Cover Image
Market Research Report

Automotive Cybersecurity: Meeting the High-Stakes Challenge

Published by VDC Research Group, Inc. Product code 348571
Published Content info 28 Pages; 5 Exhibits
Delivery time: 1-2 business days
Back to Top
Automotive Cybersecurity: Meeting the High-Stakes Challenge
Published: December 30, 2015 Content info: 28 Pages; 5 Exhibits

Electronics continue to proliferate in automotive applications, such that the typical new car contains dozens of embedded systems. And a hacked car is among the nightmare scenarios for automakers and drivers alike. Security domains for hardware and software include: in-vehicle processors; local area and wide area communications; infotainment; remote software updating and management; and related applications.

What questions are addressed?

  • How fast is connectivity increasing in the automotive market, and how does it impact cybersecurity?
  • How do security requirements differ between safety-critical functions and information systems?
  • How does the automotive industry's tiered supply chain impact cybersecurity?
  • Which embedded hardware and software technologies will help secure automotive systems?
  • How large is the automotive market for embedded security software, hardware, and cloud services?
  • Which security vendors are poised for the greatest impact in this segment?

Who should read this report?

  • This report is for those making critical decisions regarding product, market, channel, and competitive strategy and tactics in the automotive electronics and embedded security markets. People who could benefit from reading this report include those with roles in: product management, marketing and strategy executives at OEMs, development tools suppliers, investment firms, and associated positions and organizations.

Vendors Mentioned in this Report

  • ARM
  • Athena Group
  • Covisint
  • Elektrobit
  • Freescale/NXP
  • Green Hills Software
  • Harman/Redbend/Symphony Teleca
  • Infineon
  • Intel
  • Mentor Graphics
  • Movimento
  • QNX
  • Renesas
  • Secunet
  • Security Innovation
  • Trillium

Executive Summary

As Internet connectivity and electronic features proliferate in motor vehicles, cybersecurity threats will increase risks to both occupant safety and data privacy. The tiered nature of the automotive supply chain complicates efforts to design and build secure vehicles. The CAN bus used in many safety-critical vehicle functions is particularly problematic to secure, as is the interface between infotainment and functional systems. Forthcoming vehicle-to-vehicle and vehicle-to-infrastructure communications technologies will introduce additional cybersecurity risks.

A range of automotive hardware and software security solutions is already available with more in development. However, automakers will exacerbate the challenges of data security and privacy through their desire to monetize vehicle data.

Key Findings

  • Nearly one-third of new vehicles sold in 2015 had Internet connectivity through embedded cellular modems and/or smartphone interface, and by 2020, more than three-quarters of new vehicles will have such connectivity.
  • The average new vehicle in 2015 contained XX microprocessors, a number which will continue to rise in coming years but be partially offset by consolidation of multiple functions into individual processors.
  • Fewer than XX% of in-vehicle microprocessors employed hardware security features in 2014, but VDC expects that portion to rise to XX% by 2020.
  • IoT cloud services for the automotive market will rise from $XX in 2014 to $XX in 2020, presenting strong opportunity for cloud vendors and technology suppliers with expertise in both security and the automotive market.
Table of Contents

Table of Contents

Inside This Report

  • What questions are addressed?
  • Who should read this report?
  • Vendors Mentioned in this Report

Table of Contents

Executive Summary

  • Key Findings

Connected Cars: the Poster Child of Cybersecurity Risk

The Automotive Market & Internet Connectivity

  • Exhibit 1: Percent of New Vehicles with Internet Connectivity, by Connection Type

Automotive Security is Less Than the Sum of its Parts

  • Exhibit 2: Average Number of Embedded Microprocessors per New Vehicle
  • Security Implications of Tiered Supply Chain

Securing Functional Safety

  • The CAN Bus Problem
  • Secure Booting
  • Hardware Security Modules & Secure Hardware Extension
  • Virtualization & Separation
  • Secure Coding
  • Open Source Code
  • Secure Updates
  • The IVI
  • Autonomous Vehicles

Securing V2V & V2I

Securing Personal Data

Market Opportunities for Automotive Security Solutions

  • Embedded Security Software
  • Exhibit 3: Worldwide Revenues for Embedded Security Software in Automotive Market 2014 to 2020
  • Embedded Security Hardware
  • Exhibit 4: Percentage of Microprocessors Embedded in Automotive Systems that Employ Hardware Security, 2015 to 2020
  • Security for Connectivity & Cloud Services
  • Exhibit 5: Worldwide Revenues for IoT Connectivity & Cloud Services in the Automotive Market 2014 to 2020

Competitive Landscape

  • Selected Vendor Profiles
  • Covisint
  • Elektrobit
  • Green Hills Software
  • Harman/Redbend/Symphony Teleca
  • QNX
  • Security Innovation

VDC Research

  • About the Authors
  • About VDC Research
Back to Top