Skip to main content

Future of connected vehicles from Continental and Cisco

With vehicle manufacturers and suppliers across the globe looking to put future automotive innovative functions in their vehicle to help enhance the experience of owning and driving a vehicle, Continental and Cisco are showcasing a proof-of-concept connected vehicle at the Center for Automotive Research Management Briefing Seminars, 5-8 August. This joint proof-of-concept connected vehicle is equipped with the secure and seamless network technology to meet the growing demands for connected vehicles. Contine
August 7, 2013 Read time: 2 mins
With vehicle manufacturers and suppliers across the globe looking to put future automotive innovative functions in their vehicle to help enhance the experience of owning and driving a vehicle, 260 Continental and 1028 Cisco are showcasing a proof-of-concept connected vehicle at the Center for Automotive Research Management Briefing Seminars, 5-8 August.

This joint proof-of-concept connected vehicle is equipped with the secure and seamless network technology to meet the growing demands for connected vehicles. Continental lays the foundation for added innovative automobile functions and benefits to passengers to make connectivity to the digital world outside a moving vehicle a secure, reliable and enjoyable experience. Cisco enterprise-grade, seamless wireless network switching technology is highly secure and will connect passengers to the right network based on their location on the road and their user preference.

The Cisco and Continental proof of concept car shows how auto manufactures can provide the same amount of network security that is available at home or in the office. Cisco provides one secure software gateway that delivers Cisco’s core networking capabilities and optimizes all communication links and mobility services to and from the vehicle. Security against cyber attacks will become more important as more connected functions are brought to vehicles.

Based on this initial proof of concept solution, Continental and Cisco are also planning to work together to develop innovative solutions that leverage ubiquitous connectivity of moving vehicles.

For more information on companies in this article

Related Content

  • Qatar invests $70 billion to pave the way to world beating transportation
    July 26, 2013
    Eng. Zeina Nazer looks at what Qatar’s recently-announced investment in transport infrastructure will mean on the ground. Qatar is experiencing a rapid economic and industrial growth. This growth is characterised by a rapid population increase and by the urgent need towards the development of both infrastructure projects and major transport projects. In order to handle this rate of development within Qatar, Public Works Authority (Ashghal) is developing a fully-integrated multimodal transportation system in
  • The ABC of CARTES 2014: Apple, Bitcoin and cloud security are all on the conference agenda
    October 28, 2014
    CARTES 2014, the global event for payment, identification and mobility, is fast approaching and the world’s experts in the sector are about to head to Paris for its biggest and most important annual gathering. The 2013 event welcomed more than 20,000 visitors, some 1,670 of whom attended the opening conference - the World Card Summit - while also visiting the 450 exhibitors at the venue.
  • With C-ITS we can get ourselves connected
    June 27, 2025
    Workzones need to be safer for drivers and workers – and the technology exists to harmonise safety with mobility needs, says Swarco’s Daniel Lenczowski
  • Need for secure approach to connected vehicle technology
    January 7, 2013
    Accidental or malicious issue of false messages to connected vehicles could result in dire consequences, so secure systems of authentication and certification are likely to be necessary, write Paul Avery and Sandra Dykes. Connectivity among vehicles in urban traffic systems will provide opportunity for beneficial impacts such as congestion reduction and greater safety. However, it also creates security risks with the potential for targeted disruption. Security algorithms, protocols and procedures must take