Recently, baidu author, president holds CEO plum Yan Hong concurrently to express, 2019 second half of the year, baidu will undertake driving automatically in Changsha of taxi team commercialize operation, and be inside year of Baidu drive automatically taxi amount will achieve 100.
Nobody drive the car begins gradually civil in commercial setting, but its drive automatically through what content couplet net undertakes drill accusing the system still is put in risk of bigger out of control.
Advanced a few days, what lab of Tecent division favour discovered car of tesla Model S is automatic drive system (version 2018.6.1) existing 3 large hole, the rain that included to be able to pass exterior activation car among them is brushed what can cheat Model S through a few specific number are being set on road is system, automatic drive the system makes its sail wrong driveway, and pass wireless game handle can hold those who accuse Model S to turn to a system, control traffic thereby, make its are become " corpse car " .
Nobody drive such flaw, as " speed and passion 8 " a setting, a hacker in film inbreaks many nobody drive the car makes its are become " corpse car " , hold the post of through accusing to achieve to much drill by the effect that order about.
Imagine, if be in,did not come one day a few nobody drive the car went mad suddenly to rush about everywhere euqally, will compromise public safety badly, so in reality, nobody drive the car is about to throw commercial operation, can be you held to accuse car of so called corpse by the hacker after all?
Corpse car is corpse network is outspreadThe concept of corpse car, be Internet corpse network is outspread. Internet go up oneself 90 time initial stage begins the century swift and violent development, there still is a kind of new information security in what its are born in the process of rapid development minatory means, it is the corpse network of an organic whole through combining virus, trojan, vermian technology namely.
The characteristic of corpse network depends on, do the computer that controls much stage to be affected by the virus such as the trojan through a hacker, realize a kind to charge means to much drill, compose builds by a hacker can the network system that the palm controls. And be below the circumstance that the hacker does not have a hand in even rarely, corpse client end can cooperate in coordination and in the light of same job the target that finish acts.
"Imagine the film shapes image of so called corpse, one does not have the flesh without blood, have the thing of the body for nothing, comply with without own consciousness Taoism priest arrangement, the macroscopical meaning of corpse network is such, numerous computer is in imperceptible in as the corpse in fokelore group be driven euqally and directing, make a kind of tool that is used. "Luo Jia explains teacher of major of project of Guizhou university vehicle, " will tell corpse network to be interested in atttack equipment of content couplet network more at present. " will tell corpse network to be interested in atttack equipment of content couplet network more at present..
The reporter is informed through Chinese scientific research and computer network, the corpse network that forms in content couplet net and common PC computer virus are different, its transmission sex is wider faster, can affect huge facility through system of huge content couplet network, include nobody to drive among them car.
The hacker can use these same content couplet networks to join nobody drive car, join through pressure sensor of blue tooth, WiFi, tire and the CAN bus line that pass a car almost any exterior once the hacker dominated CAN bus line,cut a point, atttacking AI system is the commonnest method, at the same time the breakthrough drives automatically the network defence of the car. For instance the hacker may try to carry car sensor / network, let a car carry artificial intelligence to consider as true means infuse false data, it is dangerous to bring about artificial intelligence to make wrong decision make personnel or goods are in thereby in.
"Although nobody drive,the car often has add wait for hard safety precaution closely with identity test and verify, these is in theoretic can provide reasonable safe defense measure, but the weakness of the safety precaution of these types depends on, defeat in the hacker dismissed a strict safe incident (decode a message namely, input password) hind, prevent somebody to abuse a system normally without extra safety precaution. " Introduction Luo Jia.
Luo Jia thinks interconnection of prospective everythings on earth, the car is product of content couplet network medium important one annulus, if do not have more effective automobile safety,be on guard mechanism, the security hour meeting of unmanned road-sense faces the menace of corpse virus, when data center produces a hacker to atttack, worst circumstance may be data is lost, but should drive automatically when the car is inbreaked by the hacker, of likelihood happening is life loss.
Perhaps the circumstance is done not have so flooeyIn experiment before 3 years, an American reporter is opening a Jeep Cherokee, next by two hackers, Charlie Miller and Chris Valasek are controlled remotely, they acquired the control right of the car through information entertainment system, controlled traffic at the same time change direction, brake, rain is brushed and door lock, besides, the parameter of the revolution counter speedometer of car also by replacement.
Two hackers begin to cooperate with unmanned Motor Corporation after this experiment, try to prevent the happening of this kind of incident, go up in the black hat congress last year, two people show in succession, inbreak nobody drive the difficulty of the car is great, be not general hacker to be able to be accomplished. Miller explanation says, nobody drive the car must last monitoring environment, receive information, and should reduce attack aspect to be able to reduce the risk that is inbreaked greatly only at present.
In fact, the premise that wants to make corpse car is to pass content couplet net to transmit corpse virus, accuse through be being held to much form even many unmanned car. "Drive automatically the car relies on at present or two sensor undertake the object detects, those car that drive completely automatically will have many sensor and communication layer. " Chris Valasek points out, in view of broken solution individual sensor already very intractable, a few hackers are met more inbreak hard complex sensor system, and need multilayer setting ability visits real time traffic and pedestrian data ceaselessly.
"From theoretic tell, drive automatically inherent interconnection sex may make they are atttacked more easily by the network between the many sensor of the car and communication layer, because they were offerred more ' cut a point ' , however, stem from same reason hacker to atttack connective to drive automatically the car is more difficult also, " nobody drive wisdom engineer of technology of the person that go graceful graceful tell a reporter: "Must find right multilayer systematic visit, this system is compositive the information that comes from many sensor and real time traffic and pedestrian data, this may constitute serious obstacle to the hacker. The solution related to content couplet net also can be used at enhancing its security, for example compositive be based on the safety with mechanical quanta to add secret system. For example compositive be based on the safety with mechanical quanta to add secret system..
Be aimed at the potential menace that the hacker inbreaks at present, enterprise of a few high-tech and car manufacturer had taken a few actions in this respect.
The company passes Feiyate at present use a few additional sensor towed bird, pass what wait for hardware to sensor to upgrade change one's costume or dress will promote its security, but still many experts point out, upgrade through sensor will promote security to may do not have a problem at present, but the promotion that its update speed to cannot catch up with hacker technology far, so this kind of method is returned on cost and sex of effectiveness for a given period of time have particular problem.
The hacker with the annual Pwn2Own(that tesla car attends to go in Canadian lukewarm Ge Huaju this year and safe conference) when the conference, the kind that carries award makes two hackers finally successful inbreak car of tesla Model 3, express to David Lau of this tesla vice-president, through participating in this kind of safe conference, upgrade ceaselessly oneself safe defence software, the efforts that passes artificial intelligence will promote nobody synergic security further.
Besides, company of security of GuardKnox car network puts forward to drive in nobody the communication joint of the car builds a safe system. This system carries out formal test and verify and affirmatory communication configuration between all sorts of networks of car, its are prevented any not the communication of test and verify. Must test and verify any trying that visit car the exterior communication of central gateway ECU, no matter be put in what more or less suffer attack easily to receive a point, lock up effectively decide whole system. Centralized to preventing a hacker to correspond from its network visit drives automatically the core system of the car is crucial.
The occurrence of 5G times will face new issue again"The arrival of 5G times can drive to nobody without doubt the car brings new opportunity. " drive automatically the general manager Dean Bushey of Motor Corporation Voyage stated this year 5G technology will conduce to in January make drive automatically the car is safer.
Dean Bushey explains: We any moment want to win lower delay, more efficient broadband, because the defer of any more than 100 millisecond can bring about our car interrupt, and the settlement with the OK and perfect arrival of this 5G this one problem.
Be aimed at the influence that 5G times brings to unmanned car, the senior researcher of Avast of network safety tycoon He Lun of equestrian fourth · (Martin Hron) express however, network of shift of the Five Dynasties makes probably drive automatically car is atttacked more easily than now.
A large number of application of prospective 5G will make what 5G allows more component and system extremely likely automatic drive the car is easier the attack range that so that enlarge a hacker,receives the outer world repeatedly and cut a point.
How to reduce 5G to drive to nobody is brought risk enlarger encountered? Martin represents automobile manufacturing industry, especially nobody drive the research and development of the car and production essentials first at hacker technology, tesla, google Waymo this direction does hold office at court, but the mechanism of car network safety with more perfect need.
"The safe technology with existing have the aid of of need of automobile manufacturing industry is hand-in-hand the technology that one pace research and development precedes the hacker is atttacked, include the mechanism of car network safety that nobody drive inside in order to perfect, must defend safety detailed is refined in car of phase of original products plan for instance.
5G industrialization develops main to unmanned car effect to arrive in Yu Yunduan embedded upright data is alternant of defer reduce what spend with wide belt speed to increase, but this plan is protected to information safety, privacy wait to pose a challenge, in other words, in 5G times as a result of the net fast geometrical promotion, its nobody drive the privacy of systematic client is divulged more easily.
Besides, nobody drive the car is the system that is based on the composition on artificial intelligence and foundation of content couplet net or network, if above paragraphs place is narrated, nobody drive the car is not single entity already, so once be atttacked by the hacker, its cut dot and attack aspect bigger, the hacker searchs the possibility that inbreaks successfully to weak point to increase.
So warning of Avast safe expert says: Although now inside 5G application nobody drive the car still is in wait-and-see phase, but if do not have,answer program very well, the union of prospective 5G and content couplet net will make nobody drive the possibility that the car is inbreaked by the hacker is increased.
Brief summaryThe occurrence of every generation new technology has the value of his oneself and the safe hidden trouble that accompany and come, nobody drive to having the network safety risk that is invaded by the hacker with Internet, but such problem is done not have by car manufacturer, research and development person place negligence, the tesla that for instance preamble mentions gives money dispatch a vehicle to ask the hacker is atttacked to its on hacker conference, because this studies,issue generation safety to defend system.
In fact, at present all attention to these risk consciousness can conduce to only encourage make new generation drive automatically with the safest means the more thorough research that car place requires. The senior researcher of Avast of no less than He Lun of equestrian fourth · indicates in that way, nobody drive safe technology needs essentials to inbreak at the hacker first method, undertake upgrading modificatory on software hardware ceaselessly, resist in order to rise the ability of baleful attack, make drive automatically safer.