Connected Parking and Automated Valet Parking

  • Dietmar P. F. Möller
  • Roland E. Haas
Part of the Computer Communications and Networks book series (CCN)


This chapter discusses one of the most relevant and straightforward application of connected cars—connected parking. Everybody who is driving a car has had some experience with the difficulty to find a parking space and to park the car in narrow lots. Fortunately, technology is available to help, and it will potentially have a major impact on traffic, parking accidents, and space utilization in cities. After a brief discussion of parking from a business perspective in Sect. 10.1, analyzing the main challenges, the chapter discusses the opportunities for connected parking in Sect. 10.2. A multitude of new apps provides information, often in real-time, about available parking spaces; manages the booking; often allows for cashless billing; and can be integrated with OEM’s connectivity services. This chapter gives an overview of major players and discusses the core features and services of their solution. Section 10.3 presents parking assistance systems. The most sophisticated—as of today—automates the complete parking process; however, the driver still has to be in the car and has to oversee the process. The next step, automated valet parking (AVP), is discussed in Sect. 10.4. AVP systems turn the vehicles into a robot car that automatically finds parking space and maneuvers the car into a free slot. The first commercial systems will soon be available in high-end cars, soon, and also will be deployed for carsharing. Sections 10.5 and 10.6 deal with the cybersecurity impact of connected parking and automated valet parking analyzing the major cyber threats and look at potential solutions for increasing the cybersecurity, like intrusion detection and prevention (see also Chap.  6). Such systems are in place to protect large-scale IT infrastructure and recently have been applied to the cybersecurity of vehicles, which is discussed more in detail in Chap.  6. Section 10.7 finally wraps up with a conclusion and recommended further readings. Section 10.8 contains a comprehensive set of questions on the connected parking and automated valet parking and the final section includes references and further readings.

References and Further Reading

  1. (Alheeti et al. 2015a) Alheeti, K. M. A., Gruebler, A., McDonald-Maier, K. D.: An intrusion detection system against malicious attacks on the communication network of driverless cars. In: Proceedings 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), pp. 916-921, 2015Google Scholar
  2. (Alheeti et al. 2015b) Alheeti, K. M. A., Gruebler, A., McDonald-Maier, K. D.: An Intrusion Detection System against Black Hole Attacks on the Communication Network of Self-Driving Cars. In: Proceedings 6th International Conference on Emerging Security Technologies (EST), pp. 86-91, 2015Google Scholar
  3. (Balani 2015) Balani, N.: Enterprise IoT – A Definite Handbook, Self-published, Kindle Edition, 2016Google Scholar
  4. (Brisbourne 2014) Brisbourne, A.: Tesla’s Over-the-Air Fix: Best Example Yet of the Internet of Things? Wired online. February 2014. Available from:
  5. (Berke 2015) Berke, J.: Hacker attacks on companies – When cyberattacks lead to bankruptcy (in German). Wirtschaftswoche online. November 25th 2015. Available from:
  6. (Besenbruch 2014) Besenbruch, D.: Electronic Systems – Protection against Manipulation (in German), ATZ elektronik, 7/2014Google Scholar
  7. (Chandrasekar et al. 2013) Chandrasekar, P, Barua, N, Zia, Y.: Future of Vehicle Parking Management Systems in North America and Europe. Frost & Sullivan. October 1st 2013. Available from:
  8. (Chucholowski and Lienkamp 2014) Chucholowski, F., Lienkamp, M.: Teleoperated Driving – Secure and Robust Data Connections (in German). ATZ elektronik, 01/2014Google Scholar
  9. (Currie 2015) Currie, R.: Developments in Car Hacking, December 5th 2015. SANS Institute. Available from:
  10. (Dierig 2012) Online Parking is too cheap in Germany (in German). Welt online. October 8th 2012. Available from:
  11. (Fallstrand and Lindstrom 2015) Fallstrand, D., Lindstrom, V.: Automotive IDPS: Applicability analysis of intrusion detection and prevention in automotive systems. Master’ Thesis. Chalmers University of Technology. Available from:
  12. (Freitag 2016) Freitag, M.: Robotic Cars - German Manufacturers in Pole Position (in German). July 26th 2016. Available from:
  13. (Gebhardt 2016) Gebhardt, M.: This is how we park tomorrow (in German). Zeit online. May 10th 2016. Available from:
  14. (Gerhager 2016) Gerhager, S.: Why auto makers might soon get into the focus of blackmailers (in German). Focus online. October 17th 2016. Available from:
  15. (Gräfe 2016) Bosch and Daimler rely on automatic parking searches (in German). Stuttgarter Nachrichten online. March 10th 2016. Available from:
  16. (Gerster 2016) Assistance systems: Bosch drives automated parking (in German). Automobilwoche, March 2016Google Scholar
  17. (Greenberg 2013) Greenberg, A.: Hackers reveal nasty new car attacks-with me behind the wheel. Forbes online. July 24th 2013. Available from:
  18. (Germis 2016) Germis, C.: Each week 6000 attacks from the Internet against VW (in German). FAZ online. August 18th 2016. Available from:
  19. (Haas et al. 2017) Haas, R., Möller, D., Bansal, P., Ghosh, R., Bhat, S.: Intrusion Detection in Connected Cars. In: Proceed. IEEE/EIT 2017 Conference, pp. 516-519. Ed.: Izadian, A., Catalog No. CFP17EIT-USB 978-1-5090-4766-6, 2017Google Scholar
  20. (Haas and Möller 2017) Haas, R., Möller, D.: Automotive Connectivity, Cyber Attack Scenarios and Automotive Cyber Security. In: Proceed. IEEE/EIT 2017 Conference, pp. 635-639. Ed.: Izadian, A., Catalog No. CFP17EIT-USB. 978-1-5090-4766-6, 2017Google Scholar
  21. (Haykin 2009) Haykin, S.: Neural Network and Learning Machines. 3rd edition. Pearson Education, 2009Google Scholar
  22. (Jungwirth 2016) Presentation of Johann Jungwirth and personal discussion at the Cebit 2017, Hannover, March 2017Google Scholar
  23. (La Vinh and Cavalli 2014) La Vinh, H., Cavalli, A. R.: Security attacks and solutions in vehicular ad hoc networks: a survey. In: International Journal on AdHoc Networking Systems (IJANS), Vol 4, No. 16, pp. 1-20, 2014Google Scholar
  24. (Laudon et al. 2010) Laudon, K., Laudon, J., Dass, R.: Management Information Systems, Pearson Publ., 2010Google Scholar
  25. (Lobe 2016) Lobe, A.: Hacker Alert – In a modern car today are computers and info systems that are easy to manipulate. How do the manufacturers deal with the security gap? (in German). Zeit online. August 25th 2016. Available from:
  26. (Mahaffey 2015a) Mahaffey, K.: The New Assembly Line: 3 Best Practices for Building (secure) Connected Cars. Lookout Blog. August 6th 2015. Available from:
  27. (Mahaffey 2015b) Mahaffey, K.: Here Is How To Address Car Hacking Threats. TechCrunch. September 13th 2015. Available from:
  28. (Markey 2015) Markey, E.J.: Tracking and Hacking: Security and Privacy Gaps Put American Drivers at Risk. 2015. Available from:
  29. (Miller and Valasek 2014) Miller C., Valasek C.: A Survey of Remote Automotive Attack Surfaces. IOActive 2014. Available from:
  30. (Miller and Valasek 2015) Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. August 10th 2015. Available from:
  31. (Min and Choi 2013) Min, K-W., Choi, J-D.: Design and implementation of autonomous vehicle valet parking system. In: Proceedings 16th International IEEE Conference on Intelligent Transportation Systems – (ITSC 2013), 2013Google Scholar
  32. (Nicodemus and Auracher 2015) Connected Parking. EPoSS Workshop on Smart Systems Integration. June 19th 2015. London. Available from:
  33. (Pickhard et al. 2015) Pickhard, F., Emele, M., Burton, S., Wollinger, T.: New thinking for safely networked vehicles (in German). ATZ elektronik, 7/2015Google Scholar
  34. (Poulsen 2010) Poulsen, K.: Hacker disables more than 100 cars remotely. Wired online. March 17th 2010. Available from:
  35. (Rees 2016) Rees, J.: Mobility – Never have to park yourself (in German). Wiwo online. May 6th 2016. Available from:
  36. (Reuss et al. 2015) Reuss, H.-C., Meyer, G., Meurer, M.: Roadmap 2030 Synergies of Electromobility and Automated Driving (in German). ATZ Elektronik, 7/2015Google Scholar
  37. (Scarfone and Mell 2007) Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS). NIST. February 20th 2007. Available from:
  38. (Serio and Wollschläger 2015) Serio, G., Wollschläger, D.: Networked Automotive Defense Strategies in the Fight against Cyberattacks (in German). ATZ elektronik, 06/2015Google Scholar
  39. (Solon 2015) Solon, O.: From Car-Jacking to Car-Hacking: How Vehicles Became Targets For Cybercriminals. August 4th 2015. Bloomberg online. Available from:
  40. (Stockburger 2016) Stockburger, C.: IT security of cars: You have no choice but to trust the manufacturers (in German). Spiegel online. November 1st 2016. Available from:
  41. (Vembo 2016) Vembo, D.: Connected Cars – Architecture, Challenges and Way Forward. Whitepaper Sasken Communication Technologies Pvt. Ltd. 2016. Available from:–-architecture-challenges-and-way-forward-0
  42. (Vestlund 2009) Vestlund, C.: Intrusion Detection Systems in Networked Embedded Systems. Linköping University. Available from:
  43. (Weimerskirch 2016) Weimerskirch, A.: Cybersecurity for Networked and Automated Vehicles (in German). ATZ elektronik, 03/2016Google Scholar
  44. (Werle 2015) Werle, K.: World in digital change – the game changer – BMW smartphone on wheels (in German). Manager Magazin. November 23rd 2015. Available from:
  45. (Wolf and Osterhues 2013) Wolf, M., Osterhues, A.: Secure Messages – Modern Cryptography for Protecting Control Devices (in German). ATZ elektronik, 02/2013Google Scholar
  46. (Wolf et al. 2016) Wolf, A, Greiff, S., Obermaier, R.: Vehicle access systems of tomorrow (in German). ATZ Elektronik 03/2016Google Scholar
  47. (Wolfsthal and Serio 2015) Wolfsthal, Y., Serio, G.: Made in IBM Labs: Solution for Detecting Cyber Intrusion to Connected Vehicles, Part I. Available from:
  48. (Xiao et al. 2006) Xiao, B., Yu, B., Gao, C.: Detection and localization of Sybil nodes in VANETs, in DIWANS 06, Los Angeles, CA, pp. 1–8, 2006.Google Scholar
  49. (Zetter 2015) Zetter, K.: Researchers Hacked A Model S, But Tesla’s Already Released A Patch. Wired online. August 6th 2015. Available from:



    1. (URL5 2017)
    2. (URL11 2017)
    3. (URL14 2017)
    4. (URL18 2017)
    5. (URL20 2017)
    6. (URL21 2017)
    7. (URL28 2017)
    8. (URL29 2017)
    9. (URL30 2017)

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  • Dietmar P. F. Möller
    • 1
  • Roland E. Haas
    • 2
  1. 1.Clausthal University of TechnologyClausthal-ZellerfeldGermany
  2. 2.QSO TechnologiesBangaloreIndia

Personalised recommendations