ADAS & Autonomous Vehicle International
  • News
    • A-L
      • ADAS
      • AI & Sensor Fusion
      • Business
      • Connectivity
      • Cybersecurity
      • Expo
      • HMI
      • Last-mile delivery
      • Legislation & Standards
      • Localization/GNSS
    • M-Z
      • Mapping
      • Off-Highway
      • Robo-Taxis
      • Sensors
      • Shared Mobility
      • Safety
      • Simulation
      • Testing
      • Trucks
      • V2X
  • Features
  • Online Magazines
    • January 2025
    • September 2024
    • April 2024
    • January 2024
    • Subscribe
  • Opinion
  • Videos
  • Supplier Spotlight
  • Events
LinkedIn Facebook Twitter
  • Automotive Interiors
  • Automotive Testing
  • Automotive Powertrain
  • Professional Motorsport
  • Tire Technology
  • Media Pack
    • 2026 Media Pack
    • 2025 Media Pack
LinkedIn Facebook
Subscribe
ADAS & Autonomous Vehicle International
  • News
      • ADAS
      • AI & Sensor Fusion
      • Business
      • Connectivity
      • Cybersecurity
      • Expo
      • HMI
      • Last-mile delivery
      • Legislation & Standards
      • Localization/GNSS
      • Mapping
      • Off-Highway
      • Robo-Taxis
      • Sensors
      • Shared Mobility
      • Safety
      • Simulation
      • Testing
      • Trucks
      • V2X
  • Features
  • Online Magazines
    1. April 2025
    2. January 2025
    3. September 2024
    4. April 2024
    5. January 2024
    6. Subscribe
    Featured
    April 15, 2025

    In this Issue – April 2025

    Online Magazines By Web Team
    Recent

    In this Issue – April 2025

    April 15, 2025

    In this Issue – January 2025

    November 29, 2024

    In this Issue – September 2024

    July 23, 2024
  • Opinion
  • Videos
  • Supplier Spotlight
  • Events
  • Awards
    • About
    • 2025 winners
    • Judges
  • Webinars
LinkedIn Facebook
Subscribe
ADAS & Autonomous Vehicle International
Features

Developing the next generation of transport solutions

Dan SymondsBy Dan SymondsOctober 16, 20195 Mins Read
Prof Carsten Maple of the University of Warwick and specialist in cyber-security
Share
LinkedIn Twitter Facebook Email

Carsten Maple, professor of cyber systems engineering at Warwick Manufacturing Group (WMG), University of Warwick, UK, looks at some of the obstacles faced when creating a connected mobility network, and how they might be solved

The concept of widespread connected and automated mobility (CAM) is quickly becoming something of a reality thanks to a national and global push to develop the next generation of transport solutions. An integral part of the UK government’s Road to Zero strategy, CAM is expected to become widely deployed across the nation and will be a key driver behind ambitions to eventually achieve zero accidents, zero congestion and zero emissions on the road.

Evolving into a sector that is predicted to be worth £907bn (US$1.1tn) by 2035, CAM has also conjured new societal and technological challenges that need to be considered. At WMG, University of Warwick, we’ve been tackling some of these challenges by focusing on how to improve security, privacy and safety in connected and automated vehicles from a cyber-perspective, conducting rigorous testing and exploring innovative technologies in a real-world environment.

Overcoming public anxiety
It’s not surprising to see that earning the public’s trust and subsequently reducing anxiety around this new form of travel is somewhat of a barrier to widespread adoption. However, our work to improve the privacy and safety of connected and automated vehicles will help to demonstrate the scalability and wider benefits of this new technology.

Our real-world testing considers how vehicles will connect with each other, as well as with the roadside infrastructure, and also how parts of this infrastructure can be intelligent in the ways they share information with each other. Our work considers how this connectivity informs the automated activity of vehicles and more importantly influences how we expect vehicles to react when a data breach is attempted. For example, if a hacker manages to access the data in a vehicle or vehicular system, how do we safeguard against compromising the vehicle’s identity and history? How do we protect the locations the vehicle has visited? Or, indeed, how do we control what the vehicle does next in terms of its interactions with the roadside and other vehicles following a breach?

Transferring information within the roadside infrastructure
When a vehicle is traveling down a road it may meet multiple vehicles in a short space of time. In order to check the identity of these vehicles, the key of the other vehicle needs to be verified. However, having to check this in-cloud infrastructure creates additional communication overhead, increasing the time before the vehicle receives the necessary verification. Instead, through the use of ‘Decentralized PKI’, vehicles can verify messages much faster as the key information is distributed over edge infrastructure that sits next to the road. Essentially this means that the roadside infrastructure can communicate with each other and directly transfer shared information, such as traffic levels, vehicle speed and direction. This eliminates the reliance on cloud servers, saving communication time.

Protecting a vehicle’s identity
For a vehicle to send and receive these sorts of messages from other vehicles and the roadside effectively and reliably, it is important that the messages it sends contain proof that the vehicle is what it claims to be; these messages can be transmitted between cars or the road’s infrastructure from up to 500m (1,640ft) away. Our ‘Group Signatures’ solution proves a vehicle’s identity without allowing that individual vehicle to be tracked over a long time. This method only indicates that the vehicle is a member of a group, making it much harder for privacy to be compromised, revealing the history of all the locations a vehicle, and therefore an individual, has visited.

Verifying vehicle identities
However, it is an expensive task for a vehicle to verify another’s identity. Vehicles will have limited computing resources and so will only be able to verify a specific number of identities of senders of messages per second.

Therefore, with our ‘Authentication Prioritization’ solution, the order in which the identity of messages is verified is decided based on assigning a priority to the messages. These priorities can be defined by vehicle distance, direction of travel or positioning on the road. A higher priority means that those messages are verified first.

Embedding the foundations for effective adoption
As we continue our research into privacy and security issues associated with CAM, our end goal is to achieve the right technological balance to enable effective and quick communication between vehicles and the roadside infrastructure, while protecting the privacy of individual vehicles and allowing reliable and safe messages to be filtered by vehicles in order of importance. At WMG we are making significant strides toward achieving these goals and supporting the ultimate objective of assisting with the widespread adoption of CAM on UK roads.

Modern interior of server room in datacenter
Share. Twitter LinkedIn Facebook Email
Previous ArticleCARMA is the USDOT’s V2X platform for cooperation between vehicles – AVT Expo interview
Next Article Continental and 3M to study interface between infrastructure and AVs

Related Posts

Features

ASAM shares updates on its positioning for SDV, AI and open-source at Technical Seminar

April 14, 20259 Mins Read
Safety

The potential impact of ADAS on hospital admissions and healthcare expenditures

March 27, 202511 Mins Read
Features

SPONSORED ARTICLE: Material solutions for vehicle domain controllers

February 27, 20254 Mins Read
Latest News

WeRide collaborates with RTA and Uber to launch pilot operations

June 16, 2025

Aurrigo founder David Keene receives MBE for the decarbonization of airports

June 13, 2025

WATCH NOW: Driving performance, efficiency and reliability – material solutions for vehicle domain controllers

June 13, 2025
FREE WEEKLY E-NEWSLETTER

Receive breaking stories and features in your inbox each week, for free


Enter your email address:


Our Social Channels
  • Facebook
  • LinkedIn
Getting in Touch
  • Free Weekly E-Newsletters
  • Meet the Editors
  • Contact Us
  • Media Pack
    • 2026 Media Pack
    • 2025 Media Pack
RELATED UKI TOPICS
  • Automotive Interiors
  • Automotive Testing
  • Automotive Powertrain
  • Professional Motorsport
  • Tire Technology
  • Media Pack
    • 2026 Media Pack
    • 2025 Media Pack
© 2025 UKi Media & Events a division of UKIP Media & Events Ltd
  • Terms and Conditions
  • Privacy Policy
  • Cookie Policy
  • Notice & Takedown Policy
  • Site FAQs

Type above and press Enter to search. Press Esc to cancel.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.

CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.

Functional

Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.

Performance

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

Analytics

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.

Advertisement

Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.

Others

Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.

SAVE & ACCEPT