Skip to main content

Harman and Airbiquity join forces on intrusion detection solution for connected vehicles

US connected technologies companies Harman International Industries and Airbiquity have announced the first automotive grade end-to-end intrusion detection system (IDS) for connected vehicles at TU-Automotive Europe 2016 in Munich, Germany. The solution combines Harman's intrusion detection and prevention system inside the vehicle with Airbiquity's cloud-based Choreo service delivery platform and software and data management solution to provide a robust connected vehicle security threat detection and res
November 1, 2016 Read time: 1 min
US connected technologies companies 6328 Harman International Industries and 4943 Airbiquity have announced the first automotive grade end-to-end intrusion detection system (IDS) for connected vehicles at TU-Automotive Europe 2016 in Munich, Germany.

The solution combines Harman's intrusion detection and prevention system inside the vehicle with Airbiquity's cloud-based Choreo service delivery platform and software and data management solution to provide a robust connected vehicle security threat detection and response capability for automotive customers and their consumers.

Harman's embedded Ecushield software, which provides continuous security threat monitoring and identification for internal vehicle networks, detects and logs security intrusions locally. Once logged, Airbiquity's Choreo platform and software and data management solution collects the Ecushield intrusion information from the vehicle, aggregates it in the cloud, and automates alerts and reports so automotive customers can quickly assess and execute security-centric actions, including the secure transmission and installation of vehicle software updates from the cloud to mitigate future threats and restore impacted systems and components.

Related Content

  • August 10, 2016
    Technologies to protect connected cars ‘not being utilised’
    A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’. The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbe
  • June 7, 2012
    Camera technology a flexible and cost-effective option
    Perceptions of machine vision being an expensive solution are being challenged by developments in both core technologies and ancillaries. Here, Jason Barnes and David Crawford look at the latest developments in the sector. A notable aspect of machine vision is the flexibility it offers in terms of how and how much data is passed around a network. With smart cameras, processing capabilities at the front end mean that only that which is valid need be communicated back to a central processor of any descripti
  • March 2, 2012
    San Diego deploying Apollo Video Technology’s transit camera system
    San Diego’s Metropolitan Transit System (MTS), in California, has selected Apollo Video Technology’s RoadRunner MRH DVR and back-end management software for its fleet of transit vehicles.
  • February 2, 2024
    Intertraffic Awards 2024: finalists announced
    15 entries across three awards have been recognised for their innovation in mobility