https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • Microwave/RF
    • T&D World
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Drones/Robots


Partner content

Old-fashioned trust still biggest challenge to connected autonomous vehicles

Old-fashioned trust still biggest challenge to connected autonomous vehicles

  • Written by Graham Jarvis / TU-Automotive
  • 10th June 2022

Thales says, globally, there will be 75 million vehicles with autonomous capabilities by 2035.

However, to reassure the users of the vehicles, as well as to increase uptake of connected and autonomous vehicles, along with efficient connectivity has to come stringent cybersecurity. Trust is key to their development, including in how the data from the vehicles is processes, analyzed and used. The company also claims that a revolution is underway in the automotive market. It believes it’s an unprecedented one that involves technological, societal, and competitive change to the extent that the traditional car is becoming a truly connected object. With this connectivity the car or any other connected vehicle type is “gradually offering new functionalities such as the possibility to alert the driver to danger, detect drowsiness or connect a smartphone to the onboard computer.”

This connectivity and interconnectivity involve “the real-time exchange of data between the vehicle, the user and their environment opens up a whole new world of services”. The interconnectivity comes in the guise of the vehicle-to-everything (V2X) infrastructure, whereby the vehicles and infrastructure such as traffic lights communicate with each other as part of a system of advanced assisted-driving solutions, shared mobility, autonomous driving, and the fast-growing electric vehicle (EV) ecosystem.

For now, the focus isn’t so much on autonomous vehicles, despite the increasing connectivity of vehicles. Thales says autonomous capabilities of vehicles are at level 1 or 2, maximum. A spokesperson from Thales adds: “As this connectivity already exists, major challenges must be overcome before we see full autonomous vehicles on our roads. These include securely integrating advanced diagnostic platforms, open Internet protocols, entertainment systems, Electronic Control Units for vital functions, remote warning systems, connected surveillance systems and ensuring that strongly protected keys authenticate each and every onboard system.”

Cybersecurity: inevitable and vital

Thales views cybersecurity and data protection as being both inevitable and vital. The benefits of connected and autonomous vehicles nevertheless include the development and introduction of new services, which can include telematics, and the installation and updating of firmware-over-the-air (FOTA), or infotainment and e-Call services. The firm finds that “the customer acceptance towards in-car connectivity is very high as it’s allowing more convenience and facilitating user-experience”.

Speaking about trust, Evgeniya Ponomareva, senior business development manager, KasperskyOS team warns: “From the moment when the vehicles become connected, we face cybersecurity issues. IT systems and technologies can influence both the safety and the cybersecurity of the vehicles. We have to be very careful when we develop new systems and implement new features because we have to keep in mind that the exploitation of these technologies by cybercriminals could cause harm to drivers and passengers.”

She adds that if a hacker were to penetrate a vehicle’s IT systems, a car engine could be turned off or absolute control could take of the car remotely.

To read the complete article, visit TU-Automotive.

 

Tags: 5G Applications Companies Coverage/Interference Critical Infrastructure Cybersecurity Drones/Robots Enterprise Federal Government/Military Internet of Things Internet of Things Interoperability IoT/Smart X Long Term Evolution (LTE) News Policy Public Safety Security Software State & Local Government Subscriber Devices System Design System Operation Tracking, Monitoring & Control Wireless Networks Partner content

Most Recent


  • Sesame Solar leverages mobile solar, hydrogen to power efforts beyond the grid
    Michigan-based startup Sesame Solar recently launched the latest version of its easily deployable nanogrids that promise to deliver electric power indefinitely—without the need for diesel-powered generation—via complementary solar and hydrogen-fuel-cell technologies, according to company co-founder and CEO Lauren Flanagan. “What we’re announcing is the world’s first 100% renewable, mobile emergency-response nanogrid,” Flanagan said during an […]
  • Old-fashioned trust still biggest challenge to connected autonomous vehicles
    Newscan: On front lines, communications breakdowns prove costly for Ukraine
    Web Roundup Items from other news organizations On front lines, communications breakdowns prove costly for Ukraine Recording between dispatcher, firefighters gives new insight into human-smuggling tragedy Updated digital forensics database speeds criminal investigations Frontier Communications facing questions after rural Arizona 911 outage 911 center software can interpret any language used in text message CISA: Switch […]
  • China-backed APT pwns building-automation systems with ProxyLogon
    A previously unknown Chinese-speaking advanced persistent threat (APT) is exploiting the ProxyLogon Microsoft Exchange vulnerability to deploy the ShadowPad malware, researchers said — with the end goal of taking over building-automation systems (BAS) and moving deeper into networks. That’s according to researchers at Kaspersky ICS CERT, who said that the infections affected industrial control systems […]
  • Samsung fills its 2G hole in new challenge to Ericsson and Nokia
    “If you can make gigabit speeds through software on vRAN, how difficult can 2G be?” said Woojune Kim, Samsung’s global head of sales, when confronted at this year’s Mobile World Congress with the 2G hole in its product portfolio. Three months since then, “not that difficult” seems to be the answer, although the virtualized 2G […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Nokia ties up with Innventure on 'groundbreaking' cooling tech
  • Hyundai launches robotaxi trial with its own autonomous-vehicle (AV) tech
  • Stellantis claims on-the-go electric-vehicle charging a reality
  • Old-fashioned trust still biggest challenge to connected autonomous vehicles
    Newscan: Axon halts plans for Taser drone as nine on ethics board resign

Commentary


LTE and liability: Why the fire service must move forward with digital incident command

  • 2
6th May 2022

Partnership and collaboration must be the foundation for emergency communications

18th April 2022

FirstNet success means no hypothetical ‘shots’ need to be fired, Swenson says

22nd February 2022
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Sesame Solar leverages mobile solar, hydrogen to power efforts beyond the grid dlvr.it/ST8m3K

1st July 2022
UrgentComm

Newscan: On front lines, communications breakdowns prove costly for Ukraine dlvr.it/ST7fnC

30th June 2022
UrgentComm

China-backed APT pwns building-automation systems with ProxyLogon dlvr.it/ST6q7m

30th June 2022
UrgentComm

Samsung fills its 2G hole in new challenge to Ericsson and Nokia dlvr.it/ST6hBK

30th June 2022
UrgentComm

Militarized drone swarms coming dlvr.it/ST6dNz

30th June 2022
UrgentComm

Take American City & County’s budgeting survey dlvr.it/ST6Yxb

30th June 2022
UrgentComm

Final cases made about Airwave, ESN, before CMA issues provisional decision on Motorola Solutions dlvr.it/ST4Q6X

29th June 2022
UrgentComm

Polaris Wireless: Manlio Allegra talks 911 Z-axis tech, future IoT opportunities dlvr.it/ST1384

28th June 2022

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • Microwave/RF
  • T&D World
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X