Skip to main content

Making connections without compromising security

We listen in as global experts discuss connected vehicles and cybersecurity. By 2019 there will be almost 44 million connected cars globally and by 2022 that figure will be nearer 70 million; some 40% will be electric powered, according to market analyst Frost & Sullivan. But its report said the issue of end-to-end security for the new technology is still under debate, as vehicle OEMs engage with vendors to test specific security application areas for both over-the-air and vehicle-to-exterior services.
November 10, 2017 Read time: 4 mins
It is not only new vehicles like the ones rolling off Fiat Chrysler’s assembly line that will be connected.
We listen in as global experts discuss connected vehicles and cybersecurity.


By 2019 there will be almost 44 million connected cars globally and by 2022 that figure will be nearer 70 million; some 40% will be electric powered, according to market analyst 2097 Frost & Sullivan. But its report said the issue of end-to-end security for the new technology is still under debate, as vehicle OEMs engage with vendors to test specific security application areas for both over-the-air and vehicle-to-exterior services.

Traditionally, the car has been a secure, closed environment. But connected vehicles (CVs) are potentially open, and thus of interest to the maliciously-minded, with more than 50 points of vulnerability that can be used to threaten people’s lives and automakers’ reputation.  

A webinar hosted by Frost and Sullivan’s head of digital transformation, Jean-Noël Georges, discussed the current state of play with Christine Caviglioli (vice-president of automotive of digital security specialist M2M Gemalto) and Yvan Gravier, CEO of French CV open data startup Eliocity.  

Cybersecurity management and the building up of consumer confidence will be the two decisive factors for the continued growth of the CV sector, warned Georges. He cited Fiat Chrysler’s voluntary safety recall of some 1.4 million cars and trucks equipped with radios that enable remote updating of the in-vehicle software.

The recall, to check the vehicles’ security against possible imitation attacks by hackers, followed the high-profile cyberjacking of a Cherokee Jeep. Those responsible were able to remotely manipulate some of the vehicle’s critical functions, including transmission, steering and brakes. At that time Fiat Chrysler stated that, to its knowledge, there had not been a real-world incident of remote hacking into any of its vehicles and that the recall had found no defects.

“But,” stressed Georges, “it is now becoming obligatory for auto-industry OEMs to actively pursue cybersecurity measures rather than simply trying to mitigate the risks.” These can include breaking into cloud infrastructures, ‘sniffing’ data from communications networks and intruding into a vehicle’s engine control unit or infotainment system.

“Once these risks are being better planned for, however”, he continued, “the CV revolution will prove to be a fantastic opportunity for the traditional players to reinvent the way in which consumers interact with automakers and their vehicles.” He pointed to the likes of Apple CarPlay and Android Auto, which are already making themselves felt in the connected car market; with Apple nurturing plans to mimic its software role inside the vehicle. “These are providing opportunities for the automotive industry to reinvent itself; but the levels of encryption will be critical.”

Caviglioli highlighted the importance of building a ‘chain of trust’. This has to run from the initial design and the vehicle’s manufacture, to its sale through a dealership and continued via periodic diagnostics and maintenance (while accommodating changes of ownership) to final scrapping. “Security will need to be both by default and design, with the emphasis on protecting what matters, where it matters and when it matters,” she continued, emphasising the need for the protection of the contained data in a car along the way.

The ownership issue, stressed Gravier, will become all the more relevant in an era when people will no longer be using individually-owned cars as all-purpose vehicles, but looking for the optimal mobility solution for each specific need – including the sharing of connected cars. These, he said, will include upgraded, existing vehicles as well as new ones coming fully equipped off the production lines. Aftermarket installation for connectivity will need to be carried out by reliable companies.

There will also need to be clear protocols for the sharing of, and creating value from, the data generated by and collected from connected cars while out on the roads, with implications for its long-term management and security.

For more information on companies in this article

Related Content

  • EV inductive charging set to gain traction
    June 13, 2014
    New analysis from Frost & Sullivan, Strategic Analysis of Inductive Charging for Global Electric Vehicles (EV) Market, finds that the total market for inductive charging is expected to experience a compound annual growth rate of 126.6 per cent from 2012 to 2020, with approximately 351,900 units likely to be sold. Inductive charging will account for 1.2 per cent of both public and residential charging in North America and more than 2.6 per cent in Europe. Residential charging will be the most popular method,
  • Adopting universal technology platforms for tolling
    July 16, 2012
    Dave Marples of Technolution argues that the continuing development of tolling-specific onboard equipment is leading us up a blind alley. We should, he says, be looking to realise universal platforms with universal application. The near-future automobile contains information systems of a sophistication to rival a jet airliner of only a few years ago, yet is 'piloted' by a considerably less well-trained individual of highly variable mental and physical capacity, and operated in a hostile, unpredictable and p
  • Connecting people and mobility
    February 3, 2012
    Stéphane Petti, Business Development Manager - Automotive, at Orange Business Services' International M2M Center, says that the ITS industry can no longer afford to ignore the telecommunications industry's role in connecting people and mobility services. To telephone companies (telcos), the Machine-to-Machine (M2M) sector is nothing new. Worldwide, they have been focusing considerable attention on M2M in all its sub-segments for several years now. It is the migration of M2M from fixed to wireless connectivi
  • Trend Micro discovers 'indefensible' car security/CAN standard flaw
    August 18, 2017
    Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi