Behind the Man-in-the-Middle Attacks For Connected Cars: Real-Life Interception of Network Traffic Between Connected Car and Back-End Platforms

Image 1: Connection of the car to external OEM back-end and third-party back-end platforms, representing emerging cyber-risks to connected cars

What is a MITM attack? How does it work on a connected vehicle?

Image 2: Scheme of a Man-in-the-Middle attack
Image 3: Man-in-the-Middle attack for connected cars

What are the consequences of a MITM attack for a connected vehicle?

How can you prevent MITM attacks?

Image 4: The purpose of pen-testing

Conclusion

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store