Professional Documents
Culture Documents
The Way Internet of Things is Transforming the Automotive Industry
The Way Internet of Things is Transforming the Automotive Industry
Contents Pages
5.0 References 16 - 18
1
1.0 Introduction
The theory of the Internet of Things is a part of our time, and the current work
strives to demonstrate its primary uses in many aspects of our lives, as well as the key
benefits, development patterns, issues, and challenges that must be handled. IoT is defined
as "a global network infrastructure that connects physical and virtual objects through the
use of data capture and communication capabilities." This infrastructure encompasses
current and future Internet and network improvements. It will provide particular item
recognition, detecting, and connection capabilities as the foundation for the creation of
autonomous cooperative services and applications (Angelova et al., 2017). These will be
distinguished by a high level of autonomous data collecting, event transfer, network
connectivity, and interoperability.
Aside from the media, music, services, computer, textile, and software industries, the
automotive industry is also embracing the Internet of Things in order to become one of the
2
world's largest economic contributing industries. The adoption of IoT into the automotive
industry has given global car manufacturers and consumers new options. With use in both
the industrial and commercial spheres, IoT in automotive manufacturing has emerged as an
essential platform for a wide range of multifunctional applications. The worldwide
automotive market has been significantly impacted by the applications of the Internet of
Things, ranging from automated transportation systems to linked autos.
That impact gave us a great influence to choose this theme and make an in-depth
study on the application of the Internet of Things in the automotive industry. However, every
advancement created for the purpose of simplifying and increasing productivity inevitably
leads to the emergence of some issues. In the meantime, we have identified several issues
in the study of this report such as cybersecurity risks, data privacy concerns and complexity
of integration. We have also proposed several solutions to overcome every issue that arises
related to how the Internet of Things is transforming the automotive industry.
3
2.0 Issues of Internet of Things in the Automotive Industry
The Internet of Things (IoT) has revolutionised vehicle connection and functionality
in the automobile sector, and also poses serious cybersecurity dangers. Vehicles are
becoming linked systems that can communicate with other devices and networks rather than
being separate mechanical entities due to the Internet of Things. While improving features
like autonomous driving, remote diagnostics, and real-time navigation, this connection also
exposes cars to cyberattacks. These flaws might allow hackers to access car control systems
without authorization and pose a serious risk to public safety. Cybercriminals could, for
example, alter engine, steering, or brake systems, resulting in disastrous mishaps. According
to studies, the growing number of IoT devices in cars increases the attack surface, hence
automakers must give cybersecurity top priority (Checkoway et al., 2011).
4
Improving customer education and awareness is also essential for improving
automobile cybersecurity. The possible cyber hazards connected to the Internet of Things
(IoT) technologies in automobiles are frequently unknown to vehicle owners. Prioritising
customer education on safe habits, such using strong passwords, upgrading software often,
and staying away from unreliable third-party apps, should be the top priority for
manufacturers. The industry may improve vehicle cybersecurity defences against
cyberattacks by promoting a cybersecurity-aware culture. In conclusion, even if the
automotive sector benefits greatly from IoT, it is critical to address the cybersecurity threats
it poses to ensure the dependability and safety of linked cars.
It keeps growing, this responsibility for wage war against data privacy in the
automobile industry to track the usage of such technologies. When cars become connected
with one another more and more information will be generated which includes personal
driving acts along with sensitive locations visited. The manufacturers and other service
providers are keen on having this kind of data since it is also important for them while cyber
attackers wish to lay hands on it too>> By default, unauthorised access or misuse of these
details would only put privacy belonging to vehicle owners as well as operators at risk
thereby leading towards severe outcomes that may go beyond imagination.
One particular such issue is the fact that there are no standards for how information
should be collected, stored or shared among those involved in the industry. Manufacturers
and providers may gather data without asking for the car owner’s permission and then share
it with others, thereby violating his or her right to privacy. Moreover, this can also happen
when they give out such details to third-party suppliers, insurance companies or even
government departments which would lead to an unauthorised access as well as misuse of
personal information (Sfar, Zied and Challal, 2017). For instance, according to the United
States Government Accountability Office report 2017 based on their research findings some
automobile makers have been found to take advantage of loophole; allowing them access to
certain private records without seeking approval from respective owners.
Another concern is that among the connected cars are those that are most
vulnerable to cyber threats. Through vulnerabilities found in the software and hardware of
5
the car, they could obtain sensitive data that associates with location, driving patterns, and
personal information, potentially leading to identity theft, financial fraud, and, in the worst
case scenario, physical harm.. In addition, interconnecting IoT devices with other systems
within the context of the home and city causes an expansion of the attack surface, making
the attainment of data privacy and security more difficult.
To address all the problems mentioned above; motor vehicle manufacturers and
those offering car services must take these problems seriously into account, which involves
among other things putting in place data protection mechanisms that use encryption
methods, storing it securely and handling it with restricted access rights imposed. Besides,
they have to obtain clear consent from owners before gathering or sharing any information
related to their vehicles. Governments as well as other relevant bodies should also be
actively involved in developing regulations concerning privacy protection and security
standards within the automotive industry.
Thus we see the automotive industry which is IoT enabled has a big problem with
privacy of information, this means that car manufacturers and service providers must ensure
they take measures on data security & privacy so as not to expose any personal data about
the owners or drivers. To achieve this goal it would be necessary for all relevant
stakeholders in the field such as governments around different countries together with their
respective regulatory bodies come together and develop standard set rules concerning
safeguarding against unauthorised access or accidental disclosure of sensitive information
stored within electronic devices utilised for controlling vehicles.
Many organisations still rely on their legacy systems, which prove to be vital in
day-to-day operations. Having been around for years, mainly while containing the most
valuable data and business logic which supports organisational success, these systems fall
under the legacy category. All the same, these systems are hard to flexibly change or
reconfigure, making it difficult to be integrated with any new technologies, including IoT
devices.
6
Legacy systems often feature technology far past its prime and accordingly are hard
to integrate with modern IoT systems. "70% of organisations consider legacy systems to be
a major obstacle to digital transformation," according to McKinsey. This is because usually
the legacy apparatus may not have proper APIs, data formats, and communication protocols
set up to allow it to integrate seamlessly with Internet of Things devices. Legacy systems
have been identified as both costly and time-consuming to replace. It is estimated that "the
cost of replacing legacy systems can be 5-10 times higher than the cost of maintaining
them" (McKinsey, 2018). The big challenge in integrating legacy systems with IoT devices is
the organisation's agility in responding to the changes in their market conditions. It will
make organisations less competitive and less agile, making it hard to persevere and
outperform between other competitors in the industry.
The problem of integrating the IoT with legacy systems is due to the deep
dependencies that have accumulated over the years. This makes it difficult to fully
understand and determine the best way to integrate such systems with IoT devices and
platforms. Legacy systems usually have a web of interdependent, interconnected
components, making it quite a daunting task to understand the inner dependencies and,
eventually, the best integrative route with IoT devices and platforms wherein the
independent components communicate and exchange information (IEEE, 2019). These deep
dependencies can take the form of tightly coupled components, custom or proprietary
protocols, legacy data formats, or complex business logic. Additionally, custom or proprietary
protocols may prevent interoperability with other devices and platforms composing IoT,
which normally follow standardised protocols (IEEE, 2019).
The amount of data that is being collected in cars has greatly increased with the
integration of IoT, including sensitive personal data about drivers and passengers. This
information is useful for increasing safety, providing individualised services, and optimising
vehicle performance. But it also brings up important moral questions about consent, privacy,
and possible information misuse. IoT-enabled cars collect data that can be misused if
improperly managed, such as location history, driving habits, and even biometric data (Sicari
et al., 2015).
7
The ownership and control of data is a significant ethical concern. Although drivers
may believe they are the owners of the data that their cars produce, this is frequently not
true. It's common for manufacturers, insurers, and outside service providers to assert their
rights on using this data sometimes even without the vehicle owner's express consent. This
may result in circumstances where data are used for uses other than those for which the
user has given consent, such as targeted advertising or data sales for secondary purposes
(Brey, 2005). Trust can be damaged and ethical transgressions can result from a lack of
transparency and control over personal data.
Furthermore, using data for behavioural analysis and profiling may lead to bias and
discrimination. For instance, insurance companies may unfairly charge higher premium
based on driving habits associated with specifics demographic groups when they use
telematics data to analyse risk profiles. Similarly, when law enforcement uses vehicle data
for surveillance, concerns are raised about privacy infringement and potential abuse of
power (Gasser, 2004).
Strong data governance frameworks that put user consent and transparency first are
crucial for reducing these ethical concerns. Clear policies defining the goals of data
collection, its intended use, and who has access to it should be put in place by automakers.
Regulatory agencies must also create and implement legislation that guarantees ethical data
usage and protects consumer privacy. In order to promote a more moral approach to data
management, these regulations ought to require that users have control over their data,
including the right to opt-out and request that their data be deleted (Langheinrich, 2001).
The swift advancement of IoT technology in the automobile industry has given rise
to noteworthy obstacles concerning standardisation and compatibility. Car IoT systems
consist of the multitude of networked devices that follow different standards and protocol.
The ability of these systems to interact with one another is essential to the proper operation
of IoT enabled vehicles, but a key barrier is the lack of international standards
(Bandyopadhyay & Sen, 2011).
8
The IoT ecosystem's fragmented structure is one of the primary obstacles. There are
incompatibilities because different manufacturers create proprietary systems that are suited
to their particular requirement. The automobile industry's potential for innovation and
all-encompassing IoT solutions were restricted by this fragmentation, which hinders various
systems from collaborating effectively, making it more difficult to integrate third-party
devices (Gubbi et al., 2013).
9
3.0 Proposed Solutions
Addressing cybersecurity risks and data privacy issues in the automotive IoT
ecosystem requires a comprehensive cybersecurity framework. This framework should
incorporate progressed encryption strategies, secure communication conventions, frequent
security updates, and robust data governance guidelines to recognize and moderate any
conceivable vulnerabilities (Audits, 2024). Strict cybersecurity measures are required to
ensure against unapproved get and cyber-attacks due to the connected nature of the
automotive IoT biological system. Automakers should deploy secure communication
protocols and end-to-end encryption to prevent unwanted access and data breaches.
End-to-end encryption ensures the data travelling between car components and exterior
systems is safe and incoherent by programmers. Secure communication conventions like
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) encourage levels of security
by ensuring that data sent between computers is scrambled and secure from interception
(Zimperium, 2024). Customary security appraisals and opportune software overhauls are
pivotal to quickly settling and rapidly resolving any vulnerabilities. To promptly remedy any
vulnerabilities, it is essential to do frequent security audits and update software at the
appropriate time. While frequent software updates guarantee that any newly disclosed
vulnerabilities are fixed rapidly to avoid exploitation, security audits entail systematic reviews
of car systems and networks to find and repair security problems.
10
McKinsey & Company research that states that "security needs to be baked into the vehicle's
architecture from the beginning" (McKinsey & Company, 2019).
A concrete and viable solution to address ethical contemplations when utilising data
in the automotive IoT ecosystem is to implement a comprehensive and transparent data
governance policy. These arrangements should be outlined to guarantee that information is
collected, put away and utilised dependably, that a person's data protection rights are
regarded, and that more extensive societal concerns are considered (Cheryl & Ng, 2022).
These arrangements incorporate short-term and long-term strategies to supply prompt
protection and maintain moral data practices over time. In the short term, automakers can
begin to develop and enforce clear and transparent data management policies. This
approach ought to set out the reason for the data collected, the data handling strategy and
the data exchange protocol. Transparency is imperative so that users can know how their
data is utilised and who has access to it (Rushda, 2023). For example, manufacturers must
advise consumers when their driving behaviour or area history will be used for product
enhancement or marketing purposes. This transparency builds trust between users and
producers because users are more likely to agree to data collection if they understand and
11
agree with the purpose of data collection (Alzaidi & Agag, 2022).
Thus, comprehensive and transparent data governance policies are essential for
addressing the ethical considerations associated with the proliferation of IoT technology in
vehicles (Karale, 2021). By implementing specific measures, manufacturers may guarantee
ethical data processing, uphold individual privacy rights, and ease more considerable social
worries. In addition to offering customers instant protection, this approach creates a
long-term, sustainable framework for moral data practices backed by regulatory monitoring
and cutting-edge privacy-enhancing technology.
12
3.3 Data Standardization: Develop and Enforce Data Standardisation Policies
13
standards ensure that new systems may interact smoothly with older ones, maintaining data
integrity and reducing operational disruption. This flexibility enables businesses to create,
test new technologies, and respond quickly to market demands without being constrained by
rigid integration requirements.
14
4.0 Limitation and Conclusion
The findings of this study have to be seen in light of some limitations. The first
constraint that researchers encountered while conducting this case study was the time and
cost of a limited interview session. We are aware of the importance of using primary data in
a study to make it more professional and authentic. We should also have an interview with a
representative of an automotive company that is applying the Internet of Things (IoT).
Because of these constraints, we agreed with one vote to rely entirely on secondary data
such as the article reference of the journal on the website.
As a conclusion, every technology naturally has risks and it depends on how we use
them for the advancement of industry. Despite some issues, the transformation of the
Internet of Things (IoT) in the automotive industry has proved to guarantee consumer
satisfaction alongside efforts to the industrial revolution 4.0 before the human revolution
works with advanced technology and AI-driven robots to improve processes at work which is
known as Industry Revolution 5.0 . Thus, these IoT applications need to be applied in a
modest way for common progress, especially among companies in the automotive industry
in the future.
15
5.0 References
Alzaidi, M. S., & Agag, G. (2022). The role of trust and privacy concerns in using social
media for e-retail services: The moderating role of COVID-19. Journal of Retailing
and Consumer Services, 68, 103042.
https://doi.org/10.1016/j.jretconser.2022.103042
Angelova, N., Kiryakova, G., & Yordanova, L. (2017). The Great Impact of Internet of Things
on Business. Trakia Journal of Sciences, 15 (Suppl.1), 406–412.
https://doi.org/10.15547/tjs.2017.s.01.068
Audits, C. (2024, March 2). What are the cybersecurity considerations for automotive IoT?
ControlAudits.com Cyber Security.
https://www.controlaudits.com/blog/what-are-the-cybersecurity-considerations-for-au
tomotive-iot/
Challal, Y., Noura, H., & Gharout, S. (2017). A systematic and cognitive vision for IoT
security: A case study of military live simulation and security challenges. In Proc.
2017 international conference on smart, monitored and controlled cities (SM2C),
Sfax, Tunisia, 17–19 Feb. 2017 https://doi.org/10.1109/sm2c.2017.807182
Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., ... & Koscher,
K. (2011). Comprehensive experimental analyses of automotive attack surfaces.
Proceedings of the 20th USENIX Security Symposium, 447-462.
https://www.usenix.org/legacy/events/sec11/tech/full_papers/Checkoway.pdf
Cheryl, B., & Ng, B. (2022). Protecting the unprotected consumer data in Internet of Things:
Current scenario of data Governance in Malaysia. Sustainability, 14(16), 9893.
https://doi.org/10.3390/su14169893
16
For internal policies European Parliament, Industry 4.0, 24. (2006, February). Policy Dept A:
Econ & Sci. Policy, Directorate-Gen.
https://www.europarl.europa.eu/RegData/etudes/STUD/2016/570007/IPOL_STU(201
6)570007_EN.pdf
Gartner (2019), Data Governance Institute (DGI). (2021). "Data Governance Framework the
Home - the Data Governance Institute. https://datagovernance.com/
Government Accountability Office (GAO). (2017). Vehicle cybersecurity: DOT and industry
have efforts underway, but DOT needs to define its role in responding to a real-world
attack. GAO-17-645. https://www.gao.gov/products/GAO-17-645
Karale, A. (2021b). The challenges of IoT addressing security, ethics, privacy, and laws.
Internet of Things, 15, 100420. https://doi.org/10.1016/j.iot.2021.100420
Lukić, D. (2023, July 17). Data Ethics: Safeguarding privacy and ensuring responsible data
practices - DATAVERSITY. DATAVERSITY.
https://www.dataversity.net/data-ethics-safeguarding-privacy-and-ensuring-responsib
le-data-practices/
Micu, I. (2024, May 21). Automotive Cyber Security: Framework for your cyber security.
Q_PERIOR AG. https://wwb.wavestone.com/en/automotive-cyber-security/
Montani, C. (2024, January 8). La cyber security nel settore Automotive lo scenario, i rischi e
le sfide future. Safecore.
https://safecore.io/en/industries/la-cyber-security-nel-settore-automotive-lo-scenario-
i-rischi-e-le-sfide-future/
Bloomberg, J. (2019, October 22). The IoT's Biggest Challenge: Integrating with Legacy
17
Systems. Bloomberg.
https://www.bloomberg.com/professional/blog/the-iot-s-biggest-challenge-integrating
-with-legacy-systems/
Praveen. (2023, November 20). IoT security: Safeguarding critical networks against digital
assaults. Cybersecurity Exchange.
https://www.eccouncil.org/cybersecurity-exchange/network-security/guide-to-iot-secu
rity-protecting-critical-networks/
Sfar, A. R., Zied, C., & Challal, Y. (2017). A systematic and cognitive vision for IoT security: A
case study of military live simulation and security challenges. Journal of Big Data,
6(1), 111. https://doi.org/10.1186/s40537-019-0268-2
What is a Data Governance Framework? Examples & Models | Twilio Segment. Segment.
https://segment.com/data-hub/data-governance/framework/
Wookey, R., & Hryciw, J. (2018). "Data Quality and Standardization." Journal of Data
Management, 24(3), 145-156.
https://www.researchgate.net/publication/358586657_Data_Quality_-_Concepts_and
_Problems
Zimperium. (2024, May 31). Secure Sockets Layer (SSL): Safeguarding mobile apps.
https://www.zimperium.com/glossary/secure-sockets-layer-ssl
18