Getting under the hood of the Jeep hack, and other connected car vulnerabilities

26 November 2015
Report type: Research Note
Author(s): Godfrey Chua
Keywords: M2M, machine-to-machine, IoT, Internet of Things, IoT regulation, connected car, security, white hat hackers
Number of Pages: 5

The connected car represents one of the more high profile use cases in IoT today. For service providers (SPs), especially those in North America and Europe, it represents one of their fastest growing businesses. As the connected car continues to inflect however, a variety of security issues have emerged around it, most prominently illustrated by the recent hacking of a Jeep Cherokee vehicle. These issues span a wide range of complexity and implications for the car owner. They have also received significant media attention in recent months.

This Research Note examines the challenges of securing the connected car and the near term implications this may have on regulation, consumer adoption and the industry itself.

Keywords: M2M, machine-to-machine, IoT, Internet of Things, IoT regulation, connected car, security, white hat hackers

Companies mentioned in this report: BMW, Fiat Chrysler Automobiles (FCA), General Motors (GM), Jeep, OnStar

Download PDF > Log in or subscribe to this Research Stream, please see our Advisory Service.
quick links >