Skip to main content

Cybersecurity in the connected car

A new report by Danish business analysis company Autintelligence, Cybersecurity in the connected car: technology, industry, and future examines the security implications of increasing connectivity and software complexity in connected and autonomous vehicles. According to the report, advanced connectivity, electronics and software are hallmarks of modern vehicles. A typical connected car contains up to 70 ECUs, and about 100 million lines of code. As vehicles expand in terms of technological complexity,
March 31, 2017 Read time: 2 mins
A new report by Danish business analysis company Autintelligence, Cybersecurity in the connected car: technology, industry, and future examines the security implications of increasing connectivity and software complexity in connected and autonomous vehicles.  

According to the report, advanced connectivity, electronics and software are hallmarks of modern vehicles. A typical connected car contains up to 70 ECUs, and about 100 million lines of code. As vehicles expand in terms of technological complexity, they become an attractive target for cyber-criminals.

The report discusses a range of elements of automotive cyber security, including; Attack surfaces in connected and autonomous vehicles; Core vulnerabilities; Regulations and policies in the US, EU, China, Japan; and Existing market solutions. It also discusses emerging solutions such as (ECU Consolidation, app sandboxing and autonomous security, as well as security by design.

The report also addresses key questions: What makes vehicles vulnerable?; What are the worst-case scenarios?; Where should OEMs invest to secure their connected vehicles?; Can the CAN bus be secured?; Is legislation the answer to raise the bar of security standards in modern vehicles?; Can security by design ever be a commercial reality?; What are the available market solutions, and who are the key players?

Related Content

  • Cloud computing technology benefits GIS
    July 17, 2012
    Geographic Information Systems are a relatively late adopter of cloud computing,but the benefits of host services for geospatial data and analysis are becoming clear. Jason Barnes reports Both the concept and the reality of cloud computing have been around for some time. More and more industry sectors are entrusting external service providers with the provision of their computing services via the internet. However, the Geographic Information System (GIS) industry has been slow to embrace the trend. This is
  • How connectivity and intelligence are redefining the riding experience
    May 31, 2024
    Connected services and safety solutions for vulnerable road users (VRUs) riding two and three-wheelers
  • After two decades of research, ITS is getting into its stride
    June 4, 2015
    Colin Sowman gets the global view on how ITS has shaped the way we travel today and what will shape the way we travel tomorrow. Over the past two decades the scope and spread of intelligent transport systems has grown and diversified to encompass all modes of travel while at the same time integrating and consolidating. Two decades ago the idea of detecting cyclists or pedestrians may have been considered impossible and why would you want to do that anyway? Today cyclists can account for a significant propor
  • Machine vision needs standards to fulfil ITS demands
    May 28, 2014
    No-one should expect the enabling qualities of machine vision to come free of charge but Jason Barnes finds there is still much that ITS stakeholders can do to help reduce costs. After many years of application in high-end solutions for the enforcement and tolling sectors, machine vision is gaining traction in more general areas of traffic management. Nevertheless, those OEMs producing transport-oriented solutions which incorporate machine vision and looking to increase the technology’s share of the ITS mar