© 2017 DEKRA
Christoph G. Nolte
DEKRA Automotive
The Connected Vehicle -
Challenges and Opportunities
© 2017 DEKRA
The connected vehicle ecosystem
App Web
Cloud
Car
Manufacturers
Auto Dealers
Application
Servers
Connected
vehicle
Value added
Services
DDBB
Third
parties
Additional services
Third party
Servers
Servers
Traffic
infrastructure
Pedestrian
Connected
vehicle
© 2017 DEKRASlide 3
Standards
© 2017 DEKRA
Fragmentation in standards
Slide 4
LTE-V
5G
DSRC
802.11p
WAVE
ITS-G5
ITS Connect
© 2017 DEKRASlide 5
Data Usage
© 2017 DEKRA
The connected vehicle – data usage
Slide 6
Data usage (MB/h)
0 5000 10000 15000 20000 25000
Turn-by-turn navigation
Web browsing
VoIP calling
Music streaming
Video streaming (SD)
Video streaming (HD)
Video streaming (4K)
Connected car
0 100 200 300 400 500 600 700 800
Turn-by-turn navigation
Web browsing
VoIP calling
Music streaming
Video streaming (SD)
© 2017 DEKRA
Mobile network evolution
Slide 7
Speed and latency
MEC (Mobile Edge Computing)
0
2000
4000
6000
8000
10000
12000
14000
16000
18000
20000
LTE LTE-Adv-Pro 5G
0
2
4
6
8
10
12
Throughput (Mbps) Latency (ms)
© 2017 DEKRASlide 8
Cybersecurity
© 2017 DEKRA
Threats in the connected vehicle
Slide 9
Attack to the vehicle
internal bus
(injection/capture)
Malicious firmware updates
- Through USB, CD, SD card
- Through OBD port
- Via OTA process
Open source software
vulnerabilities
Attack on certificate
and key stores
Sniffing of user data and passwords
through screens and keypads,
transmitted to outside world
Attack from
downloaded
applications
Attack from mobile
device applications
Man-in-the-middle attack
Malware delivered through
encoded music
Compromised actuators
controlled by malicious
software
Any part of the electronic system can be an attack point
© 2017 DEKRA
Laws
5
App Web
Cloud
Car
Manufacturers
Auto Dealers
Application
Servers
Connected vehicle
Value added
Services
DDBB
Third
parties
Additional services
Third party Servers
Servers
Malware
Information Data Leak
Unencrypted Data
Unencrypted Storage
Unencrypted
data
Vulnerabilities in Applications
Insecure Services
Insecure
Services
Insecure
Services
Vulnerabilities in Services
Third party data
leak information
Regulation
Insecure Configurations
Unsecured setup
Data leak
Insecure
Protocols
Information Data leak
Fraud
Threats in the connected vehicle ecosystem
Insecure
Communications
Insecure
Communications
Traffic
infrastructure
Pedestrian
Connected
vehicle
© 2017 DEKRA
The connected vehicle – challenges and opportunities
Pag 11
Standards Data usage Cybersecurity
© 2016 DEKRA
Christoph G. Nolte
Technical Director
DEKRA Automotive
christoph.nolte@dekra.com
12

The Connected Vehicle - Challenges and Opportunities.

  • 1.
    © 2017 DEKRA ChristophG. Nolte DEKRA Automotive The Connected Vehicle - Challenges and Opportunities
  • 2.
    © 2017 DEKRA Theconnected vehicle ecosystem App Web Cloud Car Manufacturers Auto Dealers Application Servers Connected vehicle Value added Services DDBB Third parties Additional services Third party Servers Servers Traffic infrastructure Pedestrian Connected vehicle
  • 3.
    © 2017 DEKRASlide3 Standards
  • 4.
    © 2017 DEKRA Fragmentationin standards Slide 4 LTE-V 5G DSRC 802.11p WAVE ITS-G5 ITS Connect
  • 5.
    © 2017 DEKRASlide5 Data Usage
  • 6.
    © 2017 DEKRA Theconnected vehicle – data usage Slide 6 Data usage (MB/h) 0 5000 10000 15000 20000 25000 Turn-by-turn navigation Web browsing VoIP calling Music streaming Video streaming (SD) Video streaming (HD) Video streaming (4K) Connected car 0 100 200 300 400 500 600 700 800 Turn-by-turn navigation Web browsing VoIP calling Music streaming Video streaming (SD)
  • 7.
    © 2017 DEKRA Mobilenetwork evolution Slide 7 Speed and latency MEC (Mobile Edge Computing) 0 2000 4000 6000 8000 10000 12000 14000 16000 18000 20000 LTE LTE-Adv-Pro 5G 0 2 4 6 8 10 12 Throughput (Mbps) Latency (ms)
  • 8.
    © 2017 DEKRASlide8 Cybersecurity
  • 9.
    © 2017 DEKRA Threatsin the connected vehicle Slide 9 Attack to the vehicle internal bus (injection/capture) Malicious firmware updates - Through USB, CD, SD card - Through OBD port - Via OTA process Open source software vulnerabilities Attack on certificate and key stores Sniffing of user data and passwords through screens and keypads, transmitted to outside world Attack from downloaded applications Attack from mobile device applications Man-in-the-middle attack Malware delivered through encoded music Compromised actuators controlled by malicious software Any part of the electronic system can be an attack point
  • 10.
    © 2017 DEKRA Laws 5 AppWeb Cloud Car Manufacturers Auto Dealers Application Servers Connected vehicle Value added Services DDBB Third parties Additional services Third party Servers Servers Malware Information Data Leak Unencrypted Data Unencrypted Storage Unencrypted data Vulnerabilities in Applications Insecure Services Insecure Services Insecure Services Vulnerabilities in Services Third party data leak information Regulation Insecure Configurations Unsecured setup Data leak Insecure Protocols Information Data leak Fraud Threats in the connected vehicle ecosystem Insecure Communications Insecure Communications Traffic infrastructure Pedestrian Connected vehicle
  • 11.
    © 2017 DEKRA Theconnected vehicle – challenges and opportunities Pag 11 Standards Data usage Cybersecurity
  • 12.
    © 2016 DEKRA ChristophG. Nolte Technical Director DEKRA Automotive christoph.nolte@dekra.com 12