Summary: Cybersecurity Issues With Onstar

1120 Words3 Pages

Cybersecurity Issues with OnStar OnStar, a wholly owned subsidiary of General Motors (GM), was founded as a telematics company that uses telecommunication systems to transfer information to and from vehicles. The primary focus of OnStar was to provide assistance in an emergency situation. OnStar was released in 1996, a time where many of the technological innovations that we use today didn’t exist yet. This innovation such as GPS which didn't get much use outside of the military and smartphones which was still 10 years away. At the time, people depended on physical maps as a navigation system when traveling. OnStar, not satisfied with the limited traveling tools, imagined a different future such as a connected world for vehicles. This connected …show more content…

Today, OnStar has helped nearly 10 million people get the help they needed, even when they were unable to ask for the help themselves. After 20 years since being launched, OnStar has led the forefront of the connected car revolution making driving easier, safer and better for subscribers. OnStar includes a myriad of services such as in vehicle safety, automatic crash response, stolen vehicle assistance, turn by turn navigation, remote start, and remote locking and unlocking. A vehicle equipped with OnStar can analyze the vehicles On Board Diagnostics (OBD) as it is being driven, proactively detect likely vehicle problems, and notify the driver when maintenance is needed. OnStar services can monitor crash sensors and automatically alert the authorities, provide audio-links between passengers and emergency personnel, and provide GPS based locations. …show more content…

The SSL protocol uses a combination of public-key, private key, and session-key encryption. An SSL session always begins with an exchange of messages called the SSL handshake. The handshake allows the server to authenticate itself to the client by using public-key techniques and then allows the client and the server to cooperate in the creation of session keys used for encryption, decryption, and tamper detection during the session that follows. SSL is the standard security technology for establishing an encrypted connection between a web server and a client. This link ensures that all data passed between the web server and the client remains private. The steps involved in the SSL handshake start with when a client connects to a web server secured with an SSL. The client starts off by first requesting the server identify itself. Server then responds by sending a copy of its SSL certificate and the server’s public key. The client then checks if the certificate received from the server is valid. If the client trusts the certificate, it creates, encrypts, and sends back a session key using the server’s public key. Once received, the server decrypts the symmetric session key using its private key and begins an encrypted session with the client. The server and client now encrypt connection where all transmitted data is encrypted with the session

Open Document