Skip to main content

More than 20 million connected cars with built-in software-based security by 2020

The findings of ABI Research’s Automotive Safety & Autonomous Driving and Cybersecurity Research Services indicate that while traditional safety telematics services such as eCall, bCall, stolen vehicle tracking, and diagnostics aimed at the physical protection of vehicles, drivers and passengers are becoming main stream, awareness is growing about the threat of cyber-attacks and their impact on the physical integrity of persons, especially with vehicle-to-vehicle communication and autonomous vehicles. This
February 14, 2014 Read time: 2 mins
The findings of 5725 ABI Research’s Automotive Safety & Autonomous Driving and Cybersecurity Research Services indicate that while traditional safety telematics services such as eCall, bCall, stolen vehicle tracking, and diagnostics aimed at the physical protection of vehicles, drivers and passengers are becoming main stream, awareness is growing about the threat of cyber-attacks and their impact on the physical integrity of persons, especially with vehicle-to-vehicle communication and autonomous vehicles. This is prompting car OEMs and Tier1 suppliers to source security technology, with more than 20 million connected cars forecasted to ship with software-based security by 2020.

“So far connected car security has been mainly based on hardware protection and separation with infotainment and vehicle-centric safety systems shielded from each other.

“However, the shift towards cost-effective software-based security based on virtualisation, containerisation and sandboxing is well under way with 6328 Harman and Mentor Graphics as some of the leading vendors,” says VP and practice director, Dominique Bonte.

1028 Cisco is partnering with 260 Continental and 2165 Visteon to bring enterprise IT connectivity based security technologies such as virtual private networks (VPN), IPsec, encryption and authentication (PKI) to an automotive industry lacking in-house expertise.

For more information on companies in this article

Related Content

  • New Symantec anomaly detection protects connected cars
    September 16, 2016
    Anomaly Detection for Automotive from Cyber security specialist Symantec is designed to protect against zero-day attacks and issues facing modern connected vehicles.
  • Use of ITS technology grows more prevalent in safety applications
    January 30, 2012
    Transportation agencies and governments are using ITS technology to protect critical infrastructure from terrorist attack and other threats to economic security and public safety. Andrew Bardin Williams reports. It is no secret that we live in a potentially dangerous world. Terrorism as seen on 9/11 in the United States, subsequent attacks in London, Moscow and Madrid and other acts of violence across the developing world have made vigilance the watchword for ensuring security. Key infrastructure is now bei
  • Fleet managers ‘likely to opt for brands that offer predictive technologies’
    December 18, 2013
    Fleet management systems (FMS) have an established presence in France, Germany, UK, Italy and Benelux, with 70 per cent of fleet managers claiming familiarity with FMS – 37 per cent are already using it and 33 per cent are testing it. In general, fleet owners display a positive attitude toward FMS, and 35 percent of respondents in a recent Frost & Sullivan survey consider it an absolute necessity. Large fleets are keener to adopt these solutions than small and medium fleets, clearly indicating a lack of awa
  • Access and Irdeto partner to protect in-car data and services
    January 22, 2019
    Security specialist Irdeto has teamed up with Access Co to develop protection for the increasing amount of personal data that is generated by Wi-Fi, Bluetooth and Vehicle to Everything (V2X) communication. As cars are increasingly turned into open environments due to advances in connectivity, the threat of data theft has risen. Niels Haverkorn, general manager of connected transport at Irdeto, says: “We are partnering with Access to create a complete and secure ecosystem, which means that V2X communicatio