Skip to main content

European manufacturers want functioning car connectivity by 2015

Twelve European carmakers have agreed to step up cooperation to bring car-to-car communication to European roads through the use of a common deployment strategy. The companies, which cooperate in the Car 2 Car Communication Consortium, have said they want to have cooperative systems in place from 2015, taking account of EU technical specifications for message formats, security requirements and other requirements. According to the car manufacturers, “It is of great importance that all equipped vehicles are s
November 7, 2012 Read time: 2 mins
Twelve European carmakers have agreed to step up cooperation to bring car-to-car communication to European roads through the use of a common deployment strategy.

The companies, which cooperate in the Car 2 Car Communication Consortium, have said they want to have cooperative systems in place from 2015, taking account of EU technical specifications for message formats, security requirements and other requirements.

According to the car manufacturers, “It is of great importance that all equipped vehicles are speaking one language.”  They added that in-vehicle systems developed by different manufacturers need to be interoperable and should use common European-wide communication standards.

The EU Commission is pushing for a broad range of IT initiatives to battle road congestion, reduce fuel consumption, lower harmful emissions and improve road safety.

Neelie Kroes, who is in charge of the EU’s digital agenda, said in a recent speech that IT will play a major role in creating smarter, more intelligent, integrated and cleaner mobility.  “A big part of the transformation in the coming decades will come from new digital technology,” she said.

The CAR 2 CAR Communication Consortium is funded by European carmakers and supported by automotive suppliers and research institutes. The group includes carmakers such as 2069 Daimler, 994 Volkswagen, 1731 BMW and 609 Volvo.

For more information on companies in this article

Related Content

  • New Volvo challenges connected car thinking
    September 8, 2014
    In America, the introduction of the Wi-Fi Innovation Act has sees the debate over the future of the 5.9GHz band and the potential to open it up to non-licenced users, enter a new phase. Amid the claim and counter-claim of the opposing camps, the launch of Volvo’s new XC90 is easily overlooked and while a connection between the two is not immediately apparent, the new all-wheel drive SUV could be a game-changer.
  • After two decades of research, ITS is getting into its stride
    June 4, 2015
    Colin Sowman gets the global view on how ITS has shaped the way we travel today and what will shape the way we travel tomorrow. Over the past two decades the scope and spread of intelligent transport systems has grown and diversified to encompass all modes of travel while at the same time integrating and consolidating. Two decades ago the idea of detecting cyclists or pedestrians may have been considered impossible and why would you want to do that anyway? Today cyclists can account for a significant propor
  • ANPR - cost-efficient traffic management, enforcement and more
    January 23, 2012
    Geoff Collins of Vysionics Intelligent Traffic Solutions talks about the near-term prospects of ANPR. The continued absence of a champion for its cause is preventing digital enforcement technology from delivering the true levels of cost-effectiveness of which it is capable, according to Geoff Collins, sales and marketing director of ANPR specialist Vysionics Intelligent Traffic Solutions.
  • Need for secure approach to connected vehicle technology
    January 7, 2013
    Accidental or malicious issue of false messages to connected vehicles could result in dire consequences, so secure systems of authentication and certification are likely to be necessary, write Paul Avery and Sandra Dykes. Connectivity among vehicles in urban traffic systems will provide opportunity for beneficial impacts such as congestion reduction and greater safety. However, it also creates security risks with the potential for targeted disruption. Security algorithms, protocols and procedures must take