/wp-content\/uploads\/2024\/05\/1.-\uc0c8\uc194\ud14c\ud06c-\ub85c\uace0-\uc6d0\ubcf8\ud30c\uc77c-1.png\",\"width\":1487,\"height\":166,\"caption\":\"\uc0c8\uc194\ud14c\ud06c\"},\"image\":{\"@id\":\"https:\/\/www.saesol.tech\/#\/schema\/logo\/image\/\"}}]}<\/script>\n","yoast_head_json":{"title":"Countermeasures Against Hacking Risks for Connected Cars and Infrastructure: V2X Security Solutions - \uc0c8\uc194\ud14c\ud06c","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/","og_locale":"ko_KR","og_type":"article","og_title":"Countermeasures Against Hacking Risks for Connected Cars and Infrastructure: V2X Security Solutions - \uc0c8\uc194\ud14c\ud06c","og_description":"While V2X technology maximizes traffic efficiency and safety by enabling communication between vehicles and infrastructure or vehicles themselves, it also increases the attack surface that hackers can exploit. In March 2024, two cybersecurity researchers from Mysk, an independent cybersecurity research team, identified a security vulnerability that allowed them to generate a digital key to unlock […]","og_url":"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/","og_site_name":"\uc0c8\uc194\ud14c\ud06c","article_modified_time":"2025-01-15T02:14:09+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/www.saesoltech.io\/wp-content\/uploads\/2025\/01\/V2X-Security-Solutions.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"5\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/","url":"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/","name":"Countermeasures Against Hacking Risks for Connected Cars and Infrastructure: V2X Security Solutions - \uc0c8\uc194\ud14c\ud06c","isPartOf":{"@id":"https:\/\/www.saesol.tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.saesoltech.io\/wp-content\/uploads\/2025\/01\/V2X-Security-Solutions.png","datePublished":"2025-01-15T02:14:08+00:00","dateModified":"2025-01-15T02:14:09+00:00","breadcrumb":{"@id":"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/#primaryimage","url":"https:\/\/www.saesoltech.io\/wp-content\/uploads\/2025\/01\/V2X-Security-Solutions.png","contentUrl":"https:\/\/www.saesoltech.io\/wp-content\/uploads\/2025\/01\/V2X-Security-Solutions.png","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.saesoltech.io\/blog\/countermeasures-against-hacking-risks-for-connected-cars-and-infrastructure-v2x-security-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\ud648","item":"https:\/\/www.saesol.tech\/"},{"@type":"ListItem","position":2,"name":"Countermeasures Against Hacking Risks for Connected Cars and Infrastructure: V2X Security Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.saesol.tech\/#website","url":"https:\/\/www.saesol.tech\/","name":"\uc0c8\uc194\ud14c\ud06c","description":"V2X \ud1b5\uc2e0 \ubcf4\uc548 \uc194\ub8e8\uc158\uc758 \uae00\ub85c\ubc8c \ud50c\ub808\uc774\uc5b4","publisher":{"@id":"https:\/\/www.saesol.tech\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.saesol.tech\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/www.saesol.tech\/#organization","name":"\uc0c8\uc194\ud14c\ud06c","url":"https:\/\/www.saesol.tech\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.saesol.tech\/#\/schema\/logo\/image\/","url":"https:\/\/www.saesol.tech\/wp-content\/uploads\/2024\/05\/1.-\uc0c8\uc194\ud14c\ud06c-\ub85c\uace0-\uc6d0\ubcf8\ud30c\uc77c-1.png","contentUrl":"https:\/\/www.saesol.tech\/wp-content\/uploads\/2024\/05\/1.-\uc0c8\uc194\ud14c\ud06c-\ub85c\uace0-\uc6d0\ubcf8\ud30c\uc77c-1.png","width":1487,"height":166,"caption":"\uc0c8\uc194\ud14c\ud06c"},"image":{"@id":"https:\/\/www.saesol.tech\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.saesoltech.io\/wp-json\/wp\/v2\/blog\/843"}],"collection":[{"href":"https:\/\/www.saesoltech.io\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.saesoltech.io\/wp-json\/wp\/v2\/types\/blog"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.saesoltech.io\/wp-json\/wp\/v2\/media\/849"}],"wp:attachment":[{"href":"https:\/\/www.saesoltech.io\/wp-json\/wp\/v2\/media?parent=843"}],"wp:term":[{"taxonomy":"blog_categories","embeddable":true,"href":"https:\/\/www.saesoltech.io\/wp-json\/wp\/v2\/blog_categories?post=843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}