close By using this website, you agree to the use of cookies. Detailed information on the use of cookies on this website can be obtained on OneSpin's Privacy Policy. At this point you may also object to the use of cookies and adjust the browser settings accordingly.

Bridging The Gap Between Smart Cities And Autonomous Vehicles

By: Ann Steffora Mutschler

Communication, security, and power issues still need to be solved, but there is progress.

Moving traffic optimally in urban areas is critical for reducing energy consumption and accidents, and for moving emergency vehicles through city streets as quickly as possible. How best to achieve these goals is complicated, though. It requires an interleaving of communication, security, and power technology, which needs to be installed in roads, traffic signals, buildings and other structures, with communications from vehicles talking to that infrastructure, as well as to other vehicles.


Another aspect of this is that the level of communication that will be required to make it possible for vehicles to interface with any and all manner of infrastructure will be massive and 5G will be the conduit to making that happen, Jorg Grosse, product manager for functional safety, OneSpin Solutions, believes. “Artificial intelligence and edge-computing technology today will have to grow significantly while the level of verification needed will also increase. The complexities involved with making sure these communications happen safely and securely will be astounding. Formal verification will play a crucial role in the verification of the integrated circuits that will power this intelligent communication. The technology will go beyond simply making sure designs operate as intended but also must ensure that safety and security vulnerabilities and weaknesses are eliminated. I can see continuous product lifecycle verification being adopted as well, since the ages of devices communicating with one another will be a wide range. Not only will device age play a factor, but these devices will have to keep up with the constant evolution of security requirements.”


Related Links