Manage Learn to apply best practices and optimize your operations.

A roadmap for connected car security

The age of connected vehicles is bringing exciting new innovations and transportation options. Yet, as more connected vehicles take the road each day, the need for strong security protocols continues to increase. Security protections are essential to maximize the benefits of connected cars, and keep drivers and passengers safe.

Like a roadmap, here’s where we’re going and four ways that we’re going to get there.

  1. Emphasize the societal benefits of connected cars. Connected vehicles provide tremendous value to consumers and our communities. Connected vehicles can help prevent crashes, reduce traffic congestion and lower carbon emissions. And beyond these benefits, connected vehicles offer convenience, maintenance insights and backseat entertainment options.
  2. Understand the four types of cybersecurity risks and threats. To reap the benefits of connected vehicles, we need to understand and prepare for the major security risks and threats. The National Highway Traffic Safety Administration has identified four areas of risk associated with cyberthreats related to data control: privacy and security, fraudulent commercial transactions, non-safety operational interference, and safety-related operational interference. The dangers range from access to the owner’s, driver’s or passenger’s personal and financial information to outright loss of physical control of the connected vehicle. But by understanding these cyberthreats, we can put effective security measures in place to address them.
  3. Implement an end-to end security approach. Cars have more connection points than ever before — from communicating with the cloud, connecting to servers hosted by the manufacturer to streaming entertainment for passengers. More connection points means more opportunity to exploit security vulnerabilities. A layered, end-to-end security approach can minimize these risks. This requires highly secure communication outside of the vehicle, as well as within the internal vehicle platform. Layered, end-to-end security inside the vehicle spans between car makers and their suppliers — both software and hardware — along all the critical data and communication paths that connect the vehicle to upstream applications and services in the cloud.
  4. Foster an ecosystem of collaborators. Telecom companies and car manufacturers need to collaborate now more than ever. As connected car functionality becomes more network connected, and as software updates and downloads become more dependent on network connectivity, the interdependence of these two platforms will only increase. As the relationship grows, so should the collaboration between telecom companies and car manufacturers. This is necessary to deliver greater platform-to-platform security, improved end-to-end security and, most importantly, increased safety for the vehicle’s occupants and their surrounding environment.

By bringing together telecom companies and car manufacturers to collaborate around connected vehicle security, we’ll ultimately realize increased road safety, improved reliability of connected vehicles, enhanced customer experience and more. And we’ll all get to our final destination with a safer, more secure ride.

To learn more about current initiatives in cybersecurity and how telecommunications companies and OEMs can work together, download the Alliance for Telecommunications Industry Solutions’ white paper.

All IoT Agenda network contributors are responsible for the content and accuracy of their posts. Opinions are of the writers and do not necessarily convey the thoughts of IoT Agenda.