Skip to main content

Access and Irdeto partner to protect in-car data and services

Security specialist Irdeto has teamed up with Access Co to develop protection for the increasing amount of personal data that is generated by Wi-Fi, Bluetooth and Vehicle to Everything (V2X) communication. As cars are increasingly turned into open environments due to advances in connectivity, the threat of data theft has risen. Niels Haverkorn, general manager of connected transport at Irdeto, says: “We are partnering with Access to create a complete and secure ecosystem, which means that V2X communicatio
January 22, 2019 Read time: 2 mins

Security specialist 8672 Irdeto has teamed up with Access Co to develop protection for the increasing amount of personal data that is generated by Wi-Fi, Bluetooth and Vehicle to Everything (V2X) communication.

As cars are increasingly turned into open environments due to advances in connectivity, the threat of data theft has risen.

Niels Haverkorn, general manager of connected transport at Irdeto, says: “We are partnering with Access to create a complete and secure ecosystem, which means that V2X communications can be secured so data transmitted from one device to the next cannot be intercepted and tampered with.”

The partnership will “leverage expertise” when it comes to building secure environments to protect possible vulnerabilities such as telematics engine control units and Vehicle to Infrastructure roadside units.

“This multi-layered security strategy allows car manufacturers to identify weak links and block any attack, thus providing a safe and reliable driving experience for consumers,” the companies said in a statement.

Haverkorn warns: “Without these measures, secure communication channels could be used by attackers to send malicious information into the ecosystem, with potentially damaging results for the driver and passengers.”

Meanwhile, increasingly wide-reaching in-car information and entertainment systems are a potential goldmine for hackers seeking to pirate copyrighted material such as movies and games.

“Our partnership with Irdeto enables us to confidently solve this challenge, especially for high value content such as live sports and premium video offerings,” insists Dr. Neale Foster, CEO at Access Europe.

For more information on companies in this article

Related Content

  • European ITS Directive: From Minority Report to majority rapport
    December 1, 2023
    A 21-year old movie by Steven Spielberg appears to predict a C-ITS Day 3 use case. Richard Lax of Kapsch TrafficCom looks at the new European ITS Directive and idly wonders whether the great Hollywood movie director was once a European Commission intern in DG Move…
  • San Francisco transit systems targeted by hackers
    November 28, 2016
    San Francisco’s Municipal Transportation System has apparently been targeted by hackers over the Thanksgiving holiday weekend, the agency to shut down its light-rail ticketing machines and point-of-payment systems and allowing passengers to ride for free. Agency computers displayed the message "You Hacked, ALL Data Encrypted", the San Francisco Examiner reported on Saturday. According to the BBC, the hackers have made a ransom demand of 100 Bitcoin, which amounts to about $70,000 (£56,000). Jon Ge
  • Future of tolling: the priorities
    January 14, 2020
    In the final part of his investigation into the future of tolling technology, Josef Czako of Moving Forward Consulting asks what industry figures see as the priorities going forward…
  • Argus partners with Renesas to secure connected and autonomous vehicles against cyber attacks
    January 9, 2018
    Argus Cyber Security’s Connectivity Protection and Lifespan Protection solution suites have been integrated with Renesas Electronics Corporation’s R-Car H3 Computing Platform, in an agreement which aims to protect infotainment and telematics units in connected and autonomous vehicles against cyber-attacks. The Argus Connectivity Protection is designed with the intention of preventing malware installation, detecting operating system anomalies, isolating suspicious activity and stopping attacks from