Secure telematics data management to enhance intelligence operations and unlock monetization opportunities in V2X.
Optimizing services for secure data management in connected vehicle telematics is vital to further hone intelligence operations and unlock new IoT security monetization in V2X applications, according to a new report by global technology intelligence firm ABI Research.
“Telematics applications stand at the very core of car OEMs’ intelligence strategy, producing an ever-increasing amount of data and supporting key operations including, among others, fleet management, vehicle connectivity optimization, firmware-over-the-air (FOTA) updates, and predictive maintenance. While car OEMs partially adopt new security measures out of necessity due to compliance and regulatory requirements, the fact of the matter is that they do need to adapt V2X applications to meet the demands of the greater IoT ecosystems. OEMs are steadily starting to recognize the value of having a security-first approach in connected vehicles,” explains Dimitrios Pavlakis, Senior IoT Security Analyst at ABI Research.
Secure telematics data management can be tackled by adopting a more unified approach. Rather than simply “pushing” security to the cloud, secure telematics need to originate in the vehicle itself. Vehicle systems are evolving into a highly complex and interconnected network spanning multiple control/processing units, generating an ever-increasing amount of data, and funneling it into one component geared for external communications: the Telematics Control Unit (TCU).
Every single data point captured by vehicle systems and gateways, communicated through cellular networks, and analyzed in the cloud by car OEMs and Telematics Service Providers (TSPs) originates from TCU communication modules. A simple eSIM incorporated into telematics devices is enough to secure external communications for many telematics suppliers and car OEMs.
“It is astonishing that automotive data security management rests on this unique technology when the monetization opportunity is significantly higher. The concept of “simply embedding the TCU with an eSIM” is merely a connectivity-enabler, not a scalable security approach.”
Many automotive market players rely very heavily on cloud security to ensure their customers and end-user data is properly gathered, stored, and managed. However, there are multiple value chains prior to the cloud, starting with identity issuance at the manufacturing stage for telematics devices, secure firmware installation and code issuance for software components, certificate management and proper ownership migration, provisioning, and onboarding, establishing trust with third-party services, streamlining in-vehicle network operations, privacy, and secure data management, among many others.
Pavlakis concludes, “There is no future scenario in the era of the software-defined vehicle that excludes the further investment of hardware, software, and network security options. Obtaining reliable telematics data and protecting vehicle communications directly contributes to data monetization and aligns with the future of V2X and intelligent vehicle processes.”
Companies leading in the space are offering telematics-specific eUICCs and embedded firmware solutions (Thales), embedded hardware security for V2X (Infineon), connectivity platforms and Vehicle SoCs (Ericsson), high-tier security connected vehicle network and data security (Blackberry), and software-defined vehicle and security architecture consulting services (Tata Elxi and Upstream).