Skip to main content

Cybersecurity in the connected car

A new report by Danish business analysis company Autintelligence, Cybersecurity in the connected car: technology, industry, and future examines the security implications of increasing connectivity and software complexity in connected and autonomous vehicles. According to the report, advanced connectivity, electronics and software are hallmarks of modern vehicles. A typical connected car contains up to 70 ECUs, and about 100 million lines of code. As vehicles expand in terms of technological complexity,
March 31, 2017 Read time: 2 mins
A new report by Danish business analysis company Autintelligence, Cybersecurity in the connected car: technology, industry, and future examines the security implications of increasing connectivity and software complexity in connected and autonomous vehicles.  

According to the report, advanced connectivity, electronics and software are hallmarks of modern vehicles. A typical connected car contains up to 70 ECUs, and about 100 million lines of code. As vehicles expand in terms of technological complexity, they become an attractive target for cyber-criminals.

The report discusses a range of elements of automotive cyber security, including; Attack surfaces in connected and autonomous vehicles; Core vulnerabilities; Regulations and policies in the US, EU, China, Japan; and Existing market solutions. It also discusses emerging solutions such as (ECU Consolidation, app sandboxing and autonomous security, as well as security by design.

The report also addresses key questions: What makes vehicles vulnerable?; What are the worst-case scenarios?; Where should OEMs invest to secure their connected vehicles?; Can the CAN bus be secured?; Is legislation the answer to raise the bar of security standards in modern vehicles?; Can security by design ever be a commercial reality?; What are the available market solutions, and who are the key players?

Related Content

  • Sorting sensible from shiny in tolling technology
    December 11, 2014
    Instead of always striving for the latest shiny toys Kevin Hoeflich of HNTB advises a 10-steps method for selecting the most appropriate technology. Amid the hype and razzmatazz surrounding the launch of Apple’s iPhone 6, the company also announced its new mobile payment system, Apple Pay. Built into the new iPhone 6, Apple Pay works at 220,000 merchants across America and is supported by major US banks and the big three credit card companies.
  • ITS America maps out implications and opportunities for ITS industry
    November 28, 2012
    A critical milestone was reached in July 2012, when the US Congress passed, and President Obama signed, legislation reauthorising the nation's surface transportation programs, breaking a nearly three-year log-jam which had blocked critical transportation reforms and delayed much-needed infrastructure projects. In a town where compromise is sometimes considered an endangered species, Republicans and Democrats came together during a months-long series of negotiations and hashed out a bipartisan agreement that
  • Automotive players targeting corporate mobility
    April 14, 2015
    Offering services that facilitate an integrated door-to-door business travel management solution is one of the main focus areas for growth and investment in 2015 in the automotive industry, according to Frost & Sullivan. With the business travel market worth US$1.3 trillion (GBTA), there is an increasing trend towards companies using online booking tools and cloud based services to plan, book, and expense/account business trips. Automotive market players are working to have their share of the future corpora
  • Gridsmart tackling infrastructure security threat
    June 7, 2018
    A new division, formed by Gridsmart Technologies only three weeks ago, is making its public debut here at ITS America Detroit. Gridsmart Information Security & Threat Intelligence (ISTI) is an industry first-of-its-kind transportation cybersecurity group dedicated to providing vulnerability/threat assessments and tailored security strategies. It will work with private companies, departments of transportation, and others to proactively defend and enhance the resiliency of their technical infrastructure