Your browser doesn't support javascript. This means that the content or functionality of our website will be limited or unavailable. If you need more information about Vinnova, please contact us.

Our e-services for applications, projects and assessments close on Thursday 25 April at 4:30pm because of system upgrades. We expect to open them again on Friday 26 April at 8am the latest.

HoliSec: Holistic Approach to Improve Data Security

Reference number
Coordinator Volvo Technology AB - Avd 06010 M1.7
Funding from Vinnova SEK 19 982 269
Project duration April 2016 - November 2020
Status Completed
End-of-project report 2015-06894sv.pdf(pdf, 654 kB) (In Swedish)

Purpose and goal

HoliSec has focused on raising awareness of how potential cyber security threats can and should be addressed. Collaboration between OEMs and research partners has improved cost efficiency and increased international competitiveness. HoliSec showed that technologies such as intrusion detection, encryption, integrity, authentication, for data protection in the vehicle network are implementable in the automotive industry. HoliSec has also led to solutions and technologies developed in this project able to be transferred to other domains.

Expected results and effects

WP0: Project management has ensured good quality in produced results which have then been used and disseminated by the various partners. WP1: Security and integrity requirements when connecting vehicles WP2: Cryptographic support and key management WP3: Secure vehicle diagnostics; Secure communication; Interaction between security and privacy; Logging and intrusion detection WP4: Secure software and system design as well as secure validation and verification of software WP5: Demonstrated and disseminated results (concepts and methods) from the project.

Planned approach and implementation

Participating companies from two different types of OEMs have been important because passenger cars and commercial vehicles currently in different areas use different technologies and have different technical limitations. In order to be able to carry out the collaboration between the various OEMs and the academic partners involved in the project, the project was divided into a number of WPs. Each WP has then highlighted different cybersecurity-related areas and techniques. Partners have since worked with conducting research and investigations in the various WPs.

External links

The project description has been provided by the project members themselves and the text has not been looked at by our editors.

Last updated 22 January 2021

Reference number 2015-06894

Page statistics