Skip to main content

Developing Software-Based Security Apps for Vehicles

The concept of an Internet of Things (IoT) may seem somewhat obscure to the uninformed person, but the need to secure personal property while traveling in an automobile is apparent to most people. Meaningful context removes confusion.

That's why IoT market development would clearly benefit from better articulation of use case scenarios, to gain market momentum and increase the potential for further adoption by all stakeholders.

While traditional safety telematics services offer stolen vehicle tracking and diagnostics aimed at the physical protection of vehicles, drivers and their passengers are slowly becoming more aware of the benefits enabled by these mobile communication technologies.

Moreover, the potential threat of cyber-attacks and their impact on the physical integrity of persons -- especially with vehicle-to-vehicle communication and autonomous vehicles -- means that market demand for security solutions will surely grow over time.

The current situation is prompting car OEMs and Tier1 suppliers to source security technology, with more than 20 million connected cars forecast to ship with software-based security by 2020, according to the latest market study by ABI Research.

"So far connected car security has been mainly based on hardware protection and separation with infotainment and vehicle-centric safety systems shielded from each other," said Dominique Bonte, VP and practice director at ABI Research.

However, ABI believes that the shift towards cost-effective software-based vehicle security -- based on virtualization, containerization and sandboxing -- is well under way.

As an example, Cisco is partnering with Continental and Visteon to bring enterprise IT connectivity based security technologies -- such as Private Networks (VPN), IPsec, encryption and authentication (PKI) -- to an automotive industry lacking in-house expertise.

Besides, security is not just about technology. Adopting end-to-end, balanced, and cost-effective risk management practices -- including security-based design procedures and frequency/severity analysis -- are also required to reach the desired outcome.

Furthermore, audit and monitoring policies, plus detection and assessment of vulnerabilities through self-induced cyber-attacks, will be required to prevent malicious intrusions.

Security is also closely linked to the secondary effect of compromised privacy, and that's a growing concern shared by governments which have already reacted to the public outcry with new legislation initiatives.

Truly, consumer fears are exacerbated by the sensitive nature of mobile geo-location data and the potential for misuse. If left unchecked, these lingering concerns could be a major barrier for connected car and autonomous vehicle adoption.

Popular posts from this blog

Mobility-as-a-Service Creates Disruptive Travel Options

Building on significant advances in big data, analytics, and the Internet of Things (IoT), more innovative transit service offerings aim to increase public transport ridership and reduce emissions or congestion within metropolitan areas. By providing these services through smartphone apps, the transit services also significantly increase user convenience, providing information on different human mobility offerings -- including public transport, ridesharing, and autonomous vehicles. Mobility-as-a-Service Market Development According to the latest market study by Juniper Research, Mobility-as-a-Service (MaaS) subscribers will generate $53 billion in revenue for MaaS platform providers by 2027 -- that's rising from $5.3 billion in 2021. Let's start with a basic definition. MaaS is the provision of multi-modal end-to-end travel services through single platforms, by which users can determine an optimal route and price. The study identified a monthly subscription model as key to incr

Robocall Mitigation Solutions to Halt Criminal Threats

If you answer the phone and hear a recorded message instead of a live person, it's likely a robocall. A robocall is a phone call that uses a computerized autodialer to deliver a pre-recorded message. In 2020, the U.S. Federal Trade Commission (FTC) received 2.8 million consumer complaints about robocalls. Offering solutions to robocalling and associated fraudulent business practices, computerized mitigation platforms are an integral part of the solution. Platforms that are focused on actionable systems to disrupt unsolicited and potentially criminal phone calls help telecom service providers and industry regulators. Issues of whether one-size-fits-all developments are sufficient to be effective across the spectrum need to be addressed, and whether a single telecom network operator working unilaterally with a third-party platform could compromise desired or mandatory industry-wide standards. Robocall Mitigation Market Development According to the latest worldwide market study by Jun

Secure Digital Workspace Apps Enable the Future Enterprise

In early 2020, as the world responded to the COVID-19 pandemic disruption, many organizations were forced to rapidly transform their communications networks and IT infrastructure to support an unprecedented shift to remote work. Before the pandemic, approximately 38 percent of employees were remote full-time or had a flexible work arrangement where they split time between home and office locations. During the pandemic, the percentage of remote workers that CIOs had to support reached almost 72 percent. Future Enterprise Technology Market Development Enterprise leaders have been forced to adapt to a new state, shifting from traditional office-based operations to distributed workforce environments that must still provide the same level of connectivity, security, and efficiency across the organization. According to the latest worldwide market study by International Data Corporation (IDC), addressing connectivity across geographies and transforming networks to become more virtual and agile