https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2022 Winter Showcase
    • IWCE 2023 Pre-event Guide
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2023 Pre-event Guide
    • IWCE 2022 Winter Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Drones/Robots


Partner content

Old-fashioned trust still biggest challenge to connected autonomous vehicles

Old-fashioned trust still biggest challenge to connected autonomous vehicles

  • Written by Graham Jarvis / TU-Automotive
  • 10th June 2022

Thales says, globally, there will be 75 million vehicles with autonomous capabilities by 2035.

However, to reassure the users of the vehicles, as well as to increase uptake of connected and autonomous vehicles, along with efficient connectivity has to come stringent cybersecurity. Trust is key to their development, including in how the data from the vehicles is processes, analyzed and used. The company also claims that a revolution is underway in the automotive market. It believes it’s an unprecedented one that involves technological, societal, and competitive change to the extent that the traditional car is becoming a truly connected object. With this connectivity the car or any other connected vehicle type is “gradually offering new functionalities such as the possibility to alert the driver to danger, detect drowsiness or connect a smartphone to the onboard computer.”

This connectivity and interconnectivity involve “the real-time exchange of data between the vehicle, the user and their environment opens up a whole new world of services”. The interconnectivity comes in the guise of the vehicle-to-everything (V2X) infrastructure, whereby the vehicles and infrastructure such as traffic lights communicate with each other as part of a system of advanced assisted-driving solutions, shared mobility, autonomous driving, and the fast-growing electric vehicle (EV) ecosystem.

For now, the focus isn’t so much on autonomous vehicles, despite the increasing connectivity of vehicles. Thales says autonomous capabilities of vehicles are at level 1 or 2, maximum. A spokesperson from Thales adds: “As this connectivity already exists, major challenges must be overcome before we see full autonomous vehicles on our roads. These include securely integrating advanced diagnostic platforms, open Internet protocols, entertainment systems, Electronic Control Units for vital functions, remote warning systems, connected surveillance systems and ensuring that strongly protected keys authenticate each and every onboard system.”

Cybersecurity: inevitable and vital

Thales views cybersecurity and data protection as being both inevitable and vital. The benefits of connected and autonomous vehicles nevertheless include the development and introduction of new services, which can include telematics, and the installation and updating of firmware-over-the-air (FOTA), or infotainment and e-Call services. The firm finds that “the customer acceptance towards in-car connectivity is very high as it’s allowing more convenience and facilitating user-experience”.

Speaking about trust, Evgeniya Ponomareva, senior business development manager, KasperskyOS team warns: “From the moment when the vehicles become connected, we face cybersecurity issues. IT systems and technologies can influence both the safety and the cybersecurity of the vehicles. We have to be very careful when we develop new systems and implement new features because we have to keep in mind that the exploitation of these technologies by cybercriminals could cause harm to drivers and passengers.”

She adds that if a hacker were to penetrate a vehicle’s IT systems, a car engine could be turned off or absolute control could take of the car remotely.

To read the complete article, visit TU-Automotive.

 

Tags: Tracking, Monitoring & Control 5G Applications Companies Coverage/Interference Critical Infrastructure Cybersecurity Drones/Robots Enterprise Federal Government/Military Internet of Things Internet of Things Interoperability IoT/Smart X Long Term Evolution (LTE) News Policy Public Safety Security Software State & Local Government Subscriber Devices System Design System Operation Wireless Networks Partner content

Most Recent


  • CMA plans to release Airwave price-control order by end of July, impacting Motorola Solutions
    An order that would set price controls on the Airwave TETRA network that would cost Motorola Solutions more than $1 billion is expected to take effect within the next two month, although Motorola Solutions has indicated that its appeals likely will delay the effective date until next year. Last month, the UK Competition and Markets […]
  • Why antivirus cannot protect your car
    In July last year, BMW announced its intention to make heated seats an $18-per-month subscription service. A week later, a group of hackers called Easy Bimmer Coding claimed they were prepared to help any BMW owner to unlock the subscription-only feature. The majority of today’s cyber-threats are more like the one described above, relatively low-profile […]
  • ChatGPT hallucinations open developers to supply-chain malware attacks
    Attackers can exploit ChatGPT’s penchant for returning false information to spread malicious code packages, researchers have found. This poses a significant risk for the software supply chain, as it can allow malicious code and trojans to slide into legitimate applications and code repositories like npm, PyPI, GitHub and others. By leveraging so-called “AI package hallucinations,” threat actors can create ChatGPT-recommended, […]
  • What Amazon’s privacy breaches say about smart-device cybersecurity
    Amazon was recently fined more than $30 million for customer privacy breaches, demonstrating the rising need for cybersecurity and data protection at a time where smart devices are becoming increasingly common. While there is some legislation in place accommodating smart devices, the sheer volume of devices coming online is still proving an industry bottleneck, and a […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Nokia ties up with Innventure on 'groundbreaking' cooling tech
  • Hyundai launches robotaxi trial with its own autonomous-vehicle (AV) tech
  • Stellantis claims on-the-go electric-vehicle charging a reality
  • Old-fashioned trust still biggest challenge to connected autonomous vehicles
    Newscan: Axon halts plans for Taser drone as nine on ethics board resign

Commentary


Updated: How ‘sidelink’ peer-to-peer communications can enhance public-safety operations

  • 1
27th February 2023

NG911 needed to secure our communities and nation

24th February 2023

How 5G is making cities safer, smarter, and more efficient

26th January 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.