Light Broadcasting Security Technology

Automotive Cybersecurity and Physical Security

In an era where connected cars are becoming increasingly prevalent, the need for robust cybersecurity measures is more critical than ever; as well as there is an evident need for protection from many different RF wireless hacks that have been successful in hacking user credentials and actually stealing all types of connected cars.

Among various innovative solutions, our “LightKey” broadcasting security technology emerges as a cornerstone in the realm of vehicular cybersecurity. This blog article reviews some aspects of our LightKey for automotive technology, in terms of the LightKey value proposition and its pivotal role in safeguarding connected cars against cyber security attacks and against and physical car theft threats.

The Rise of Connected Cars and Associated Cyber Risks

The automotive industry has witnessed a significant shift towards connected vehicles, integrating advanced AI and networked micro-controllers. While these technological advancements offer enhanced functionality and user experience, they also introduce substantial cybersecurity risks. The Controller Area Network (CAN) of these vehicles, crucial for internal communication, typically lacks encryption, making it vulnerable to cyber-attacks. The dire need for secure and authenticated wireless communication systems in connected cars has never been more apparent.

Understanding Light Broadcasting Security Technology

LightKey broadcasting security technology utilizes light signals to authenticate the user of a connected car. This method involves transmitting a unique sequence of light signals that the vehicle owner or authorized user must recognize and respond to correctly. This interaction is facilitated through our mobile LightKey app and/or through our remote user authentication procedures. The uniqueness of the light sequence produced by our LightKey App and devices, make it a robust authentication tool that is hard to replicate or interfere with by unauthorized entities.

Advantages of Light Broadcasting in Vehicle Security

Enhanced Authentication: The light broadcasting system provides a secure and reliable method for authenticating legitimate users, thereby preventing unauthorized access to the vehicle.

Backward Compatibility: This technology can be seamlessly integrated into older vehicle models, making it an ideal solution for retrofitting cybersecurity measures in a vast range of cars.

Low Risk of Interference: Unlike radio frequency-based systems, light signals are less prone to interception or jamming, offering a more secure communication channel.

User-Friendly Interface: With intuitive interaction mechanisms, light broadcasting systems can be designed for ease of use, ensuring that legitimate users are not inconvenienced.

Integrating Light Broadcasting with CAN Systems

To fully harness the potential of light broadcasting technology, LightKey is integrated with the vehicle’s CAN system in a fail-safe and tamper-proof manner. In the event of unauthorized access attempts, the system can issue commands to immobilize the vehicle. This integration not only adds an extra layer of security but also ensures immediate action in case of a breach, safeguarding both the vehicle and its occupants.

Addressing Challenges in Implementation

Implementing light broadcasting security technology involves overcoming several challenges:

Compatibility Across Different Models: The system must be adaptable to various vehicle architectures, ensuring broad applicability.

Ensuring Reliability: The technology must consistently perform under different environmental conditions, maintaining its effectiveness regardless of lighting or weather conditions.

Balancing Security and Convenience: While maximizing security, the system should not overly complicate the user experience or cause undue inconvenience.

The Role of Light Broadcasting in Legal and Insurance Frameworks

Considering legal frameworks like the UK’s 2018 Automated and Electrical Vehicle Bill, which emphasizes the importance of cybersecurity in connected cars, light broadcasting technology can play a significant role. By providing a secure method of user authentication and firmware updates, it aligns with potential legal requirements, thereby mitigating insurance risks associated with cyber vulnerabilities.

Future Prospects and Industry Impact

The adoption of light broadcasting security technology in connected cars could have far-reaching implications for the automotive industry. It sets a precedent for innovative cybersecurity solutions and may inspire the development of standardized security protocols across various manufacturers.

Light broadcasting security technology stands as a pioneering solution in the quest to bolster cybersecurity in connected cars. Its ability to provide secure user authentication, coupled with its integration with the vehicle’s CAN system, marks a significant stride in protecting vehicles from cyber threats. As the automotive industry continues to evolve, embracing such innovative technologies will be crucial in ensuring the security and safety of connected vehicles. Light broadcasting security technology not only addresses current cybersecurity challenges but also paves the way for a safer and more secure automotive future.

Connected & Self-Driving Car Security

The computer and telecommunications industries are today in a dynamic state of convergence with the auto and cybersecurity industries. Such convergence is creating a unique large-scale opportunity for development of a new generation of vehicle computation retro-fit devices that are capable of delivering powerful tamper-proof cybersecurity solutions. Something which is sorely needed and, in order to empower users with an unexpected and truly revolutionary new level of processing power and vehicle security at the edge. In particular, we believe that these industries are yet to create and implement more reliable and more secure wireless technologies. A new approach to existing connected and autonomous vehicle security problems is painfully required, worldwide. A solution that is capable of accelerating the advent of a new generation of “secure connected vehicles.”

We believe there is a clear market opportunity for delivery of much more powerful edge-computing retro-fit hardware into existing and new vehicles. We believe that we must visualize the future by looking through the lens of innovation.

At Quantum Light Ltd, we can see a very clear strategic need to quickly and inexpensively deliver into these markets our new generation of hardware and software retro-fit technologies, secured by our own optical innovation! Millions of insecure connected cars are on the road today, which urgently require a new cybersecurity and edge-computing solution. A new tamper-proof vehicular security solution that may soon help accelerate large-scale deployment of end-to-end, secure and most importantly, regulatory compliant, wireless networks of connected and autonomous vehicles. In the U.K. we have a wide-spread and unsolved connected-vehicle problem. A key and painful problem, which shockingly impacts the owners of most if not all “smart connected vehicles.” There are literally millions of connected and autonomous vehicles, which are currently suffering from poor hardware security.

A serious problem, significantly impacting connected car markets and limiting their potential. Consider the fact there are over 10 million connected vehicles on British roads, which are unable to comply with the 2018 Automated and Electric Vehicle Law, for many reasons! We believe there is clear and very large market demand for securing connected vehicles. We have in our hands an opportunity to help solve a mission-critical obstacle in the path to deployment of automated and connected vehicles.

Edge computing for cars is powerful but not enough. Secure communications require more edge-computation power. Connected and AI self-driving cars require much higher mission-critical levels of communications’ cybersecurity. Connected and self-driving vehicles are vulnerable and we have to address these flaws as soon as possible.

Photo Credit: Car & Driver Magazine

The “Internet-of-things” along with the advent of car electronic control units or microprocessors for “wireless connected cars” may perhaps be compared to a similar “convergence point” in the computer industry during the 1970 to 1979 period. I can see an applicable system topology metaphor: personal computers versus the Mainframe terminals? The answer was of course that users demand more computation power in their hands. I think we can extrapolate the same paradigm and realise that there is a need for more computation power in the car, at the edge. We need more local power.

McKinsey & Company “How the Convergence of Automotive and Tech will create a new Ecosystem” (1)

In terms of Cybersecurity, it’s necessary to speed up development of the connected car’s Cybersecurity architecture. At the moment, most cars rely on typical centralized Server network topologies, exposing unencrypted internet traffic to and from cars.

Source: Gyrfalcon Technology Inc.

We are faced with Cybersecurity problems in connected cars, despite the obvious powerful computer smarts of modern connected AI self-driving cars and even considering the remarkable computation power derived from over 100 individually networked micro-controllers or mini-computers on-a-chip, all part of the car’s brains. We may also find in “connected AI self-driving” automobiles, an estimated 100 million lines of car computer code are running at once.

Alas! despite of all these marvelous microcontrollers, not much power “at the AI car edge” is dedicated to wireless communications. Cybersecurity cannot be achieved at the edge by software alone, since the entire “Controller Area Network” of each car is unprotected. There is no encryption of data flowing in the CAN network of cars, which is the internal hardware network that connects all components in modern cars.

Source: Gyrfalcon Technolgy Inc.

The UK 2018 Automated and Electrical Vehicle Bill may one day require owners to install a specialized connected car Cybersecurity device, or else incur serious Insurance risk in cases of accidents for cars that operate with any level of self-driving AI software. An insurance liabiilty risk exists in the UK when, after an accident it is determined there were no secure firmware updates for the car’s operating AI software. It is hard to believe, but currently most if not all connected cars… cannot comply with this UK Law and physically due to the nature of their on-board electronics, cannot update AI firmware using secure and authenticated wireless transmissions.

United Kingdom 2018 Automated and Electric Vehicles Act 2018

Therefore, despite the technological marvels offered by connected cars today (like driving a collection of small computers on wheels) we are still not safe in terms of Cybersecurity since each one element of this automotive “Controller Area Network” does not have encryption and no way to update AI firmware wirelessly under secure authentication. There are no software “patches” possible to a hardware problem.

The automotive industry has NO shared security standards for different automotive vendors of electronic parts. Since each new part has no built-in credible Cybersecurity… once connected to the Internet, cars could become a hacking target. (2)

Hacking attacks on a “Connected Car” pose a significant risk due to the fact the car’s “Controller Area Network” manages in-car messages from different mission critical car systems, which many times may be life-critical to the driver and to the safety of other cars in proximity to the vehicle. The most vulnerable “attack vectors” are of course the user credentials & smartphone devices, which are also prone to hacking security keys and it’s best not to mention other attack vectors that pose significant “fleet” risk.

Copyright(c) Helios Energia Ltd 2022

As the car industry moves faster to develop better self-driving artificial intelligence vehicles, it becomes ever more critical to invent new solutions that offer robust network security from hacking intruders. This problem presents a significant risk for users and also for car manufacturers, as well as for the Insurance industry, since the costs of insurance coverage reflect implicit security risks in today’s digital economy.

In the future, we venture to forecast that it will not be possible to legally operate self-driving cars on UK motorways without a hardened on-board computational and secure wireless communications system for certification of the roadworthiness and reliability of such autonomous vehicles. Encrypted, secure and authenticated wireless frequent updates of critical self-driving firmware software, requires the installation of a retrofit tamper proof, new genertion “firewall” security communications device: AEBIS.

Our need for incorporating an entire new level of effective Cybersecurity to vehicle manufacturing is becoming increasingly demanding; in order to resolve the issues of safety and system integrity for more than 10 million connected cars on UK motorways alone. We respectfully and humbly posit, Connected Car Cybersecurity is a strategic imperative for the future of AI autonomous and connected vehicles to the Internet.

Floren Cabrera F. de Teresa, CEO


Quantum Light Introduction

by Lawrence Klaes, Science Editor

Convergence of digital and physical worlds requires an entirely new cyber security arquitecture.

We are at the threshold of a real revolution in computer technology, one that will literally change how our society currently functions and interacts with the machines and systems we operate now in ways we can only imagine.

This technology is quantum computing and its key aspects, namely security. This computing system is so named for it operates on the very foundations and principles of quantum physics. Utilizing the seemingly magical properties of the quantum state in our macroscopic world, quantum computing offers the ability to store data in quantities that may seem as unbelievable to us as a modern laptop holding terabytes of information would to someone at the start of the Computer Age in the mid-Twentieth Century.

Protecting the New Gold Standard: Information

In the often prescient 1992 film Sneakers, the character of Cosmo explains what has become the true ultimate commodity of the modern technological era:

“The world isn’t run by weapons anymore, or energy or money. It’s run by ones and zeroes, little bits of data. It’s all just electrons.

“There’s a war out there, old friend, a world war. And it’s not about who’s got the most bullets. It’s about who controls the information …what we see and hear, how we work, what we think. It’s all about the information.”

Our civilization runs on information of all sorts every second of every day. Most of this information is now stored, analyzed, filtered, and run through our elaborate systems of computers and the networks that deliver and collect them.

While much of the information our society needs to function is widely available, there is also a plethora of data that requires being protected for reasons ranging from personal privacy to national security. While current computers have a wide range of methods to secure the information placed on them, it is not always enough. Someone always seems ready and able to find a way to break through even the most sophisticated security cyphers and codes.

Quantum computers can change all this. Using the rules of quantum physics, more information could be stored on such a system than would ever be possible on a machine in the macrorealm. These same physics can also provide encryption protection that would make it virtually impossible to decode or otherwise break both stored data and its transmission from one computer system to another.

This medium is new and pioneering. There are many obstacles to overcome. Nevertheless, quantum computing and cryptography are real and offer possibilities that could transform our world and our species in ways we now only think of as science fiction. Quantum Light is leading the way in this incredible tomorrow. Learn how here

Optical Security by the Laws of Physics

by Floren Cabrera F. de Teresa

Our world-wide-web cannot be effectively secured from hacking and much less can we currently secure “embedded devices” in the so-called “Internet-of-things.”

The security architecture of the Internet’s TCP/IP packet and DNS routing networks has largely been exceeded in terms of current capabilities to secure the Internet-of-Things. This is due to the fact a number of structural vulnerabilities exist – some still “zero-day” and others were inadvertently incorporated into the architecture for example of x86 chipsets. Many computer processors can be accessed via MINIX-3 types of utilities in order to easily obtain plain-text user-credentials dumps, directly from most types of x86 chipsets and exposing many mission critical devices to hacking threats.

The most worrisome “threat-model” is that of compromising user-credentials on-line and this has been manifest by an increasing number of “connected car” robberies and car hijackings using user compromised-credentials from typical hacks of mobile or laptop devices. In addition, the automotive industry is ill prepared to respond to this threat, as the “controller area network” (CAN) of cars is wide-open by necessity since there are no standards among many participants in the OEM electronics industry.

Vulnerabilities of the Internet and the “Internet-of-Things.”

  • IoT insecurity, low computational power & rigid Tx/Rx protocols
  • Network traffic transmission of encryption keys and sensitive plaintext credentials
  • IoT data and firmware updates (are not encrypted) and unverified before upload
  • Identity of servers is exposed by TCP/IP connection protocols for authentication
  • Firmware contains security information exposed in unencrypted traffic
  • Poorly implemented TLS 1.3 Standard as per the UK National Cyber Security Centre
  • Physical on-premise local services serious Ethernet and USB port vulnerabilities
  • Misconfigured SSL/TLS by users in addition to legacy hardware and software
  • Credentials at risk of being exposed by downloadable MCU/CPU firmware
  • Internet Cloud susceptible to SQL injection, cross-site scripting, request forgery and TLS implicit trust.

UK Automated and Electric Vehicle Bill and Cyber Security

The UK’s 2018 “Automated and Electric Vehicle” Bill poses serious liabilities for Insurance companies in case that an accident should occur without the requisite “critical software uploads and updates” as defined in the new Law. Most current “connected cars” simply use an SMS 3G/4G GSM connection via a mobile network carrier, without any thought for the required “authenticated software and firmware uploads, factory reset” and other features that now since April, are in effect mandated by Law. Therefore, we have a unique opportunity before us if we were able to rapidly deploy our AEBIS hardware/software retrofit solution.

This UK legislation addresses certain key principles of connected car security, most of which cannot be currently met by existing “connected car” entertainment and wireless systems! In other words, there could be up to 9 million vehicles on UK roads that are NOT compliant with UK law. This creates a significant risk exposure for insurance companies, as well as for drivers, who must provide proof effective of secure and authenticated firmware uploads, sanitation of user credentials or factory reboot and other features of security functionalities that current IoT (internet-of-things) automotive devices are simply not prepared to process nor are able to deliver with simple software updates.

Any viable solution that is fully compliant with the new 2018 Automated and Electric Vehicle UK Bill, will require a hardware retrofit module in order to increase the processing power and capabilities of the system to comply with UK new Laws. The insurance industry is particularly exposed to serious liabilities resulting from the current lack of compliance of connected cars.

1. – Retrofit telematics car market in the United Kingdom: there are over 32 million cars in the U.K. with an active secondary used car market valued at over £43 billion and representing over 400,000 trades per year.

2. – Connected car market in the UK, with over 8.5 million connected vehicles that are on the road today. We have traction with one of the top-ranked Venture Capital investors in AI autonomous car in the UK and if we were to deploy our solution with IBM Watson, we could close an important investment.

3. – The fleet market for long-haul lorry drivers and commercial vehicles that are constantly on the road. We are in confidential discussions with the largest fleet operators both in Europe and in America, with lots of traction and a possible sales order for our products. Three are literally millions of unprotected IoT devices, some of which are in mission critical networks. This is an urgent security need, which represents and technical challenge and an opportunity for Quantum Light to capture and together with the right large strategic partner – Helios Energia our parent company is honoured to be an IBM Business Partner. This “Big Play” business case. IoT cybersecurity problems are present for all Internet connected networks, including the IBM Cloud, since most IoT firmware and user data is not encrypted, firmware updates are most commonly not available for most “smart-devices” and those with software updates are not-encrypted and credentials are exposed.

Quantum Light Ltd has developed LightKey(R) in order to help our Clients mitigate the high level of cybersecurity risks and digital-threat environment that we all face today.