Head over to our on-demand library to view sessions from VB Transform 2023. Register Here

Often dubbed a “data center on wheels,” the connected car is one of the fastest-growing markets in the ecosystem that makes up the Internet of Things (IoT). The convergence of IoT and in-vehicle technologies, like remote diagnostics, on-board GPS, collision avoidance systems, and 4G LTE Wi-Fi hotspots, has paved the road for new and exciting opportunities in this industry. In fact, the connected car market is expected to reach $155 billion by 2022, while 75 percent of the estimated 92 million cars shipped globally in 2020 will be built with internet connectivity.

As the market grows, the biggest opportunity for profit comes from the ongoing services that can be offered and the ongoing revenue that subscriptions to these services can create. Although this is where the value lies, many consumers who purchase connected cars have been hesitant to “turn on” their connected services. Recent statistics tell the story. A 2016 Spireon survey showed that consumers are interested in connected cars (especially those with safety features), but 54 percent said they have not actually used connected car features. Similarly, Kelly Blue Book found that 42 percent of consumers support cars becoming more connected, while 62 percent said they fear that cars in the future will be easily hacked.

Are connected cars secure?

While there is evidence that the adoption rate for connected services is growing (willingness to pay for connected services went from 21 percent in 2014 to 32 percent in 2015), many consumers still have lingering concerns over the security of these vehicles. It doesn’t help that connected cars have received some negative press. In 2015, Chrysler recalled 1.4 million vehicles after hackers demonstrated to WIRED that they could remotely hijack (and crash) a Jeep. Then, in March 2016, the FBI, the Department of Transportation (DOT), and the National Highway Traffic Safety Administration (NHTSA) issued a public service announcement warning consumers about potential cybersecurity threats to connected cars.

Yet consumers may not realize that security is not solely a connected car issue — it is an inherent concern with IoT, given the copious amount of data collected and shared between devices. When it comes to IoT, people fear not knowing what devices are doing and what they are actually capable of doing. The reality is that today’s networks were not built for the tsunami of devices coming online, including the millions of connected cars. As networks evolve to better meet the needs of IoT devices and connected cars, automakers must take extra measures to ensure appropriate levels of connectivity at each step of the vehicle’s life cycle.


VB Transform 2023 On-Demand

Did you miss a session from VB Transform 2023? Register to access the on-demand library for all of our featured sessions.


Register Now

Securing the connected car at each step of the vehicle’s life cycle

Security must be a top priority — from designing the vehicle to the moment the driver takes the wheel and beyond – if automakers are to improve adoption rates and drive profits. The key to securing the connected car’s potential “attack surface” is enabling the right levels of connectivity at the right times. In addition to knowing when connectivity should be on or off, it’s also critical to know what a vehicle should be allowed to do with that connectivity at different stages throughout its life cycle. Automating this knowledge and ensuring proper connectivity to match each vehicle state is crucial to end-to-end security. It also eliminates the need to manually track and monitor connectivity — a complex task when you’re shipping millions of vehicles around the world. Let’s take a look at the role of connectivity in securing each step of the Connected Car’s life cycle.

  • Vehicle design: Auto manufacturers must ensure that the right technologies — such as in-vehicle routing, security, IoT connectivity, and more — are designed into the vehicle from day one. OEMs must consider the types of services they want to enable throughout the life of the car, choose the right connectivity partner and management platform, and design features into the vehicle accordingly. If these features aren’t designed and integrated into the vehicle correctly, there is a greater risk of security issues later on down the road. For example, some manufacturers are designing connected cars with in-vehicle video capture capabilities and even the ability to measure biometrics, with the intention of using the collected data to improve and personalize the customer experience (if the user opts in). If a competitor or a malicious user hacks into these data streams, a great deal of information about the manufacturer’s fleet and customers is exposed.
  • Manufacturing: Connectivity and security need to be engrained in the manufacturing process itself. Auto manufacturers must have converged networking and IoT solutions to automate manufacturing operations, mitigate risk, and maximize uptime on the factory floor. Connectivity of mission-critical machines can enable zero downtime (which is vital when every minute of downtime on the factory floor costs $20,000) and therefore, enable more efficient manufacturing of connected cars. Further, OEMs can tap into data they collect to improve quality and produce a more reliable vehicle. There is also a safety aspect here, as manufacturers can use smart, real-time sensing and analytics to address safety and security concerns on the plant floor. They can even use IoT and wearables to monitor employees’ health and track their locations. Of course, access to this information must be limited to authorized personnel.
  • Testing: The ability to verify that connected services are working before the vehicle leaves the factory (and then turn those connected services off during shipping) is necessary in order to reduce the number of defective vehicles delivered. During this stage, manufacturers must test each individual service before shipment, paying extra attention to services that deliver real-time updates to the driver, such as 3D maps, traffic, and weather applications. If any of these is hacked or sabotaged during the car’s life cycle, it can jeopardize the driver’s safety and even lead to an accident.
  • Shipping: Once testing is complete and the vehicle is ready for shipment, the ability to automate connectivity is essential. While vehicles are in shipping containers, manufacturers must be able to automatically disable connected services, while maintaining the ability to track vehicles during their journey. This prevents the abuse of connected services while vehicles are en route to the dealership. Remember: If a hacker can sabotage the vehicle during shipment from the OEM to the dealer, they could potentially plant a back door and obtain access to sensitive data during the car’s life. For example, the SIM card in the car’s telematics system is especially vulnerable during shipment, and, if tampered with, can open up a whole list of security issues. While some automakers physically protect the SIM card, it is more efficient to protect it via automated rules. The OEM can apply a rule that when the vehicle is in transport, communications are completely shut off — thereby preventing illicit use of the car’s connection and deterring on-board hackers.
  • Demoing: Once the vehicle arrives at the dealership, it is time to turn connectivity back on. Again, an automated system allows OEMs to safely resume connection so that salespeople can demonstrate all the services and devices to potential buyers. During this time, security measures are needed to prevent theft, hijacking, or illicit remote control of vehicles. For example, the VIN is used to register the vehicle to a new owner’s mobile app. If security is weak, anyone who could have recorded that VIN while visiting the showroom could later use it to control or possibly even steal the vehicle. Proper certificate-based security architecture can help prevent this situation.
  • Post-purchase maintenance and aftermarket: Connected cars allow for proactive, predictive maintenance based on real-time data. Over-the-air (OTA) software updates help secure this information and provide patches and bug fixes to prevent data breaches. Moreover, the connected car is opening up new opportunities for aftermarket sales as companies move to leverage the vehicle’s connectivity to deliver their own connected services. Undoubtedly, the growth of aftermarket connected services is stirring up additional security concerns, so creating the right security standards and partnering with aftermarket solution providers and third-party security experts will be key in keeping vehicles safe.

Enhancing the driver’s experience, and ongoing monetization

The connected car’s devices and services can provide value long after the customer has driven off the dealership lot. Once the vehicle is sold, manufacturers must be able to automate the transfer of billing for connectivity to the owner, while maintaining the ability to provide free trials of certain services for defined periods of time (which are billed to either the manufacturer or third-party content/service providers). This requires a platform that can enable split billing, while also allowing the OEM to consistently push new services to connected cars throughout the life of the vehicle to enhance the driver’s experiences and create new, ongoing revenue streams. These new services must undergo the same security considerations as those that were designed for the vehicle from the start.

As the opportunities for new subscription-based services and connections with external networks continue to grow, security will remain top of mind. In the near future, we will see smart drive-thrus, in which fast food restaurants can connect with customers’ vehicles and use GPS coordinates to predict ETAs for even faster, fresher service. We will see gas pumps equipped with sensors that automate payments upon a vehicle’s arrival, without the need to swipe a credit card. We already see cars connecting with social gaming platforms with in-app purchases to entertain passengers on long road trips. Everything from entertainment to automated payments to micro-transactions that take place between the vehicle and other infrastructures must be secured so that they are widely adopted, and in turn, drive profits for OEMs and aftermarket providers alike.

The future of the connected car

The connected car is no longer science fiction — it is here today and can provide consumers with a secure, safe, reliable, and enriched driving experience. However, to do so requires paying close attention to security and connectivity at each step of the vehicle’s life cycle. Ultimately, the ability to secure data that a vehicle generates comes down to constantly identifying and monitoring how that data should be used. To streamline these efforts, automakers should partner with security experts and invest in IoT connectivity management platforms that are capable of automating how and when a vehicle connects and what the vehicle is allowed to do with that connection. Automated connectivity management platforms enable manufacturers to identify what vehicles are allowed to do with their connectivity. If they do anything else, the platform can detect that anomalous behavior and automatically shut off the connectivity, preventing illicit activity that could compromise the vehicle’s security and safety.

While IoT platforms and partnerships can help assuage security concerns and position automakers for success, there is an entire ecosystem of responsibility for the connected car. With new devices, connections, and data points arising every day, no single party is 100-percent responsible for connected car security. Everyone — from the OEM to the dealership to the bank that enables automated payments to the developers of aftermarket services — must do their part to keep cars safe, consumers happy, and our “data centers on wheels” rolling securely.

VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Discover our Briefings.