Skip to main content

Cybersecurity in the connected car

A new report by Danish business analysis company Autintelligence, Cybersecurity in the connected car: technology, industry, and future examines the security implications of increasing connectivity and software complexity in connected and autonomous vehicles. According to the report, advanced connectivity, electronics and software are hallmarks of modern vehicles. A typical connected car contains up to 70 ECUs, and about 100 million lines of code. As vehicles expand in terms of technological complexity,
March 31, 2017 Read time: 2 mins
A new report by Danish business analysis company Autintelligence, Cybersecurity in the connected car: technology, industry, and future examines the security implications of increasing connectivity and software complexity in connected and autonomous vehicles.  

According to the report, advanced connectivity, electronics and software are hallmarks of modern vehicles. A typical connected car contains up to 70 ECUs, and about 100 million lines of code. As vehicles expand in terms of technological complexity, they become an attractive target for cyber-criminals.

The report discusses a range of elements of automotive cyber security, including; Attack surfaces in connected and autonomous vehicles; Core vulnerabilities; Regulations and policies in the US, EU, China, Japan; and Existing market solutions. It also discusses emerging solutions such as (ECU Consolidation, app sandboxing and autonomous security, as well as security by design.

The report also addresses key questions: What makes vehicles vulnerable?; What are the worst-case scenarios?; Where should OEMs invest to secure their connected vehicles?; Can the CAN bus be secured?; Is legislation the answer to raise the bar of security standards in modern vehicles?; Can security by design ever be a commercial reality?; What are the available market solutions, and who are the key players?

Related Content

  • February 1, 2012
    Cooperative road infrastructures - progress and the future
    Robert Bertini, deputy administrator of the USDOT's Research and Innovative Technology Administration, discusses the research and deployment paths of cooperative road infrastructures. High-level analysis by the US's National Highway Traffic Safety Administration (NHTSA) of the potential of Vehicle-to-Infrastructure/Infrastructure-to-Vehicle (V2I/I2V) and Vehicle-to-Vehicle (V2V) technologies indicates that V2V could in exclusivity address a large proportion of crashes involving unimpaired drivers. In fact,
  • December 8, 2023
    Yutraffic Studio launched in US as SaaS solution
    It can 'ingest massive amounts of local and third-party data', including from connected vehicles
  • July 18, 2023
    Control rooms prepare for AI disruption
    From the cloud to AI, big change is coming to the control room technology sector. Adam Hill asks experts from Barco, UVS and Swarco what developments they are seeing as data points proliferate
  • August 15, 2016
    Millions of cars at risk due to flaw in keyless entry systems, say researchers
    Researchers at the University of Birmingham in the UK have found that millions of cars could be vulnerable to theft, due to a flaw in keyless entry systems in many models. The findings, presented at the 25th USENIX Security Symposium in Austin, Texas, highlight two case studies that outline the ease at which criminals could gain access to numerous vehicles with relatively simple and inexpensive methods. Both attacks use a cheap, easily available piece of radio hardware to intercept signals from a key