OEM Cyber Security Layout Report, 2020
  • Dec.2020
  • Hard Copy
  • USD $3,400
  • Pages:130
  • Single User License
    (PDF Unprintable)       
  • USD $3,200
  • Code: JH001
  • Enterprise-wide License
    (PDF Printable & Editable)       
  • USD $4,800
  • Hard Copy + Single User License
  • USD $3,600
      

Research into automotive cyber security: server and digital key are the ports vulnerable to attacks, for which OEMs have stepped up efforts in cyber security.

With advances in the CASE (Connected, Autonomous, Shared, and Electrified) trend, cars are going smarter ever with functional enrichment. Statistically, the installation rate of telematics feature to new cars in China is over 50% from January to October of 2020, a figure projected to rise to 75% or so in 2025. In terms of functionality, intelligent cockpit and advanced automated driving become trending, and the features such as multi-modal interaction, multi-display interaction, 5G connectivity, V2X, OTA and digital key finds ever broader application alongside the soaring number of vehicle control codes and more port vulnerabilities to safety threat.

Currently, the automotive cyber security events arise mainly from attacks on server, digital key, mobile APP, OBD port among others.

Server acts as the most important port for cyber security, which is exposed to the attack by hackers on operating system, database, TSP server, OTA server and the like, thus issuing in data tampering, damage and vehicle safety accidents. Most tools of assault on servers are remotely accessible with lower costs, while the data storage over servers is of paramount importance, all of which lead to often a rather high share of attacks on servers.

Digital key, as the second port that matters most to cyber security, is a common media subject to vehicle intrusion and theft. In 2020, there will be 300,000 Bluetooth digital key installs in China, coupled with an installation rate at about 4%, with such more functionalities besides lock/unlock & start as account log-in, key sharing, vehicle trajectory record, and parcel delivery to cars, which has ever more implications on vehicle safety.

B 信息安全 1_副本.png

Different auto brands are subject to varied attack on vehicle security.

The smarter a car is, the more vulnerable to security attacks will be. Amid the intelligence trend, all OEMs, whatever Mercedes-Benz, BMW, Audi, VW, Toyota, Honda or Hyundai, have varied exposure to security attacks.

B 信息安全 2_副本.png

In March 2020, key encryption approaches of OEMs like Toyota, Hyundai and KIA were reported to have limitations with a possibility of intrusions and thefts largely due to the vulnerabilities of TI’s DST80 encryption system employed by them. A hacker just stands near the car that packs DST80 remote control key, using the inexpensive Proxmark RFID reader/transmitter for the ‘identity theft’ of the key and thus getting the encrypted information.

B 信息安全 3.png

OEM quicken their presence in cyber security

To address serious challenges in automotive cyber security, the OEMs are sparing no efforts in security improvement in many aspects: a) information management inside the company and optimization of R&D process; 2) to build a team intended for cyber security; 3) cyber security protection of telematics.

> European and American OEMs: Diversified deployments of cyber security protection
The automakers from Europe and America are pushing ahead with cyber security construction roundly with technical superiorities, with a tightened control on information security management inside the company apart from improvements in cyber security protection of telematics. As concerns team construction, the majority of European and American OEMs as usual set up either an independent cyber security division or a subsidiary to ensure information security during a vehicle lifespan.

Mercedes-Benz, for instance, has such actions for cyber security in the three below:
Cloud computing: vehicle data protection enabled by a cloud platform through which the car owner takes control of data openness to the outside while driving, and at the same time relevant information will be eliminated automatically after the car owner leaves his/her car;
Factory: partnership with telecom carriers and equipment vendors to set up intelligent vehicle manufacturing factories with production data safety enabled by 5G mobile network;
Vulnerability protection: joins forces with third-party cybersecurity providers to test and repair the potential vulnerabilities of intelligent connected vehicle.

> Japanese and Korean OEMs: with a more focus on cyber security protection and management inside the company

Nissan Motor, for example, proceeds with intro-company management on information security and perfects the regulations concerned. Over the recent years, Nissan has been improving its R&D management system and cyber security platform, with its Tel Aviv-based joint innovation laboratory and collaborations with Israeli start-ups on cyber security testing and study. As yet, Nissan has more than ten cooperative joint prototype projects.

> Chinese OEMs: the emerging forces go ahead of the rest

The emerging carmakers are commendable in cyber security protection. Cases include XPENG Motors that boast concurrent deployments over cloud, vehicle and mobile phone by building a security team on its own and the partnerships with Aliyun, Irdeto, and Keen Security Lab of Tencent in order for a proactive protection system; and NIO that has built a X-Dragon multi-dimensional protection system through a self-owned security team and multi-party cooperation.

Also, the time-honored Chinese automakers follow suit, such as Dongfeng Motor, SAIC, GAC and BAIC that all prioritize the security stewardship during their life cycle. As concerns its overall deployment, SAIC, for example, incorporates its subordinates into the group’s cyber security protection and management system and applies the data encryption software (GS-EDS system) with one accord for data safety as a whole; secondly, SAIC builds a cloud platform independently and a proprietary cloud computing center delivering cloud-based security services; last, SAIC founded SAIC Lingshu Software Co., Ltd in charge of developing basic technology platform and sharpening software R&D competence.

B 信息安全 4_副本.png

OEMs have ever broader cooperation in cyber security.

In addition to security enhancement, OEMs are vigorously seeking for external collaborations on vehicle, communication, platform, data, and application, to name a few.

B 信息安全 5_副本.png

1. Overview of IoV Cyber Security 
1.1 Overview
1.1.1 Definition
1.1.2 IoV Cyber Security Protection
1.2 IoV Cyber Security Technology Application
1.2.1 T-BOX Safety Technology Application
1.2.2 IVI Safety Technology Application
1.2.3 Safety Technology Application of Digital Key System
1.2.4 PKI Technology Application for Car Cloud Network Communication Security
1.2.5 FOTA Safety Technology Application for Onboard System
1.3 Automotive Cyber Security Standard Development at Home and Abroad
1.3.1 Overview of Automotive Cyber Security Standard Development in China and the World
1.3.2 Major International Policies and Regulations on IoV Cyber Security
1.3.3 Major European Policies and Regulations on IoV Cyber Security
1.3.4 Major American and Japanese Policies and Regulations on IoV Cyber Security
1.3.5 Chinese IoV Cyber Security Standard System Architecture
1.3.6 Chinese IoV Cyber Security Standard Construction
1.4 Status Quo and Trend of Chinese Automotive Cyber Security 
1.4.1 Impact of  CASE on Cyber Security
1.4.2 Knowledge of Industry Insiders on Status Quo of IoV Cyber Security
1.4.3 Impact of Vehicle E/E Architecture on Cyber Security
1.4.4 Automotive Cyber Security Technology Development Strategy: Cloud
1.4.5 Automotive Cyber Security Technology Development Strategy: Communication
1.4.6 Automotive Cyber Security Technology Development Strategy: Vehicle

2. Status Quo of Automotive Cyber Security Industry 
2.1 Analysis of OEM Cyber Security Events
2.1.1 Analysis of OEM Cyber Security Events
2.1.2 Analysis of OEM Cyber Security Events: Event Summary
2.1.3 Analysis (I) of OEM Cyber Security Event (Application)
2.1.4 Analysis (II) of OEM Cyber Security Event (Application)
2.1.5 Analysis (III) of OEM Cyber Security Event (Platform)
2.1.6 Analysis (IV) of OEM Cyber Security Event (Platform)
2.1.7 Analysis (V) of OEM Cyber Security Event (Vehicle)
2.1.8 Analysis (VI) of OEM Cyber Security Event (Vehicle)
2.1.9 Analysis (VII) of OEM Cyber Security Event (Communication)
2.1.10 Analysis (VIII) of OEM Cyber Security Event (Communication)
2.2 Comparison of OEM Cyber Security Layouts
2.2.1 European and American OEMs
2.2.2 Japanese and Korea OEMs
2.2.3 Chinese OEMs
2.3 Cyber Security Collaborations of OEMs
2.3.1 European and American OEMs
2.3.2 Japanese and Korea OEMs 
2.3.3 Chinese OEMs
2.3.4 Chinese Automotive Cyber Security Industry Map 

3. Cyber Security Layouts of European and American OEMs
3.1 Mercedes-Benz
3.1.1 Cyber Security Layout
3.1.2 Cyber Security Technology Route
3.1.3 Cyber Security Partners
3.2 BMW
3.2.1 Cyber Security Layout
3.2.2 Cyber Security R&D System Construction
3.2.3 Cyber Security Partners
3.3 Audi
3.3.1 Cyber Security Layout
3.3.2 Cyber Security R&D System Construction
3.3.3 Cyber Security Partners
3.4 VW
3.4.1 Cyber Security Layout
3.4.2 Cyber Security R&D System Construction
3.4.3 Cyber Security Partners
3.5 Volvo
3.5.1 Cyber Security Layout
3.5.2 Cyber Security R&D System Construction
3.5.3 Cyber Security Partners
3.6 Ford
3.6.1 Cyber Security Layout
3.6.2 Cyber Security R&D System Construction
3.6.3 Cyber Security Partners
3.7GM
3.7.1 Cyber Security Layout
3.7.2 Cyber Security R&D System Construction
3.7.3 Cyber Security Partners

4. Cyber Security Layout of Japanese and Korean OEMs
4.1 Toyota
4.1.1 Cyber Security Layout
4.1.2 Cyber Security Technology Route
4.1.3 Cyber Security Partners
4.2 Honda
4.2.1 Cyber Security Layout
4.2.2 Cyber Security R&D System Construction
4.2.3 Cyber Security Partners
Software
4.3 Nissan
4.3.1 Cyber Security Layout
4.3.2 Cyber Security R&D System Construction
4.3.3 Cyber Security Partners
4.4 Hyundai
4.4.1 Cyber Security Layout
4.4.2 Cyber Security Technical Route
4.4.3 Cyber Security Partners

5. Cyber Security Layout of Chinese OEMs
5.1 Xpeng Motors
5.1.1 Cyber Security Layout
5.1.2 Cyber Security Technology Route
5.1.3 Cyber Security Partners
5.2 NIO
5.2.1 Cyber Security Layout
5.2.2 Cyber Security Technology Route
5.2.3 Cyber Security Partners
5.3 Lixiang
5.3.1 Cyber Security Layout
5.3.2 Cyber Security Technology Route
5.3.3 Cyber Security Partners
5.4 WM Motor
5.4.1 Cyber Security Layout
5.4.2 Cyber Security Technology Route
5.4.3 Cyber Security Partners
5.5 Dongfeng Motor
5.5.1 Cyber Security Layout
5.5.2 Cyber Security Technology Route
5.5.3 Cyber Security Partners
5.6 SAIC
5.6.1 Cyber Security Layout
5.6.2 Cyber Security Technology Route
5.6.3 Cyber Security Partners
5.7 BAIC
5.7.1 Cyber Security Layout
5.7.2 Cyber Security Technology Route
5.7.3 Cyber Security Partners
5.8 GAC
5.8.1 Cyber Security Layout
5.8.2 Cyber Security Technology Route
5.8.3 Cyber Security Partners
 

Smart Car Information Security (Cybersecurity and Data Security) Research Report, 2025

Research on Automotive Information Security: AI Fusion Intelligent Protection and Ecological Collaboration Ensure Cybersecurity and Data Security At present, what are the security risks faced by inte...

New Energy Vehicle 800-1000V High-Voltage Architecture and Supply Chain Research Report, 2025

Research on 800-1000V Architecture: to be installed in over 7 million vehicles in 2030, marking the arrival of the era of full-domain high voltage and megawatt supercharging. In 2025, the 800-1000V h...

Foreign Tier 1 ADAS Suppliers Industry Research Report 2025

Research on Overseas Tier 1 ADAS Suppliers: Three Paths for Foreign Enterprises to Transfer to NOA Foreign Tier 1 ADAS suppliers are obviously lagging behind in the field of NOA. In 2024, Aptiv (2.6...

VLA Large Model Applications in Automotive and Robotics Research Report, 2025

ResearchInChina releases "VLA Large Model Applications in Automotive and Robotics Research Report, 2025": The report summarizes and analyzes the technical origin, development stages, application cases...

OEMs’ Next-generation In-vehicle Infotainment (IVI) System Trends Report, 2025

ResearchInChina releases the "OEMs’ Next-generation In-vehicle Infotainment (IVI) System Trends Report, 2025", which sorts out iterative development context of mainstream automakers in terms of infota...

Autonomous Driving SoC Research Report, 2025

High-level intelligent driving penetration continues to increase, with large-scale upgrading of intelligent driving SoC in 2025 In 2024, the total sales volume of domestic passenger cars in China was...

China Passenger Car HUD Industry Report, 2024

ResearchInChina released the "China Passenger Car HUD Industry Report, 2025", which sorts out the HUD installation situation, the dynamics of upstream, midstream and downstream manufacturers in the HU...

ADAS and Autonomous Driving Tier 1 Suppliers Research Report, 2025 – Chinese Companies

ADAS and Autonomous Driving Tier 1 Suppliers Research Report, 2025 – Chinese Companies Research on Domestic ADAS Tier 1 Suppliers: Seven Development Trends in the Era of Assisted Driving 2.0 In the ...

Automotive ADAS Camera Report, 2025

①In terms of the amount of installed data, installations of side-view cameras maintain a growth rate of over 90%From January to May 2025, ADAS cameras (statistical scope: front-view, side-view, surrou...

Body (Zone) Domain Controller and Chip Industry Research Report,2025

Body (Zone)  Domain Research: ZCU Installation Exceeds 2 Million Units, Evolving Towards a "Plug-and-Play" Modular Platform The body (zone) domain covers BCM (Body Control Module), BDC (Body Dom...

Automotive Cockpit Domain Controller Research Report, 2025

Cockpit domain controller research: three cockpit domain controller architectures for AI Three layout solutions for cockpit domain controllers for deep AI empowerment As intelligent cockpit tran...

China Passenger Car Electronic Control Suspension Industry Research Report, 2025

Electronic control suspension research: air springs evolve from single chamber to dual chambers, CDC evolves from single valve to dual valves ResearchInChina released  "China Passenger Car Elect...

Automotive XR Industry Report, 2025

Automotive XR industry research: automotive XR application is still in its infancy, and some OEMs have already made forward-looking layout  The Automotive XR Industry Report, 2025, re...

Intelligent Driving Simulation and World Model Research Report, 2025

1. The world model brings innovation to intelligent driving simulation In the advancement towards L3 and higher-level autonomous driving, the development of end-to-end technology has raised higher re...

Autonomous Driving Map (HD/LD/SD MAP, Online Reconstruction, Real-time Generative Map) Industry Report 2025

Research on Autonomous Driving Maps: Evolve from Recording the Past to Previewing the Future with "Real-time Generative Maps" "Mapless NOA" has become the mainstream solution for autonomous driving s...

End-to-End Autonomous Driving Research Report, 2025

End-to-End Autonomous Driving Research: E2E Evolution towards the VLA Paradigm via Synergy of Reinforcement Learning and World Models??The essence of end-to-end autonomous driving lies in mimicking dr...

Research Report on OEMs and Tier1s’ Intelligent Cockpit Platforms (Hardware & Software) and Supply Chain Construction Strategies, 2025

Research on intelligent cockpit platforms: in the first year of mass production of L3 AI cockpits, the supply chain accelerates deployment of new products An intelligent cockpit platform primarily r...

Automotive EMS and ECU Industry Report, 2025

Research on automotive EMS: Analysis on the incremental logic of more than 40 types of automotive ECUs and EMS market segments In this report, we divide automotive ECUs into five major categories (in...

2005- www.researchinchina.com All Rights Reserved 京ICP备05069564号-1 京公网安备1101054484号