Skip to main content

Future of connected vehicles from Continental and Cisco

With vehicle manufacturers and suppliers across the globe looking to put future automotive innovative functions in their vehicle to help enhance the experience of owning and driving a vehicle, Continental and Cisco are showcasing a proof-of-concept connected vehicle at the Center for Automotive Research Management Briefing Seminars, 5-8 August. This joint proof-of-concept connected vehicle is equipped with the secure and seamless network technology to meet the growing demands for connected vehicles. Contine
August 7, 2013 Read time: 2 mins
With vehicle manufacturers and suppliers across the globe looking to put future automotive innovative functions in their vehicle to help enhance the experience of owning and driving a vehicle, 260 Continental and 1028 Cisco are showcasing a proof-of-concept connected vehicle at the Center for Automotive Research Management Briefing Seminars, 5-8 August.

This joint proof-of-concept connected vehicle is equipped with the secure and seamless network technology to meet the growing demands for connected vehicles. Continental lays the foundation for added innovative automobile functions and benefits to passengers to make connectivity to the digital world outside a moving vehicle a secure, reliable and enjoyable experience. Cisco enterprise-grade, seamless wireless network switching technology is highly secure and will connect passengers to the right network based on their location on the road and their user preference.

The Cisco and Continental proof of concept car shows how auto manufactures can provide the same amount of network security that is available at home or in the office. Cisco provides one secure software gateway that delivers Cisco’s core networking capabilities and optimizes all communication links and mobility services to and from the vehicle. Security against cyber attacks will become more important as more connected functions are brought to vehicles.

Based on this initial proof of concept solution, Continental and Cisco are also planning to work together to develop innovative solutions that leverage ubiquitous connectivity of moving vehicles.

For more information on companies in this article

Related Content

  • u-blox acquisition targets vehicle-to-vehicle communications
    December 3, 2014
    Swiss based u-blox has acquired the automotive-grade Bluetooth and wi-fi module products of Lesswire, a subsidiary of the PRETTL group. Founded in 1999, Lesswire provides robust vehicle-ready short range wireless communication modules to Tier-1 automotive electronics suppliers in Europe and Asia.
  • Future traffic management needs new thinking, new technology
    January 23, 2012
    One of the biggest problems facing US ITS professionals, says Georgia DOT's Hugh Colton, is the constrained thinking which is sometimes forced upon those making procurement decisions. It is time, he says, to look again at how we do things. In the November/December 2010 edition of this journal, Pete Goldin interviewed Joseph Sussman, chairman of the US's ITS Program Advisory Committee. Amongst other observations that Sussman made was that, technologically, ITS in the US is 10 years behind that in the world-l
  • Platform announcement: public transport is running 10 years behind schedule
    March 10, 2023
    Public transport worldwide is under pressure on a variety of fronts. Jon Salmon of Snapper Services UK explains why the industry should look more at data – and pick up some tips from the retail sector
  • US DOT issues federal guidance for improving motor vehicle cyber security
    October 25, 2016
    The US Department of Transportation's National Highway Traffic Safety Administration (NHTSA) is taking a proactive safety approach to protect vehicles from malicious cyber-attacks and unauthorised access by releasing proposed guidance for improving motor vehicle cyber security. The proposed cyber security guidance focuses on layered solutions to ensure vehicle systems are designed to take appropriate and safe actions, even when an attack is successful. The guidance recommends risk-based prioritised ident