Skip to main content

Making connections without compromising security

We listen in as global experts discuss connected vehicles and cybersecurity. By 2019 there will be almost 44 million connected cars globally and by 2022 that figure will be nearer 70 million; some 40% will be electric powered, according to market analyst Frost & Sullivan. But its report said the issue of end-to-end security for the new technology is still under debate, as vehicle OEMs engage with vendors to test specific security application areas for both over-the-air and vehicle-to-exterior services.
November 10, 2017 Read time: 4 mins
It is not only new vehicles like the ones rolling off Fiat Chrysler’s assembly line that will be connected.
We listen in as global experts discuss connected vehicles and cybersecurity.


By 2019 there will be almost 44 million connected cars globally and by 2022 that figure will be nearer 70 million; some 40% will be electric powered, according to market analyst 2097 Frost & Sullivan. But its report said the issue of end-to-end security for the new technology is still under debate, as vehicle OEMs engage with vendors to test specific security application areas for both over-the-air and vehicle-to-exterior services.

Traditionally, the car has been a secure, closed environment. But connected vehicles (CVs) are potentially open, and thus of interest to the maliciously-minded, with more than 50 points of vulnerability that can be used to threaten people’s lives and automakers’ reputation.  

A webinar hosted by Frost and Sullivan’s head of digital transformation, Jean-Noël Georges, discussed the current state of play with Christine Caviglioli (vice-president of automotive of digital security specialist M2M Gemalto) and Yvan Gravier, CEO of French CV open data startup Eliocity.  

Cybersecurity management and the building up of consumer confidence will be the two decisive factors for the continued growth of the CV sector, warned Georges. He cited Fiat Chrysler’s voluntary safety recall of some 1.4 million cars and trucks equipped with radios that enable remote updating of the in-vehicle software.

The recall, to check the vehicles’ security against possible imitation attacks by hackers, followed the high-profile cyberjacking of a Cherokee Jeep. Those responsible were able to remotely manipulate some of the vehicle’s critical functions, including transmission, steering and brakes. At that time Fiat Chrysler stated that, to its knowledge, there had not been a real-world incident of remote hacking into any of its vehicles and that the recall had found no defects.

“But,” stressed Georges, “it is now becoming obligatory for auto-industry OEMs to actively pursue cybersecurity measures rather than simply trying to mitigate the risks.” These can include breaking into cloud infrastructures, ‘sniffing’ data from communications networks and intruding into a vehicle’s engine control unit or infotainment system.

“Once these risks are being better planned for, however”, he continued, “the CV revolution will prove to be a fantastic opportunity for the traditional players to reinvent the way in which consumers interact with automakers and their vehicles.” He pointed to the likes of Apple CarPlay and Android Auto, which are already making themselves felt in the connected car market; with Apple nurturing plans to mimic its software role inside the vehicle. “These are providing opportunities for the automotive industry to reinvent itself; but the levels of encryption will be critical.”

Caviglioli highlighted the importance of building a ‘chain of trust’. This has to run from the initial design and the vehicle’s manufacture, to its sale through a dealership and continued via periodic diagnostics and maintenance (while accommodating changes of ownership) to final scrapping. “Security will need to be both by default and design, with the emphasis on protecting what matters, where it matters and when it matters,” she continued, emphasising the need for the protection of the contained data in a car along the way.

The ownership issue, stressed Gravier, will become all the more relevant in an era when people will no longer be using individually-owned cars as all-purpose vehicles, but looking for the optimal mobility solution for each specific need – including the sharing of connected cars. These, he said, will include upgraded, existing vehicles as well as new ones coming fully equipped off the production lines. Aftermarket installation for connectivity will need to be carried out by reliable companies.

There will also need to be clear protocols for the sharing of, and creating value from, the data generated by and collected from connected cars while out on the roads, with implications for its long-term management and security.

Related Content

  • October 31, 2018
    Less than 1% of UK drivers aware of hacking threats – new research
    Nearly all UK drivers with keyless technology are unaware of the major digital threats posed by hackers, according to research conducted by MoneySuperMarket. The study reveals that 99% of drivers are unaware of security flaws such as phone phishing, where hackers send emails to drivers which contain malicious links that connect to a car’s Wi-Fi features and take control. MoneySuperMarket says 16% of drivers - or someone they know - have experienced car hacking. Also, eight out of 10 drivers do not k
  • February 20, 2014
    Are Detroit OEMs heading towards extinction if Apple acquires Tesla?
    Analyst comment from Frost & Sullivan indicates that the business consulting firm believes that Detroit OEMs are in trouble if Apple acquires Tesla and thinks that the rumours surrounding this potential acquisition have some fire behind them. According to automotive and transportation team leader Paraná Tharthiharan: "Apple has an arm that researches automated driving technology and Tesla is also interested in automated driving. Hence, the speculations carry more weight than mere rumours, as if about cel
  • May 14, 2018
    The rise of V2X: it’s time for ITS to put up the shields in cyberspace
    Traffic management has largely been shielded from the sort of malicious hacking that is commonplace in other industries – but with billions of connected devices in the world it won’t stay that way, warn internet experts Keith Golden and Brandon Johnson. Traditionally isolated from networks and the internet over most of its history, the traffic management industry has largely been shielded from malicious hacking and system intrusion that have become commonplace in other industries. However, as the rate of
  • October 8, 2018
    Blockchain: the next big thing for ITS? Really?
    Everyone’s heard of blockchain – but most people are less sure about what it really is, and how it might be used in transportation. Andrew Williams peers into cyberspace to find some answers. A growing number of organisations in the ITS industry are exploring how blockchain technology could be used for ITS and mobility applications. So, what exactly is blockchain technology? What are the key current and potential applications in the mobility and ITS sector? And what practical benefits might it bring?