Skip to main content

Developing Software-Based Security Apps for Vehicles

The concept of an Internet of Things (IoT) may seem somewhat obscure to the uninformed person, but the need to secure personal property while traveling in an automobile is apparent to most people. Meaningful context removes confusion.

That's why IoT market development would clearly benefit from better articulation of use case scenarios, to gain market momentum and increase the potential for further adoption by all stakeholders.

While traditional safety telematics services offer stolen vehicle tracking and diagnostics aimed at the physical protection of vehicles, drivers and their passengers are slowly becoming more aware of the benefits enabled by these mobile communication technologies.

Moreover, the potential threat of cyber-attacks and their impact on the physical integrity of persons -- especially with vehicle-to-vehicle communication and autonomous vehicles -- means that market demand for security solutions will surely grow over time.

The current situation is prompting car OEMs and Tier1 suppliers to source security technology, with more than 20 million connected cars forecast to ship with software-based security by 2020, according to the latest market study by ABI Research.

"So far connected car security has been mainly based on hardware protection and separation with infotainment and vehicle-centric safety systems shielded from each other," said Dominique Bonte, VP and practice director at ABI Research.

However, ABI believes that the shift towards cost-effective software-based vehicle security -- based on virtualization, containerization and sandboxing -- is well under way.

As an example, Cisco is partnering with Continental and Visteon to bring enterprise IT connectivity based security technologies -- such as Private Networks (VPN), IPsec, encryption and authentication (PKI) -- to an automotive industry lacking in-house expertise.

Besides, security is not just about technology. Adopting end-to-end, balanced, and cost-effective risk management practices -- including security-based design procedures and frequency/severity analysis -- are also required to reach the desired outcome.

Furthermore, audit and monitoring policies, plus detection and assessment of vulnerabilities through self-induced cyber-attacks, will be required to prevent malicious intrusions.

Security is also closely linked to the secondary effect of compromised privacy, and that's a growing concern shared by governments which have already reacted to the public outcry with new legislation initiatives.

Truly, consumer fears are exacerbated by the sensitive nature of mobile geo-location data and the potential for misuse. If left unchecked, these lingering concerns could be a major barrier for connected car and autonomous vehicle adoption.

Popular posts from this blog

Digital Solutions for Industrial & Manufacturing Firms

Executive leaders of fast-moving consumer goods (FMCG) are seeking guidance on how to apply new business technology in their manufacturing operations. CIOs and CTOs are tasked with gaining insight into the best solutions for digital transformation. ABI Research evaluated the impact politics, regulation, the economy, supply chain, ESG, and technology are having on FMCG, pharma, producers of steel, chemicals, pulp and paper -- as well as the mining and oil & gas sectors. Digital Transformation Market Development "Our assessment found that the FMCG sector is under pressure from all sides," says Michael Larner, industrial & manufacturing research director at ABI Research . Securing raw materials is challenging considering lockdowns in China and limited grain supplies from Ukraine. Supply shocks are raising input costs, and operating costs are rising with higher energy costs coupled with the pressure to pay higher wages and work sustainably. "We all hoped that with th

5G Fixed Wireless Access Revenue to Reach $24B

Available Internet access at an affordable cost is essential for everyone to participate in the Global Networked Economy. The deployment of fifth-generation (5G) wireless communications infrastructure is enabling the introduction of lower-cost broadband services in some markets. Fixed Wireless Access (FWA) allows mobile network operators (MNO) to deliver high-speed Internet connections in areas that have either insufficient or no prior wireline broadband access services. It's also used in urban, suburban, and rural areas where fiber optic communication is considered too expensive to install and maintain. With this new technology, MNOs have the potential to provide broadband capability at similar levels to fiber optic networks. Fixed Wireless Access Market Development Therefore, FWA can be used to supplement existing wired broadband Internet service offerings, provide additional broadband capacity, or act as a backup service for home or business applications. Although FWA is well es

Why the C-Suite Craves Digital App Acceleration

Business model evolution and growth are still top priorities for forward-thinking leadership. In fact, 70 percent of surveyed boards of directors will accelerate digital business initiatives, steering the organization to digitally-enabled growth. Chief Financial Officers (CFOs) also plan to protect their digital transformation investments as they cut costs elsewhere in their operations, according to the latest market study by Gartner. Among technology priorities, CFOs have particularly prioritized back-office business automation technology as a key to driving down costs in the face of ongoing inflation and supply chain challenges. Digital Applications Market Development A survey of CFOs found that digital business app acceleration was the top spending priority over the next 12 months, with 98 percent of respondents saying they will protect digital investments. Meanwhile, 66 percent of surveyed CFOs said they plan to increase their digital app investments. A separate survey of CEOs high