Skip to main content

Cybersecurity in the connected car

A new report by Danish business analysis company Autintelligence, Cybersecurity in the connected car: technology, industry, and future examines the security implications of increasing connectivity and software complexity in connected and autonomous vehicles. According to the report, advanced connectivity, electronics and software are hallmarks of modern vehicles. A typical connected car contains up to 70 ECUs, and about 100 million lines of code. As vehicles expand in terms of technological complexity,
March 31, 2017 Read time: 2 mins
A new report by Danish business analysis company Autintelligence, Cybersecurity in the connected car: technology, industry, and future examines the security implications of increasing connectivity and software complexity in connected and autonomous vehicles.  

According to the report, advanced connectivity, electronics and software are hallmarks of modern vehicles. A typical connected car contains up to 70 ECUs, and about 100 million lines of code. As vehicles expand in terms of technological complexity, they become an attractive target for cyber-criminals.

The report discusses a range of elements of automotive cyber security, including; Attack surfaces in connected and autonomous vehicles; Core vulnerabilities; Regulations and policies in the US, EU, China, Japan; and Existing market solutions. It also discusses emerging solutions such as (ECU Consolidation, app sandboxing and autonomous security, as well as security by design.

The report also addresses key questions: What makes vehicles vulnerable?; What are the worst-case scenarios?; Where should OEMs invest to secure their connected vehicles?; Can the CAN bus be secured?; Is legislation the answer to raise the bar of security standards in modern vehicles?; Can security by design ever be a commercial reality?; What are the available market solutions, and who are the key players?

Related Content

  • May 9, 2022
    BlackBerry warns of hacking danger
    As connected vehicles inch towards becoming a common sight, there are concerns that they are ripe for hacking by malign actors. Alan Dron looks at BlackBerry’s 2022 Threat Report
  • May 6, 2020
    Don’t forget security threat, says Econolite
    A new level of communication is helping deliver on the promise of Vision Zero and a more sustainable future. But amid the promise, Econolite’s Sunny Chakravarty suggests we need to be mindful of the potential downsides in an age of mass connectivity
  • January 31, 2012
    Do we need a new approach to ITS and traffic management?
    In an article which has implications for the European Electronic Toll Service, ASECAP's Kallistratos Dionelis asks whether the approach we currently take to major ITS system implementations is always the best or healthiest. I was asked recently to write a paper on the technology-oriented future of transport. To paraphrase, I started with: "The goal of European policy-makers is to establish a transport system which meets society's economic, social and environmental needs, satisfying in parallel a rising dema
  • January 20, 2017
    Automotive software developers call on hackers to find its flaws
    A consortium of US researchers has announced the development of a universal, free, and open-source framework to protect wireless software updates in vehicles. The team issued a challenge to security experts everywhere to try to find vulnerabilities before it is adopted by the automotive industry. The new solution, called Uptane, evolves the widely used TUF (The Update Framework), developed by NYU Tandon School of Engineering Assistant Professor of Computer Science and Engineering Justin Cappos to secure