The Latest In Cyber Security

Our Take On News In The Cyber Security / Connected Car Space

When Cars Talk: An overview of V2X Technologies

Cars are no longer self-contained mechanical modes of transportation. Thanks to added connectivity, they are interactive members of their environment, with the ability to communicate with other vehicles, surrounding infrastructure and more. This subset of connected car features are referred to as Vehicle to Everything (V2X) systems.
V2X systems require high-speed connectivity to implement the real-time functionalities they seek to implement. This connectivity is provided by DSRC, or Dedicated Short-Range Communications. DSRC uses a protocol similar to the IEEE Wi-Fi standard, using 75 MHz of spectrum in the 5.9 GHz band exclusively for intelligent transportation systems. These systems broadcast useful data about their host vehicle including GPS position, path data, velocity, future paths, and more. Broadcast over 300 meters away at a frequency of 10 Hz, this information can be picked up by other vehicles and connected infrastructure to implement advanced vehicle safety and convenience-enhancing systems.
Vehicle to Vehicle (V2V) systems let vehicles communicate with one another wirelessly in real time, allowing them to inform their drivers of upcoming threats and obstacles. This leads to improved road safety, as cars using DSRC can be alerted of emergency vehicles coming around a corner, cars travelling in their blind spots, or hidden cars occupying a pass lane. Even in a car driven by a human, notification of these conditions can greatly reduce the risk of an accident or other incident. In cars with autonomous driving capabilities, V2V communication can be used to implement efficient platooning, improving mileage and trip time for all cars in the platoon.
Vehicle to Infrastructure (V2I) technology can be used in similar ways to V2V, increasing road safety and enhancing driver experience. Traffic signals can broadcast their color and how much time remains before they change – giving drivers ample time to adjust their behavior before approaching an intersection. Parking areas can advertise open parking spots to vehicles over DSRC, reducing time wasted roaming a parking lot to find an empty space.
Apart from V2V and V2I systems, there exists another classification of systems called Vehicle to Pedestrian (V2P). These systems involve interacting with pedestrians around a vehicle, alerting them via smartphone notification of a passing emergency vehicle, the arrival of their rideshare, or where their vehicle is located.
These technologies are a clear example of the benefit to be gained from a transportation environment occupied by connected vehicles. Allowing vehicles to interact with their surroundings and users wirelessly and in real time improves both the safety and the quality of our roads and other transportation infrastructure. As vehicles move closer to perfect autonomy, the value of their ability to communicate will only increase. As cutting-edge technologies like 5G come to fruition, the scale on which these applications can be applied will widen drastically, and new ways to improve transportation will make their way into the world.

On-the-Road Improvements: The Value of Aftermarket Connectivity Solutions for Automobiles

The age of highly connected vehicles brings with it an armada of benefits, making use of the vehicles’ connectivity to share environmental and traffic information between cars, platooning services, and other cooperative systems that enhance the driving experience. Many of these systems also improve the safety of the roads, with collision detection and prediction systems being a key selling point of connected and autonomous vehicles.

From cars anonymously reporting what route they take in a given direction to later be used by another passenger to pick a quicker route to alerting vehicles in the area of an accident down a certain road, there is a lot of benefit to be obtained from being part of the grid. The reality is, however, that many of these systems are developed with a stringent minimum level of connectivity required in the vehicle – a level not met by many vehicles on the road today. This results in legacy vehicles becoming blind spots in a transportation environment thriving off data it gets from vehicles as they make their way throughout a city.

As the introduction of connected cars is still in its early stages, the majority of vehicles on the road will be legacy, unconnected ones. The ability for a vehicle to have internet access on the road is largely thanks to embedded telematics modules that use cellular networks to connect vehicles to cloud-based services. Services that don’t operate in real time, such as mileage statistics, diagnostic information, and over-the-air software updates can be accomplished using a home’s Wi-Fi connection, however most cars on the road today lack even this technology, much less dedicated SIM cards to provide data over cellular networks. The aforementioned benefits are ready to make their impression on society; however, the number of non-participating vehicles limits their effectiveness. For services like traffic prediction that rely on data aggregated from large numbers of vehicles, a low participation rate results in an ineffective system, putting the technology to waste. How then, can these innovations find their way into today’s society? Enter, after-market connectivity solutions.

The automotive after-market is a booming industry set to see a total net worth of close to $300 Billion by 2020, and added connectivity is a large driver of this trend towards growth. Automotive suppliers already offer advanced telematics modules that can seamlessly integrate to any vehicle, with many talking directly to the CAN bus to receive fuel economy information, data on driving patterns, vehicle diagnostics, and other data to be used in big data analytics. Many of these modules include over-the-air update capability, guaranteeing that they remain up to date with any innovations that take place in the connected automotive industry. Rather than invest several thousands of dollars on a new vehicle, drivers have the ability to purchase a new head unit or telematics box for a fraction of the price, letting them share the benefits as well as improve the quality of the services offered. Some connectivity add-ons don’t even require such an intrusive installation and can just be plugged into the OBD-II diagnostics port, offering vehicle location services, driving logs, and more.

Some providers offer connectivity solutions through OBD-II dongles that interact with the user’s smartphone. The phone becomes a high-functioning remote control for the car, giving access to remote features as well as data analytics. Others provide aftermarket devices that fill in the connectivity holes found in most mid-high grade vehicles on the road today such as Bluetooth cellphone connectivity and tire safety monitoring devices. Finally, several firms offer advanced telematics in the form of universally-adaptable head units, giving users cutting-edge connectivity for the fraction of the cost of a new car. These units communicate directly with In-Vehicle Networks such as CAN without use of the OBD-II port, giving them more customization options for each individual vehicle.

For users not willing or able to invest in a top-of the line connected vehicle, the aftermarket is a valuable source for the ability to participate in these user-experience and safety-oriented systems. Along with the outfitting of legacy vehicles with cutting-edge connectivity, however, is the concern of cyber security for those vehicles. Every new connection channel added to a vehicle is a potential attack vector, one that can lead to a loss of personal data, property, or life. The need for security alongside such connectivity cannot be ignored, and as such security measures that can co-exist with aftermarket add-ons are the only feasible solution.

As the features offered as a result of this connectivity increase, so will the value one gains from having a vehicle capable of integrating with them. The need for cars to be able to be retrofitted with connectivity options cannot be understated in the effort to improve road safety through connectivity-based strategies.

Meet Trillium at RSA 2018

Meet Trillium at the RSA conference in San Fransisco, April 16th to April 20th. Our executive team is on site to collaborate with our partners and customers in the automotive, data management, and cyber-security sectors.

To schedule a private meeting or demonstration, please don’t hesitate to contact us at adrian.sossna@trilliumcyber.com

Trillium CEO David M. Uze Speaks on Autonomous Car Hacking

On April 5th, 2018, Trillium Secure’s CEO David M. Uze got together with Bryan Curtis and Paul Allen to discuss the still under-represented issue that is connected vehicle cyber-security. The interview, which can be found on Bloomberg Terminal, brings attention to the need for cyber-security in connected and autonomous vehicles, both at the consumer and fleet level. We’re pleased to see the Bloomberg community interested in the cyber-security of the next generation of vehicles, and we hope to see their continued support in our endeavors along that path.

Victory at CyberTech Asia!

During the CyberTech Asia conference held from March 26th-March 28th, Trillium Secure, Inc. was named the winner of the event’s startup competition. CyberTech is the world’s premier exhibition of cutting-edge cyber technologies, and Trillium is honored by the recognition received. We are looking forward to the Tokyo edition, and we hope to see continued support from the CyberTech community and our partners.

Cybertechasia2

Cybertechasia3

Cybertechasia4

Trillium at Cybertech Asia in Singapore, March 27th-28th

From March 27th-28th, Trillium Secure will be attending CyberTech Asia at Suntec in Singapore. We are looking forward to meeting our customers and partners in the Asian automotive cybersecurity and data analytics sectors. Trillium’s manager of strategic business development, Adrian Sossna, will be giving a live on-stage presentation of Trillium’s technology and cyber security strategy.

To schedule a private meeting or demonstration appointment, please contact events@trilliumcyber.com

Trillium at Automotive Cyber Security – Detroit, March 26th-28th

Next week, March 26th-28th in Novi, Michigan, Trillium will be attending the Automotive Cyber Security – Detroit conference. In addition to meeting our partners and customers in the Metro Detroit area, Trillium executive Zoran Kehler will be leading a workshop on vehicle cyber security essentials during the pre-summit workshop day. Furthermore, Trillium CEO David M. Uze will partake in a panel discussing data privacy and safety in connected vehicles with other leading experts in the automotive cyber security field.

To schedule a private meeting or demonstration appointment, please contact events@trilliumcyber.com

Trillium at NDIA Cyber in Defense

This week the Trillium team had the honor of sponsoring the National Defense Industrial Association’s Cybersecurity: Defense Sector Summit in Troy, Michigan. We are grateful for the opportunity to be part of such an event and would like to extend our thanks to the customers and partners that showed interest in Trillium during these past few days. We look forward to seeing the continued support of the defense community in our endeavors to secure the future of IoT technology.

 

Trillium on Guard: Cyber-security Defense Sector Summit

This week, Trillium will be attending the National Defense Industrial Association’s Defense Sector Summit for Cyber Security in Troy, Michigan. As a sponsor of the event, Trillium recognizes the immense role that adaptive cyber security systems play in the defense sector.

Trillium has developed a complete, multilayered platform for guarding private and military vehicles against cyber-attacks, protecting attack surfaces and securely harvesting data from vehicles and fleets. The secured data is then aggregated and analyzed for consumption in multiple layers of downstream value-added services like vehicle security, digital forensics, secure mission-critical tactical messaging, preventative/proactive maintenance, telematic communications, V2X, or mesh tactical networking among others.

To this end, Trillium is looking forward to meeting partners in the defense space to further apply our military-grade cyber security solutions throughout the defense environment.

To schedule an appointment and/or demonstration, please don’t hesitate to contact us at events@trilliumcyber.com

Trillium Takes Home the Middleweight Championship at “Get in the Ring” Osaka!

Trillium is proud to announce that it has emerged victorious in the Japan segment of the global “Get in the Ring” challenge. The event, consisting of a long series of intense “pitch battles” in which two rivals battle for the favor of the judges, saw Trillium emerge as the final victor in the middleweight division. This designation marks Trillium as the top mid-stage start-up in Japan, placing it in the “Get in the Ring” hall of fame forever. The challenge sees over 12 thousand applicant startups globally, and as the victor of Japan’s Middleweight division, Trillium is honored to have the chance to attend the world finals in Portugal in May, and we hope to see continued support for our positively disruptive security solutions and business strategies.

28279159_1836265029727041_6717460773371149807_n 28277351_1836233303063547_1651808981266311083_n 28468334_1836233363063541_4535529910306621720_n 28279727_1836233159730228_8640264592701479746_n 28576955_1836233076396903_1266181923500599730_n 28335896_1836233639730180_1594753911931701765_o

CONTACT US

CONTACT US TO LEARN MORE