OEM Cyber Security Layout Report, 2020

Publisher Name :
Date: 25-Dec-2020
No. of pages: 130

Research into automotive cyber security: server and digital key are the ports vulnerable to attacks, for which OEMs have stepped up efforts in cyber security.

With advances in the CASE (Connected, Autonomous, Shared, and Electrified) trend, cars are going smarter ever with functional enrichment. Statistically, the installation rate of telematics feature to new cars in China is over 50% from January to October of 2020, a figure projected to rise to 75% or so in 2025. In terms of functionality, intelligent cockpit and advanced automated driving become trending, and the features such as multi-modal interaction, multi-display interaction, 5G connectivity, V2X, OTA and digital key finds ever broader application alongside the soaring number of vehicle control codes and more port vulnerabilities to safety threat.

Currently, the automotive cyber security events arise mainly from attacks on server, digital key, mobile APP, OBD port among others.

Server acts as the most important port for cyber security, which is exposed to the attack by hackers on operating system, database, TSP server, OTA server and the like, thus issuing in data tampering, damage and vehicle safety accidents. Most tools of assault on servers are remotely accessible with lower costs, while the data storage over servers is of paramount importance, all of which lead to often a rather high share of attacks on servers.

Digital key, as the second port that matters most to cyber security, is a common media subject to vehicle intrusion and theft. In 2020, there will be 300,000 Bluetooth digital key installs in China, coupled with an installation rate at about 4%, with such more functionalities besides lock/unlock & start as account log-in, key sharing, vehicle trajectory record, and parcel delivery to cars, which has ever more implications on vehicle safety.

Different auto brands are subject to varied attack on vehicle security.
The smarter a car is, the more vulnerable to security attacks will be. Amid the intelligence trend, all OEMs, whatever Mercedes-Benz, BMW, Audi, VW, Toyota, Honda or Hyundai, have varied exposure to security attacks.

In March 2020, key encryption approaches of OEMs like Toyota, Hyundai and KIA were reported to have limitations with a possibility of intrusions and thefts largely due to the vulnerabilities of TI’s DST80 encryption system employed by them. A hacker just stands near the car that packs DST80 remote control key, using the inexpensive Proxmark RFID reader/transmitter for the ‘identity theft’ of the key and thus getting the encrypted information.

OEM quicken their presence in cyber security
To address serious challenges in automotive cyber security, the OEMs are sparing no efforts in security improvement in many aspects: a) information management inside the company and optimization of R&D process; 2) to build a team intended for cyber security; 3) cyber security protection of telematics.

European and American OEMs: Diversified deployments of cyber security protection
The automakers from Europe and America are pushing ahead with cyber security construction roundly with technical superiorities, with a tightened control on information security management inside the company apart from improvements in cyber security protection of telematics. As concerns team construction, the majority of European and American OEMs as usual set up either an independent cyber security division or a subsidiary to ensure information security during a vehicle lifespan.

Mercedes-Benz, for instance, has such actions for cyber security in the three below:


  • Cloud computing: vehicle data protection enabled by a cloud platform through which the car owner takes control of data openness to the outside while driving, and at the same time relevant information will be eliminated automatically after the car owner leaves his/her car;

  • Factory: partnership with telecom carriers and equipment vendors to set up intelligent vehicle manufacturing factories with production data safety enabled by 5G mobile network;

  • Vulnerability protection: joins forces with third-party cybersecurity providers to test and repair the potential vulnerabilities of intelligent connected vehicle.


Japanese and Korean OEMs: with a more focus on cyber security protection and management inside the company

Nissan Motor, for example, proceeds with intro-company management on information security and perfects the regulations concerned. Over the recent years, Nissan has been improving its R&D management system and cyber security platform, with its Tel Aviv-based joint innovation laboratory and collaborations with Israeli start-ups on cyber security testing and study. As yet, Nissan has more than ten cooperative joint prototype projects.

Chinese OEMs: the emerging forces go ahead of the rest.

The emerging carmakers are commendable in cyber security protection. Cases include XPENG Motors that boast concurrent deployments over cloud, vehicle and mobile phone by building a security team on its own and the partnerships with Aliyun, Irdeto, and Keen Security Lab of Tencent in order for a proactive protection system; and NIO that has built a X-Dragon multi-dimensional protection system through a self-owned security team and multi-party cooperation.

Also, the time-honored Chinese automakers follow suit, such as Dongfeng Motor, SAIC, GAC and BAIC that all prioritize the security stewardship during their life cycle. As concerns its overall deployment, SAIC, for example, incorporates its subordinates into the group’s cyber security protection and management system and applies the data encryption software (GS-EDS system) with one accord for data safety as a whole; secondly, SAIC builds a cloud platform independently and a proprietary cloud computing center delivering cloud-based security services; last, SAIC founded SAIC Lingshu Software Co., Ltd in charge of developing basic technology platform and sharpening software R&D competence.

OEMs have ever broader cooperation in cyber security.

In addition to security enhancement, OEMs are vigorously seeking for external collaborations on vehicle, communication, platform, data, and application, to name a few.

OEM Cyber Security Layout Report, 2020

Table of Contents

1. Overview of IoV Cyber Security
1.1 Overview
1.1.1 Definition
1.1.2 IoV Cyber Security Protection
1.2 IoV Cyber Security Technology Application
1.2.1 T-BOX Safety Technology Application
1.2.2 IVI Safety Technology Application
1.2.3 Safety Technology Application of Digital Key System
1.2.4 PKI Technology Application for Car Cloud Network Communication Security
1.2.5 FOTA Safety Technology Application for Onboard System
1.3 Automotive Cyber Security Standard Development at Home and Abroad
1.3.1 Overview of Automotive Cyber Security Standard Development in China and the World
1.3.2 Major International Policies and Regulations on IoV Cyber Security
1.3.3 Major European Policies and Regulations on IoV Cyber Security
1.3.4 Major American and Japanese Policies and Regulations on IoV Cyber Security
1.3.5 Chinese IoV Cyber Security Standard System Architecture
1.3.6 Chinese IoV Cyber Security Standard Construction
1.4 Status Quo and Trend of Chinese Automotive Cyber Security
1.4.1 Impact of CASE on Cyber Security
1.4.2 Knowledge of Industry Insiders on Status Quo of IoV Cyber Security
1.4.3 Impact of Vehicle E/E Architecture on Cyber Security
1.4.4 Automotive Cyber Security Technology Development Strategy: Cloud
1.4.5 Automotive Cyber Security Technology Development Strategy: Communication
1.4.6 Automotive Cyber Security Technology Development Strategy: Vehicle

2. Status Quo of Automotive Cyber Security Industry
2.1 Analysis of OEM Cyber Security Events
2.1.1 Analysis of OEM Cyber Security Events
2.1.2 Analysis of OEM Cyber Security Events: Event Summary
2.1.3 Analysis (I) of OEM Cyber Security Event (Application)
2.1.4 Analysis (II) of OEM Cyber Security Event (Application)
2.1.5 Analysis (III) of OEM Cyber Security Event (Platform)
2.1.6 Analysis (IV) of OEM Cyber Security Event (Platform)
2.1.7 Analysis (V) of OEM Cyber Security Event (Vehicle)
2.1.8 Analysis (VI) of OEM Cyber Security Event (Vehicle)
2.1.9 Analysis (VII) of OEM Cyber Security Event (Communication)
2.1.10 Analysis (VIII) of OEM Cyber Security Event (Communication)
2.2 Comparison of OEM Cyber Security Layouts
2.2.1 European and American OEMs
2.2.2 Japanese and Korea OEMs
2.2.3 Chinese OEMs
2.3 Cyber Security Collaborations of OEMs
2.3.1 European and American OEMs
2.3.2 Japanese and Korea OEMs
2.3.3 Chinese OEMs
2.3.4 Chinese Automotive Cyber Security Industry Map

3. Cyber Security Layouts of European and American OEMs
3.1 Mercedes-Benz
3.1.1 Cyber Security Layout
3.1.2 Cyber Security Technology Route
3.1.3 Cyber Security Partners
3.2 BMW
3.2.1 Cyber Security Layout
3.2.2 Cyber Security R&D System Construction
3.2.3 Cyber Security Partners
3.3 Audi
3.3.1 Cyber Security Layout
3.3.2 Cyber Security R&D System Construction
3.3.3 Cyber Security Partners
3.4 VW
3.4.1 Cyber Security Layout
3.4.2 Cyber Security R&D System Construction
3.4.3 Cyber Security Partners
3.5 Volvo
3.5.1 Cyber Security Layout
3.5.2 Cyber Security R&D System Construction
3.5.3 Cyber Security Partners
3.6 Ford
3.6.1 Cyber Security Layout
3.6.2 Cyber Security R&D System Construction
3.6.3 Cyber Security Partners
3.7GM
3.7.1 Cyber Security Layout
3.7.2 Cyber Security R&D System Construction
3.7.3 Cyber Security Partners

4. Cyber Security Layout of Japanese and Korean OEMs
4.1 Toyota
4.1.1 Cyber Security Layout
4.1.2 Cyber Security Technology Route
4.1.3 Cyber Security Partners
4.2 Honda
4.2.1 Cyber Security Layout
4.2.2 Cyber Security R&D System Construction
4.2.3 Cyber Security Partners
Software
4.3 Nissan
4.3.1 Cyber Security Layout
4.3.2 Cyber Security R&D System Construction
4.3.3 Cyber Security Partners
4.4 Hyundai
4.4.1 Cyber Security Layout
4.4.2 Cyber Security Technical Route
4.4.3 Cyber Security Partners

5. Cyber Security Layout of Chinese OEMs
5.1 Xpeng Motors
5.1.1 Cyber Security Layout
5.1.2 Cyber Security Technology Route
5.1.3 Cyber Security Partners
5.2 NIO
5.2.1 Cyber Security Layout
5.2.2 Cyber Security Technology Route
5.2.3 Cyber Security Partners
5.3 Lixiang
5.3.1 Cyber Security Layout
5.3.2 Cyber Security Technology Route
5.3.3 Cyber Security Partners
5.4 WM Motor
5.4.1 Cyber Security Layout
5.4.2 Cyber Security Technology Route
5.4.3 Cyber Security Partners
5.5 Dongfeng Motor
5.5.1 Cyber Security Layout
5.5.2 Cyber Security Technology Route
5.5.3 Cyber Security Partners
5.6 SAIC
5.6.1 Cyber Security Layout
5.6.2 Cyber Security Technology Route
5.6.3 Cyber Security Partners
5.7 BAIC
5.7.1 Cyber Security Layout
5.7.2 Cyber Security Technology Route
5.7.3 Cyber Security Partners
5.8 GAC
5.8.1 Cyber Security Layout
5.8.2 Cyber Security Technology Route
5.8.3 Cyber Security Partners

  • Global Cyber Weapons Technologies Market Growth (Status and Outlook) 2024-2030
    Published: 04-Jan-2024        Price: US 3660 Onwards        Pages: 121
    According to our LPI (LP Information) latest study, the global Cyber Weapons Technologies market size was valued at US$ 15750 million in 2023. With growing demand in downstream market, the Cyber Weapons Technologies is forecast to a readjusted size of US$ 25160 million by 2030 with a CAGR of 6.9% during review period. The research report highlights the growth potential of the global Cyber Weapons Technologies market. Cyber Weapons Technologies are expected to show stable growth in the fu......
  • Aviation Cyber Security - Global Market Insights and Sales Trends 2024
    Published: 25-Dec-2023        Price: US 3350 Onwards        Pages: 101
    The global Aviation Cyber Security market size is expected to reach US$ 84890 million by 2029, growing at a CAGR of 7.6% from 2023 to 2029. The market is mainly driven by the significant applications of Aviation Cyber Security in various end use industries. The expanding demands from the Air Cargo Management, Air Traffic Management, Airline Management and Airport Management, are propelling Aviation Cyber Security market. Aviation Sector Detect, one of the segments analysed in this report, is pro......
  • Global Cyber Weapons Technologies Market Status and Outlook 2023-2028
    Published: 30-Nov-2023        Price: US 3160 Onwards        Pages: 125
    Our market research experts provide qualitative and quantitative analysis of the market based on involving economic and non-economic factors in the same report with market value (million USD) data for each segment and sub-segment. This way, clients can achieve all their goals while taking advantage of emerging opportunities. Technological advancements, new product launches, and market capital flows are compared across scenarios to demonstrate their impact over the forecast period. D......
  • Global Aviation Cyber Security Industry Research Report, In-depth Analysis of Current Status and Outlook of Key Countries 2023-2028
    Published: 21-Nov-2023        Price: US 3380 Onwards        Pages: 102
    Market Overview of Global Aviation Cyber Security market: According to our latest research, the global Aviation Cyber Security market looks promising in the next 5 years. As of 2022, the global Aviation Cyber Security market was estimated at USD 3976.76 million, and it's anticipated to reach USD 6995.34 million in 2028, with a CAGR of 9.87% during the forecast years. Aviation cyber security solutions are software suites designed to defend aviation networks, computers, and dat......
  • Cyber-security vendors' revenue tracker 1Q 2023
    Published: 07-Sep-2023        Price: US 1999 Onwards        Pages: 0
    Analysys Mason's Cyber-security vendors' revenue tracker provides the financial details of major cyber-security vendors that report their revenue figures, worldwide. Data coverage Tracked metrics include total revenue, customer segment revenue, revenue by type (including products, services and subscriptions), revenue by region (geography), operating profits or losses, expenditure on research and development activities (R&D) and employee ......
  • Global Cyber Weapons Technologies Industry Research Report, In-depth Analysis of Current Status and Outlook of Key Countries 2023-2028
    Published: 22-Aug-2023        Price: US 3380 Onwards        Pages: 102
    Market Overview of Global Cyber Weapons Technologies market: According to our latest research, the global Cyber Weapons Technologies market looks promising in the next 5 years. As of 2022, the global Cyber Weapons Technologies market was estimated at USD XX million, and it's anticipated to reach USD XX million in 2028, with a CAGR of XX% during the forecast years. This report covers a research time span from 2018 to 2028, and presents a deep and comprehensive analysis of the ......
  • Global Aviation Cyber Security Market Insights: Impact of COVID-19 and Future Expectations to 2028
    Published: 01-Aug-2023        Price: US 3260 Onwards        Pages: 126
    Aviation cyber security solutions are software suites designed to defend aviation networks, computers, and databases from cyber-attacks and unauthorized access. As the burgeoning global aviation industry becomes more dependent on information technology (IT) solutions and digital technologies to meet the continuously rising consumer base and changes in consumer preferences, cyber security has become a serious and urgent concern. Cyber-attackers are becoming more sophisticated in the ways they att......
  • Global Cyber Weapons Technologies Market Insights: Impact of COVID-19 and Future Expectations to 2028
    Published: 27-Jun-2023        Price: US 3260 Onwards        Pages: 112
    The Cyber Weapons Technologies market revenue was XX Million USD in 2022, and will reach XX Million USD in 2028, with a CAGR of XX% during 2022-2028. This report elaborates the market size, market characteristics, and market growth of the Cyber Weapons Technologies industry, and breaks down according to the type, application, and consumption area of Cyber Weapons Technologies. The report also introduces players in the industry from the perspective of the industry chain and marketi......
  • Global Aviation Cyber Security Market Size, Share and Industry Analysis by Regions, Countries, Types, and Applications, Forecast to 2028
    Published: 19-May-2023        Price: US 3480 Onwards        Pages: 103
    The global Aviation Cyber Security market size was valued at USD 3976.76 Million in 2022 and will reach USD 6995.34 Million in 2028, with a CAGR of 9.87% during 2022-2028. Aviation cyber security solutions are software suites designed to defend aviation networks, computers, and databases from cyber-attacks and unauthorized access. As the burgeoning global aviation industry becomes more dependent on information technology (IT) solutions and digital technologies to meet the continuou......
  • SERVICES
    Value for Money
    We believe in "optimum utilization of available budget and resources". While servicing our clients' (your) market research requirements, we keep the same approach in focus to help you get the best value for your $$s.
    Ever Growing Inventory
    Ranging from the smallest feasible / required data (datasheets, data facts, SWOT analysis, company profiles, etc) to full research reports that help you make decisions, our inventory is updated almost on a daily basis with the latest industry reports from domain experts that track more than 5000 niche sectors.
    One Stop Solution
    Need a custom research report on medical devices market? Require all available business intelligence on 3D printing industry? Exploring F&B sector of a particular country/region? RnRMarketResearch.com is your one-stop-solution to all market intelligence needs. We not only offer custom research and consulting services, we also "bundle" reports to meet your needs and help you fetch the data analysis you require for your business.
    Dedicated Client Engagement
    Not limited to only "finding" relevant reports for you, our client engagement team dedicates its efforts to understand your "business need" and accordingly maps available research data to help you move forward. Call "your" client engagement executive any time of your day and get your questions answered in order to make the correct business decision.
    Saving Time and Efforts
    Simply share your research requirement details with us and let us do all the hard work to find required intelligence for you. When you add up our "one stop solution" and "dedicated client engagement" services mentioned above, you obviously know the time and effort saving you do by working with us.
    Payment Flexibility
    Working with Fortune 500 organizations, we understand the importance of being flexible for payments. Share your payment terms with us and we will surely match up to them to ensure you get access to required business intelligence data without having to wait for the payment to be done.
    Post-Purchase Research Support
    Have questions after reading a report / datasheet bought through us? Not sure about the methodology used for data available in the research? Talk to us / Share your questions with us and if required, we will connect you with the analyst(s)/author(s) of the report(s) and ensure you get satisfactory answers for the same. Need more data / analysis / report(s) on the topic of your research/project? The RnRMarketResearch.com team is here for you 24X7 to support you with your post-purchase requirements. Subscription Offers & Packages (Get in touch with us for more details - [email protected] / +1 888 391 5441 )
    • Ad Hoc
    • Pay - as - you - go / Bucket Subscriptions
    • Fixed Cost for #of reports
    • Customize / Personalize as per your needs