Skip to main content

More than 20 million connected cars with built-in software-based security by 2020

The findings of ABI Research’s Automotive Safety & Autonomous Driving and Cybersecurity Research Services indicate that while traditional safety telematics services such as eCall, bCall, stolen vehicle tracking, and diagnostics aimed at the physical protection of vehicles, drivers and passengers are becoming main stream, awareness is growing about the threat of cyber-attacks and their impact on the physical integrity of persons, especially with vehicle-to-vehicle communication and autonomous vehicles. This
February 14, 2014 Read time: 2 mins
The findings of 5725 ABI Research’s Automotive Safety & Autonomous Driving and Cybersecurity Research Services indicate that while traditional safety telematics services such as eCall, bCall, stolen vehicle tracking, and diagnostics aimed at the physical protection of vehicles, drivers and passengers are becoming main stream, awareness is growing about the threat of cyber-attacks and their impact on the physical integrity of persons, especially with vehicle-to-vehicle communication and autonomous vehicles. This is prompting car OEMs and Tier1 suppliers to source security technology, with more than 20 million connected cars forecasted to ship with software-based security by 2020.

“So far connected car security has been mainly based on hardware protection and separation with infotainment and vehicle-centric safety systems shielded from each other.

“However, the shift towards cost-effective software-based security based on virtualisation, containerisation and sandboxing is well under way with 6328 Harman and Mentor Graphics as some of the leading vendors,” says VP and practice director, Dominique Bonte.

1028 Cisco is partnering with 260 Continental and 2165 Visteon to bring enterprise IT connectivity based security technologies such as virtual private networks (VPN), IPsec, encryption and authentication (PKI) to an automotive industry lacking in-house expertise.

For more information on companies in this article

Related Content

  • Motor insurance for autonomous vehicles ‘will shift from drivers to OEMs’
    October 19, 2015
    Autonomous vehicles are likely to increase insurance claims related to product parameters rather than driver liability New analysis from Frost & Sullivan, Impact of Automated Vehicles on Motor Insurance Market, finds that motor insurers will move away from the driver-centric strategy to follow one or a combination of three models as automated vehicles become common: product-centric evaluation; brand-centric evaluation; system-centric evaluation.
  • Connecting DoTs with IoT for secure, connected transportation systems
    January 11, 2022
    Michelle Maggiore of Cisco outlines how connected roadways and intersections can help improve safety, reduce traffic congestion, and minimise our carbon footprint
  • Legislation will drive market for telematics systems in Europe, Russia
    December 5, 2012
    According to a new report from Frost and Sullivan, the European automotive navigation market will witness a shift towards integration and a continual trend towards low-cost connected navigation, which will become a commodity. With Smartphone replication technologies, Smartphone-based navigation inside cars will dominate the market, serving all car segments. The eCall in Europe and ERA-GLONASS in Russia, which mandate automated emergency response systems in vehicles, will lead to Europe becoming one of the b
  • Argus partners with Renesas to secure connected and autonomous vehicles against cyber attacks
    January 9, 2018
    Argus Cyber Security’s Connectivity Protection and Lifespan Protection solution suites have been integrated with Renesas Electronics Corporation’s R-Car H3 Computing Platform, in an agreement which aims to protect infotainment and telematics units in connected and autonomous vehicles against cyber-attacks. The Argus Connectivity Protection is designed with the intention of preventing malware installation, detecting operating system anomalies, isolating suspicious activity and stopping attacks from