© 2017 DEKRA
Christoph G. NolteDEKRA Automotive
The Connected Vehicle -
Challenges and Opportunities
© 2017 DEKRA
The connected vehicle ecosystem
App Web
Cloud
Car
Manufacturers
Auto Dealers
Application
Servers
Connected
vehicle
Value added
Services
DDBB
Third
parties
Additional services
Third party
Servers
Servers
Traffic
infrastructure
Pedestrian
Connected
vehicle
© 2017 DEKRASlide 3
Standards
© 2017 DEKRA
Fragmentation in standards
Slide 4
LTE-V
5G
DSRC
802.11p
WAVEITS-G5
ITS Connect
© 2017 DEKRASlide 5
Data Usage
© 2017 DEKRA
The connected vehicle – data usage
Slide 6
Data usage (MB/h)
0 5000 10000 15000 20000 25000
Turn-by-turn navigation
Web browsing
VoIP calling
Music streaming
Video streaming (SD)
Video streaming (HD)
Video streaming (4K)
Connected car
0 100 200 300 400 500 600 700 800
Turn-by-turn navigation
Web browsing
VoIP calling
Music streaming
Video streaming (SD)
© 2017 DEKRA
Mobile network evolution
Slide 7
Speed and latencyMEC (Mobile Edge Computing)
0
2000
4000
6000
8000
10000
12000
14000
16000
18000
20000
LTE LTE-Adv-Pro 5G
0
2
4
6
8
10
12
Throughput (Mbps) Latency (ms)
© 2017 DEKRASlide 8
Cybersecurity
© 2017 DEKRA
Threats in the connected vehicle
Slide 9
Attack to the vehicle
internal bus
(injection/capture)
Malicious firmware updates- Through USB, CD, SD card
- Through OBD port
- Via OTA process
Open source software
vulnerabilities
Attack on certificate
and key stores
Sniffing of user data and passwords
through screens and keypads,
transmitted to outside world
Attack from
downloaded
applications
Attack from mobile
device applications
Man-in-the-middle attack
Malware delivered through
encoded music
Compromised actuators
controlled by malicious
software
Any part of the electronic system can be an attack point
© 2017 DEKRA
Laws
5
App Web
Cloud
Car
Manufacturers
Auto Dealers
Application
Servers
Connected vehicle
Value added
Services
DDBB
Third
parties
Additional services
Third party Servers
Servers
Malware
Information Data Leak
Unencrypted Data
Unencrypted Storage
Unencrypted
data
Vulnerabilities in Applications
Insecure Services
Insecure
Services
Insecure
Services
Vulnerabilities in Services
Third party data
leak information
Regulation
Insecure Configurations
Unsecured setup
Data leak
Insecure
Protocols
Information Data leak
Fraud
Threats in the connected vehicle ecosystem
Insecure
Communications
Insecure
Communications
Traffic
infrastructure
Pedestrian
Connected
vehicle
© 2017 DEKRA
The connected vehicle – challenges and opportunities
Pag 11
Standards Data usage Cybersecurity