Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The Connected Vehicle - Challenges and Opportunities.

180 views

Published on

This presentation discusses challenges and opportunities of the connected vehicle. The presentation was given at a Symposium on the Future Networked Car 2018 (FNC-2018)
held in Geneva, Switzerland on 8 March 2018. More information on the symposium can be found here: https://www.itu.int/en/fnc/2018/Pages/default.aspx

Published in: Technology
  • Be the first to comment

  • Be the first to like this

The Connected Vehicle - Challenges and Opportunities.

  1. 1. © 2017 DEKRA Christoph G. Nolte DEKRA Automotive The Connected Vehicle - Challenges and Opportunities
  2. 2. © 2017 DEKRA The connected vehicle ecosystem App Web Cloud Car Manufacturers Auto Dealers Application Servers Connected vehicle Value added Services DDBB Third parties Additional services Third party Servers Servers Traffic infrastructure Pedestrian Connected vehicle
  3. 3. © 2017 DEKRASlide 3 Standards
  4. 4. © 2017 DEKRA Fragmentation in standards Slide 4 LTE-V 5G DSRC 802.11p WAVE ITS-G5 ITS Connect
  5. 5. © 2017 DEKRASlide 5 Data Usage
  6. 6. © 2017 DEKRA The connected vehicle – data usage Slide 6 Data usage (MB/h) 0 5000 10000 15000 20000 25000 Turn-by-turn navigation Web browsing VoIP calling Music streaming Video streaming (SD) Video streaming (HD) Video streaming (4K) Connected car 0 100 200 300 400 500 600 700 800 Turn-by-turn navigation Web browsing VoIP calling Music streaming Video streaming (SD)
  7. 7. © 2017 DEKRA Mobile network evolution Slide 7 Speed and latency MEC (Mobile Edge Computing) 0 2000 4000 6000 8000 10000 12000 14000 16000 18000 20000 LTE LTE-Adv-Pro 5G 0 2 4 6 8 10 12 Throughput (Mbps) Latency (ms)
  8. 8. © 2017 DEKRASlide 8 Cybersecurity
  9. 9. © 2017 DEKRA Threats in the connected vehicle Slide 9 Attack to the vehicle internal bus (injection/capture) Malicious firmware updates - Through USB, CD, SD card - Through OBD port - Via OTA process Open source software vulnerabilities Attack on certificate and key stores Sniffing of user data and passwords through screens and keypads, transmitted to outside world Attack from downloaded applications Attack from mobile device applications Man-in-the-middle attack Malware delivered through encoded music Compromised actuators controlled by malicious software Any part of the electronic system can be an attack point
  10. 10. © 2017 DEKRA Laws 5 App Web Cloud Car Manufacturers Auto Dealers Application Servers Connected vehicle Value added Services DDBB Third parties Additional services Third party Servers Servers Malware Information Data Leak Unencrypted Data Unencrypted Storage Unencrypted data Vulnerabilities in Applications Insecure Services Insecure Services Insecure Services Vulnerabilities in Services Third party data leak information Regulation Insecure Configurations Unsecured setup Data leak Insecure Protocols Information Data leak Fraud Threats in the connected vehicle ecosystem Insecure Communications Insecure Communications Traffic infrastructure Pedestrian Connected vehicle
  11. 11. © 2017 DEKRA The connected vehicle – challenges and opportunities Pag 11 Standards Data usage Cybersecurity
  12. 12. © 2016 DEKRA Christoph G. Nolte Technical Director DEKRA Automotive christoph.nolte@dekra.com 12

×