Presentation is loading. Please wait.

Presentation is loading. Please wait.

Connected and Autonomous Vehicles Supply Chain Security

Similar presentations


Presentation on theme: "Connected and Autonomous Vehicles Supply Chain Security"— Presentation transcript:

1 Connected and Autonomous Vehicles Supply Chain Security
Dr Paul Martin CTO

2 Contents A View of the Supply Chain Technical Issues Commercial Issues
Risk Management

3 Contents A View of the Supply Chain Technical Issues Commercial Issues
Risk Management

4 Traditional Supply Chain
OEM Tier 1 Tier 2

5 Additions to Supply Chain for CAV
Traditional Supply Chain Plus Communication Network Operators Mobile Network Operators Public Wifi networks Satellite providers Other Vehicles (V2V) Data Providers and Acquirers Vehicle is now one part of a wider commercially-oriented system

6 Contents A View of the Supply Chain Technical Issues Commercial Issues
Risk Management

7 Examples Fuel Economy enhancement
Predictive Powertrain Control (Setra) Uses GPS plus map to interact with the auto gearbox and cruise control to predictively change gear Claimed 4% improvement in fuel economy Also used on car automatic gearboxes Assumptions GPS is accurate and available Map is up to date and valid Example where external services improve the mechanical performance of a vehicle

8 Examples Securing the Chain of Supply
How do I verify that the vehicle rolling off the production line has the correct hardware and correct software? Recognise counterfeit or incorrect components Recognise incorrect or modified software This has to span the supply chain and work across worldwide design and manufacturing centres

9 Examples Securing the Vehicle after Supply
As bugs and vulnerabilities are discovered, how do they get fixed? How does a driver/passenger know their vehicle is cyber secure? How is data from the extended CAV supply chain verified? OEM, Tier1, Tier2 could cooperate to fix Over The Air (OTA) software download helps Who is responsible and who is paying? Does government need to legislate (Cyber MOT?)

10 Examples Securing the Vehicle after Supply

11 Contents A View of the Supply Chain Technical Issues Commercial Issues
Risk Management

12 Vested Interests Car OEMs Truck OEMs Intelligent Traffic System OEMs
Emergency Services Insurance Companies Legal Industry Commerce Government Departments International Standardisation

13 Commercial Issues – Supply Chain
Traditional Supply Chain (Tier1s and Tier2s to OEMs) Business is very competitive Global Competition Sometimes Dutch auctions used Result Tier1 and Tier2 suppliers forced to exploit aggressive cost saving Innovation very difficult Market discourages future proofing capability

14 The Importance of Data Commercial
Global Mobile Internet Advertising Revenue $8.76 Bn $17.96 Bn (Google 50%, Facebook 17.5%) $31.45 Bn Source: eMarketing Autonomous vehicles can increase advertising revenue

15 Data Innovation Value will be created through data innovation Today
Reduced insurance premiums through driver behaviour characterisation Improved insurance fraud prevention using vehicle data Future Safety improvements through cooperation between CAVs Location sensitive marketing Others…. Source: Redtail Telematics

16 Contents A View of the Supply Chain Technical Issues Commercial Issues
Risk Management

17 Risk Management Risks Design Assumptions Answer
The XXX system is always working-no exception handling needed Examples GNSS jamming GNSS spoofing GPS on 26th Jan 2016 Answer Increased rigour in design reviews Ensure design reviews cover external interface vulnerabilities

18 Risk Management Risks Threats – Commercial
Vehicles and their cargo are high value items in society and attract attention Transport and vehicle data is increasing in commercial value and is attracting attention The benefits of CAV will improve traffic flow. Disrupting CAV technology operation will have an effect much larger than today’s traffic jams Answer – ensure that the commercial value of the threat is reviewed regularly and appropriate risk reduction taken

19 Exceptions What happens when things go wrong?
What if this was caused by a malicious cyber attack? Economic gain - eg extortion Impact - eg terrorism For “fun”

20 An Approach to Assurance
Which model should be adopted? N lies between 0.05 and 3.1 but what value? Incidents likely to be rare? National/International importance? Corporate responsibility? Personal (driver) responsibility? Government/International regulation? Liability – Insurance models? Who pays for the security? Deaths per billion passenger kilometres Air: 0.05 Bus: 0.4 Rail: 0.6 Van: 1.2 Water: 2.6 Car: 3.1 Space Shuttle: 16.2 Bicycle: 44.6 Foot: 54.2 Motorcycle: 108.9

21 Impact on the Supply Chain
Balance to be struck Perceived threat Available investment to counter threat Balance re-evaluated New model design New feature development Changing threat landscape Standards iteration Time Risk Counter

22 Thank You Dr Paul Martin CTO Plextek Consulting

23 World class Products, Systems and Services
Innovative, Independent, Entrepreneurial Based near Cambridge, UK Part of Plextek Group Privately owned - established 1989 200 staff Markets Automotive and Transport Defence and Security Healthcare IOT Wearable Devices Key messages: We innovate to give clients a competitive advantage Not just to make our design services more attractive We create products that customers desire Not just products that work We deliver quality products to meet market demand Not just to fill a hole in the client’s capability


Download ppt "Connected and Autonomous Vehicles Supply Chain Security"

Similar presentations


Ads by Google