Skip to main content

Developing Software-Based Security Apps for Vehicles

The concept of an Internet of Things (IoT) may seem somewhat obscure to the uninformed person, but the need to secure personal property while traveling in an automobile is apparent to most people. Meaningful context removes confusion.

That's why IoT market development would clearly benefit from better articulation of use case scenarios, to gain market momentum and increase the potential for further adoption by all stakeholders.

While traditional safety telematics services offer stolen vehicle tracking and diagnostics aimed at the physical protection of vehicles, drivers and their passengers are slowly becoming more aware of the benefits enabled by these mobile communication technologies.

Moreover, the potential threat of cyber-attacks and their impact on the physical integrity of persons -- especially with vehicle-to-vehicle communication and autonomous vehicles -- means that market demand for security solutions will surely grow over time.

The current situation is prompting car OEMs and Tier1 suppliers to source security technology, with more than 20 million connected cars forecast to ship with software-based security by 2020, according to the latest market study by ABI Research.

"So far connected car security has been mainly based on hardware protection and separation with infotainment and vehicle-centric safety systems shielded from each other," said Dominique Bonte, VP and practice director at ABI Research.

However, ABI believes that the shift towards cost-effective software-based vehicle security -- based on virtualization, containerization and sandboxing -- is well under way.

As an example, Cisco is partnering with Continental and Visteon to bring enterprise IT connectivity based security technologies -- such as Private Networks (VPN), IPsec, encryption and authentication (PKI) -- to an automotive industry lacking in-house expertise.

Besides, security is not just about technology. Adopting end-to-end, balanced, and cost-effective risk management practices -- including security-based design procedures and frequency/severity analysis -- are also required to reach the desired outcome.

Furthermore, audit and monitoring policies, plus detection and assessment of vulnerabilities through self-induced cyber-attacks, will be required to prevent malicious intrusions.

Security is also closely linked to the secondary effect of compromised privacy, and that's a growing concern shared by governments which have already reacted to the public outcry with new legislation initiatives.

Truly, consumer fears are exacerbated by the sensitive nature of mobile geo-location data and the potential for misuse. If left unchecked, these lingering concerns could be a major barrier for connected car and autonomous vehicle adoption.

Popular posts from this blog

IoT Device Management Demand Gains Momentum

More forward-thinking CIOs and CTOs are focused on the adoption of the Internet of Things (IoT). Management challenges are top of mind for those who have already deployed a large number of sensors and associated network edge devices. Device management services are evolving in response to a greater breadth of new device technologies such as edge intelligence and related connectivity solutions, as well as the customer scalability and security of IoT deployments. But forward-looking suppliers are also preparing for a world where 41.3 percent of the connected devices will be using some form of Low Power Wide Area (LPWA) technologies by 2026. IoT Device Management Market Development Since IoT customers increasingly need to manage a larger fleet of connected devices, ABI Research now forecasts that IoT device management services will exceed $36.8 billion in revenues by 2026. Standardization is beginning to play a bigger role in device management services, as more connected devices use LPWA t

Anywhere, Anytime Workplace Demand for SASE

The ongoing adoption of flexible working models within the enterprise market has significant implications for typical IT organizations that must now support knowledge workers and front-line employees that operate outside the corporate network perimeter. The global COVID-19 pandemic created IT networking and security challenges. The expansion of the distributed workforce, an increasing reliance on cloud computing infrastructure, and the requirement to securely connect online employees -- wherever they choose to work, at any given moment in time. Legacy IT solutions that have rigid network underlays and a requirement for on-premises infrastructure cannot adequately deal with these trends. This 'Anywhere, Anytime Workplace' led to demand for new Secure Access Service Edge (SASE) solutions, with networking and security delivered as-a-service. Anywhere, Anytime Workplace Market Development   Although converging networking and security capabilities offer enterprises a promising solut

Cloud Edge Computing Demand Continues to Grow

Public cloud computing solutions are moving closer to the edge of networks where CIOs and CTOs are hosting new apps. The edge journey is well underway for forward-looking organizations as they seek to connect with customers, improve operational efficiency, and adopt digital business technologies to drive innovation. The latest worldwide market study by International Data Corporation (IDC) found that three-quarters of organizations plan to increase their edge computing spending over the next two years with an average increase of 37 percent. A combination of factors is driving this increased spending at the edge. Cloud Edge Computing Market Development The performance requirements of expanding workloads and new use cases that leverage artificial intelligence (AI) and machine learning (ML) demand greater compute capacity at the edge. In addition, the amount of data being stored in edge locations are rapidly expanding, and organizations plan to keep this data longer. As a result, the numbe