We still refer to our mobiles as “phones,” even though making phone calls is the very least of their functions. In the same way, we are likely to continue calling connected vehicles “cars,” even though driving, as we understand it today, will soon be eclipsed by a myriad other capabilities.
The connected car will be able to drive itself, performing tasks such as dropping you at the airport before taking your children to school and collecting your shopping. During the day, while you are at work, you may be able to rent it to a taxi service provider. At weekends, you might choose to take the wheel again – for purely recreational reasons. The rest of the time, you can hand over responsibility to the car’s automated systems while you surf the net, watch a movie, work or sleep.
Living in networks
To take on all these new functions, the connected car has to “live” in multiple networks, interacting with systems including power grids, car manufacturers, traffic control, vehicle-to-vehicle communications, road tolls, home networks, technical services and government. “The connected car is a network of networks,” explained Tim Best, EY Director, Cyber Security, speaking at CODE_n. “That means it is only as secure as the networks in which it operates. All of these present possible ‘attack vectors’ for hackers.” More…