"The authors do a good job of explaining the rapid growth of IC T in the automotive industry. Importantly, the cybersecurity risks associated with this uptake are discussed--issues which the automotive industry, unlike the IT industry, would most likely not have previously encountered. This is a timely red flag to the industry that may help ensure cybersecurity risks are considered and addressed during vehicle systems design." (David B. Henderson, Computing Reviews, October 9, 2020)
Introduction
The Automotive Industry
Automotive Research and Development
Automotive E/E and Automotive Software Technology
The Connected Car
Automotive Cybersecurity
Mobile Apps for the Connected Car
Case Study A – Car2Go, Carsharing by Daimler
Case Study B – Car Hailing and Ridesharing
Case Study C – Connected Parking and Automated Value Parking
Case Study D – ADAS and Autonomous Driving
Summary, Outlook and Final Remarks
Dietmar P. F. Möller is a Professor in the Institute of Applied Stochastics and Operations Research at Clausthal University of Technology (TUC), Germany; a Member of the Simulations Science Center (SWZ) Clausthal-Göttingen, Germany; an Adjunct Professor in the Department of Electrical and Computer Engineering at the University of Nebraska-Lincoln (UNL), USA; and an Adjunct Professor in the Department of Electrical and Computer Engineering at the University of Alabama in Huntsville (UAH), USA. He is also a member of the Board of the AMSC (Alabama Modeling and Simulation Council), USA. His other publications include the Springer titles Introduction to Transportation Analysis, Modeling and Simulation (2014) and Guide to Computing Fundamentals in Cyber-Physical Systems (2016).
Roland E. Haas isthe Founder and CEO of QSO-Technologies in Bangalore, India. He has more than 20 years of professional experience in senior techno-managerial, business innovation and business development assignments in Germany, USA, India and Japan with broad experience in automotive R&D, aerospace R&D, engineering & IT services, consulting and strategy. As an entrepreneur, he serves as a mentor for startups, a researcher and a book author. He is an honorary professor at the International Institute of Information Technology (IIIT-B) and an adjunct faculty member of the Indian Institute of Science (IISc). His teaching is in mechatronics, automotive electronics, car IT, automotive software technologies, information management and virtual product creation.
This comprehensive text/reference presents an in-depth review of the state of the art of automotive connectivity and cybersecurity with regard to trends, technologies, innovations, and applications. The text describes the challenges of the global automotive market, clearly showing where the multitude of innovative activities fit within the overall effort of cutting-edge automotive innovations, and provides an ideal framework for understanding the complexity of automotive connectivity and cybersecurity.
Topics and features:
Discusses the automotive market, automotive research and development, and automotive electrical/electronic and software technology
Examines connected cars and autonomous vehicles, and methodological approaches to cybersecurity to avoid cyber-attacks against vehicles
Provides an overview on the automotive industry that introduces the trends driving the automotive industry towards smart mobility and autonomous driving
Reviews automotive research and development, offering background on the complexity involved in developing new vehicle models
Describes the technologies essential for the evolution of connected cars, such as cyber-physical systems and the Internet of Things
Presents case studies on Car2Go and car sharing, car hailing and ridesharing, connected parking, and advanced driver assistance systems
Includes review questions and exercises at the end of each chapter
The insights offered by this practical guide will be of great value to graduate students, academic researchers and professionals in industry seeking to learn about the advanced methodologies in automotive connectivity and cybersecurity.