Request a call
  • Hidden

AI-enabled Web Application for Vehicle Monitoring and Preventing Cyberattacks

Business Overview

Cyber vulnerabilities are increasing rapidly with the growing number of internet-connected vehicles. Traditional security standards can't improve or deploy quickly enough to handle the increasing number of threats.
SafeRide is a provider of cyber anomaly detection and threat prevention solutions for vehicles powered by AI and machine learning. They offer in-vehicle cybersecurity for real-time, multi-layer monitoring of controller area network (CAN) bus vehicle applications and networks.

The CAN bus is a robust vehicle bus standard designed to allow microcontrollers and devices to communicate with each other’s applications without a host computer. 

The objective is to sell this as a comprehensive solution called vSentry that includes AI-enabled software, the installation of equipment, and staff training.

NIX’s mission was to augment the client’s in-house team, provide the technical know-how and deep understanding of vehicles’ data encryption processes for developing a scalable and secure web application in record time that will:

  • Secure the processes of connected apps and harness in-vehicle data to uncover potential threats and insights
  • Handle errors that come from the controller area network (CAN) bus vehicles in real-time
  • Support microservice architecture and huge data stream coming from CAN buses

Challenge

Robust security and microservice base

The project required a strong security layer and a complete understanding of the vehicles’ data encryption processes. To meet the client’s needs, the NIX team set out to develop an application that will monitor the status of various vehicles, analyze incoming data, and prevent potential attacks or hacking attempts. We needed to implement a web application that would allow the handling of errors that come from the controller area network (CAN) bus vehicles in real-time.

* The CAN bus is a robust vehicle bus standard designed to allow microcontrollers and devices to communicate with each other’s applications without a host computer.

One of the requirements was that the app should support the microservice architecture, and we needed to realize how it should communicate with all other modules within a large system. Also, all the messages coming from the CAN buses must be stored on the application side, which implies a huge data stream.

The application needed to include two main modules:

  • A message decoder from the communication matrix (or CAN matrix)
  • An admin panel that displays all information and provides functionality for error analysis.

Solution

vSentry: high-integrity software powered by AI

The AI-based software establishes a baseline for vehicle behavior by training the machine learning model with a clean dataset. Once the baseline is established, the AI engine monitors data coming from vehicles on the road and identifies function anomalies as potential cyberattacks or malfunctions. Using raw vehicle data, it precisely detects abnormalities and decreases the chances of false-positive alerts.

For example, when a vehicle is attacked, vSentry channels information (different vehicle metrics) through the security software to a CAN bus that receives all incoming data. It reads a variety of signals and sends them to the cloud, where the AI engine analyzes the data and determines the type of cyber attack and its details. This information is then transmitted to a web application that depicts reports and metrics for further processing by a security analyst.

Moreover, the system includes various statistics, configurations, training, and other services.

To ensure resistance, sustainability, and the handling of high data load, we used a timescale database. Later we added modules that allowed us to:

  • Add new CAN matrix structures to the system (different brands of machines, support for different structures);
  • Train a third-party system to detect errors in the data flow;
  • Aggregate general statistics by day and other filters.

The system’s architecture consists of external and internal modules:

  • Data acquisition module — responsible for collecting data and redirecting it to the system;
  • AI Engine — responsible for analyzing the data and generating errors if discrepancies are found in the data.

Our solution is valuable to customers in two scenarios:

  • Providing intrusion detection for vehicles that have no embedded intrusion detection and prevention system (IDPs) installed. In this scenario, the client’s AI solution is a cost-effective way to detect cyberattacks with little or no changes to the vehicle hardware.
  • Providing an additional layer of detection for IDPS-enabled vehicles to address zero-day vulnerabilities.

Outcome

A cost-effective way to detect and prevent cyber attacks

The client received a high-security web application that ensures vehicle safety while protecting personal data and privacy in real-time.

Powered by AI, machine learning, and deep learning, vSentry provides real-time vehicle insights to automakers and fleet owners and helps them reduce warranty costs, minimize vehicle downtime, decrease the total cost of ownership, and optimize vehicle performance.

Client’s testimonial

card photoNoam Shalit
COO at SafeRide Technologies

“We didn’t have enough manpower or the capacity to complete a specific project, so we hired NIX to augment our staff. We started in April 2019, and we’ve been working with NIX on an ongoing basis. Headed by a knowledgeable project lead, the team is experienced and professional. The project manager heads the staff and demonstrates a really high level of expertise. We’ve been impressed by the NIX team’s expertise and we plan to continue working with them”.

  • Team: 6 expertsProject Manager, Business Analyst, Backend Developer, Frontend Developer, QA Engineer, UI/UX Designer
  • Tech stack: React, NodeJS, HTML, WebSocket, Jest, PostgreSQL, InfluxDB, Apache Kafka, Redis, Redux, Redux-Form, Streem, Docker, Swagger, Kubernetes, Nginx

Contact Us

Latest Insights

Guide to Software Integration with Examples, Types, and Benefits

Data silos and lack of transparency are detrimental to a company’s health. Learn how software integrations can remedy these and other common challenges.

Cybersecurity Risk Management Strategy: Tips and Benefits

With the constant uptick of cybercrime, having a fully-fledged cybersecurity risk management strategy can help you safeguard your valuable data and avoid threats.

ServiceNow Virtual Agent: Benefits, Best Practices, and Use Cases

Learn how your organization can benefit from the ServiceNow virtual agent and learn the best practices to build a suitable chatbot for your business.

15 Personal Cybersecurity Tips and Best Practices in 2024

While cybercrime is on the rise, cyber hygiene is more important than ever. Learn actionable cyber security tips to protect your personal information online.

How to Choose a Cross Platform Framework for Your App

How to develop a piece of mobile software in the most all-around cost-efficient, time-efficient, smooth manner based on your specific budget and requirements? Pick the right development model from the get-go. And a cross-platform approach may just be the most optimal choice for you.

5 Essential Stages of App Development: From Idea to Release

Understand the stages in mobile app development – from strategy, identifying the target audience, to app release and its ongoing support.

The Top 10 Mobile App Monetization Strategies: How to Choose

How can you monetize an app without overwhelming your users with ads and alerts? Explore our extensive guide to choosing the best mobile app monetization strategy.

What Are AWS Lambda Functions, and How Can They Improve Your Business?

Discover how AWS Lambda can be beneficial for businesses in various industries, and learn what you need to know in order to leverage it to the max.

What Is Adtech and Why Is It Important?

Do you think it’s worth implementing adtech into your marketing processes? Find out this in our article.