Explore Car Security in your daily life.
Start your ride by:
… scrolling with your mouse
… or clicking your keyboard
The electronic car key authenticates the driver, allows him to access the vehicle and to start it.
Vehicles are increasingly interconnected with the environment, other vehicles, but also with the traffic infrastructure and to the internet. For the driver, this has many advantages, but at the same time growing data streams mean a higher risk of manipulation. Therefore, the vehicle needs:
Via the cloud the driver obtains real-time information about the traffic situation.
Information from nearby vehicles is used to create alerts for the driver.
In case of an accident, vehicles equipped with an eCall (emergency call) system, automatically make an emergency call to the European Emergency Number 112. The vehicles get directly connected with the nearest emergency call center. The system transmits further information to the center, for example:
This information is passed on to the emergency vehicles which arrive faster at the scene of the accident. So the eCall system contributes to help the victims quickly and to save their lives.
The driver is shortly distracted by a phone call and comes too close to the vehicle ahead.
The car’s onboard communication ensures that the safety system receives all needed information: It causes the vehicle to brake.
Radar sensors detect the critical distance and communicate with the vehicle’s brake system.
The car’s onboard communication works error-free: It restored the necessary safe distance to the vehicle ahead.
The safety-critical communication between the systems must be protected from hacker attacks.
Sensors are an important element of assistance systems. In this case, the radar sensors of the vehicle distance assistant detect if a car gets too close to a vehicle ahead. Microcontrollers help the car react correctly in this situation:
For these two functions, the data and their processing in the microcontrollers must be protected from tampering.
With the car’s increasing external communication, the risk of hacking attacks, which could endanger the safety of passengers and the vehicle, rises. The next step of assisted driving – autonomous driving – is only possible if the driver can fully rely on all systems being protected from unauthorized access.
By using voice control via a smartphone, the driver asks the car cloud to search for parking spot.
The car cloud identifies a free space for the driver in the nearest parking garage. The car is routed there.
The driver pays the parking fee with his smartphone. The parking garage clearly identifies him, grants access and performs the payment.
When buying an electronic ticket (eTicketing) via mobile devices it is very important to protect personal data and pass codes – e.g. credit card information – from unauthorized access. All communication channels that transmit sensitive information need to be protected – for example with the help of encryption technologies: These ensure that third parties cannot access personal data or bank accounts.