How Does Connected Vehicle Technology Work?

Connected vehicle technology will enable vehicles, roads and other infrastructure, and our smartphones to all communicate and share vital transportation information through advanced wireless communication technology.

In the future, your vehicle and most other vehicles on the road will likely be using some wireless technology and GPS to attain 360-degree awareness of nearby vehicles. This equipment will continually transmit your position, direction, and speed (e.g., whether you were turning or putting on your brakes), as well as other information, to other vehicles around you. This technology will also empower vehicles to "talk" to equipment installed in the road itself and other infrastructure, such as traffic signals, stop signs, toll booths, work or school zones, and railroad crossings.

To function safely, a connected vehicle system needs to ensure the trustworthiness of communication between vehicles. The source of each message needs to be trusted and message content needs to be protected from outside interference. The system as contemplated will contain several layers of security and privacy protection to ensure that vehicles can rely on messages sent from other vehicles. The U.S. Department of Transportation"s (USDOT) Intelligent Transportation System Joint Program Office (ITS JPO) is working with the industry to develop tight controls to prevent tampering with connected vehicle hardware and software. The National Highway Traffic Safety Administration (NHTSA) will thoroughly vet tests results.

In addition, the USDOT understands that privacy is a critical concern. Equipment and devices will not identify you or your vehicle. The information they collect and share will be anonymous.

Another key point is that work is being done to ensure the warnings you receive when driving don't become distracting. You will only receive alerts and notifications when a dangerous situation is developing.

Your personal privacy How Other Wireless Devices Impact Connected Vehicles CV security