A Journey Towards Digital Mobility

IAV at the the International Congress ELIV

      A Journey Towards Digital Mobility

      Under this banner IAV will be presenting different showcases and three demonstrator vehicles at the International Congress ELIV.

      We are currently witnessing the most exciting phase in the history of automotive engineering: vehicles and IT are merging ever more closely. Soon, automobiles will be “always on”, i.e. permanently connected to the internet. As part of the Internet of Things, they will then exchange data with the cloud and mobile devices, permitting completely new services and making everyday routine noticeably easier for users. IAV will be taking you on a journey towards the future of mobility at the International Congress ELIV on October 18 and 19 in Bonn.

      IAV has a clear vision of tomorrow’s vehicles. We are working on a car that seamlessly connects the digital world with personal mobility. Mobile devices and data from the cloud will match the vehicle to the needs of occupants, create a pleasant atmosphere and make traveling as safe and as comfortable as possible.

      Security and Privacy


      Success Factors of Connected Mobility

      Tomorrow’s vehicle users will expect permanent and flexible connectivity for their vehicles. At the same time, they will want to know that they can fully rely on their personal data and vehicle information being protected from misuse.

      Modern data connections present challenges to the security of vehicles. To ensure the security of connected cars in the digital age, consideration must be given to two aspects. On the one hand, the security of the vehicle’s own data must be guaranteed and, on the other, the vehicle itself must be protected from external attacks.

      Using appropriate encryption and authentication procedures, the security of the vehicle’s own data in general does not pose a problem anymore from a technical point of view. However, developing the hardware and software does involve significantly more cost and effort. Protecting the complex IT architecture of a connected vehicle also demands a carefully considered and all-embracing security concept.

      Future vehicles will be permanently connected with the environment and their surroundings (e.g. cloud, other road users or infrastructure) in all sorts of different ways. This increases the risk of misuse, e. g. from hackers.

      For this reason, a vehicle, as a network user, must meet the following protection targets:

      • Data authenticity: The source of data must be verified with absolute certainty.
      • Data integrity: Data must not be tapped or changed.
      • Data availability: Data must always be attainable when they are needed, and transmission must not be subject to interference at any time.
      • Data privacy: Data must not be allowed to fall into unauthorized hands.

      In our showcase, we present a selection of common attack scenarios, simulate an attack on the vehicle network and demonstrate potential effects on a compromised vehicle.

      The Security Demonstrator uses a specially developed attack generator and a utility function to be attacked. Using an app, we can illustrate how a car connected by wireless media (Wi-Fi, LTE, Bluetooth) can be protected from hacker attacks.

      This is why we want to add a further universal control unit to our UCU family that is suitable for low-volume production. This control unit has special security functionalities and can be used as a secure communication gateway. An attack database currently being set up will provide the basis for this.

    • Where to find us


      World Conference Center Bonn

      Platz der Vereinten
      Nationen 2

      D-53113 Bonn

      Exhibition hours

      Wednesday, October 18
      08:45 a.m. – 06:15 p.m.

      Thursday, October 19
      08:30 a.m. – 15:15 p.m.

    • Thank you for your interest

      How can we help you?

      Your request/concern:
      Personal details
      Contact details

      You can find our data privacy policy here.

      All fields marked with a "*" are mandatory.