• Dietmar P. F. Möller
  • Roland E. Haas
Part of the Computer Communications and Networks book series (CCN)


This chapter discusses carsharing. Section 8.1 introduces the carsharing concept and the different variants of it as well as carsharing services offered so far. The focus in Sect. 8.2 is on the carsharing concept by Daimler, its Car2Go business model. In Sect. 8.3 the use cases in regard to the different phases of carsharing are analyzed, and the resulting requirements are discussed. Section 8.4 describes significant modifications to the hardware and software infrastructure of a smart car for using it in the carsharing business model. The focus of Sect. 8.4 is on connectivity which is realized through a GSM module that is embedded in the telematics unit. In Sect. 8.5 the impact of electric vehicles in carsharing applications is discussed. It also shows the block diagram of a standard electric vehicle. Section 8.6 refers to the carsharing activities by other OEMs and their brands. Since the whole use case of carsharing relies on the constant connectivity between the car and the backend system, the proper security of the used vehicles is a major concern which can be realized by intrusion detection and prevention to avert vulnerabilities through cyberattacks. In this regard Sect. 8.7 introduces cyberattack surfaces and discusses the mitigation of cyberattacks (see also Chap.  6). Section 8.8 finally wraps up within a conclusion, while Sect. 8.9 contains a comprehensive set of questions on the carsharing business model, and finally followed by references and suggestions for further reading.

References and Further Reading

  1. (Almeida et al. 2017) Almeida, F., Silva, P., Leite, J.: Proposal of a Carsharing System to Improve Urban Mobility. In: Theoretical and Empirical Researches in Urban Management, Vol. 12, Issue 3, pp. 32–44, 2017Google Scholar
  2. (Berke 2015) Berke, J.: When Cyberattacks lead to Bankruptcy (in German). Wirtschaftswoche online. November 25th 2015. Available from:
  3. (Burt 2016) Burt, M.: Volkswagen unveils Moia, its new mobility services brand. Autocar online. December 5th 2016. Available from:
  4. (Brisbourne 2014) Brisbourne, A.: Tesla’s Over-the-Air Fix: Best Example Yet of the Internet of Things? Wired online. February 2014. Available from:
  5. (Currie 2015) Currie, R.: Developments in Car Hacking. SANS Institue. December 5th 2015. Available from:
  6. (Dämon 2013) Dämon, K.: Corporate Carsharing – Companies want to get away from the company car. Wirtschaftswoche online. April 19th 2013. Available from:
  7. (Greenberg 2013) Greenberg, A.: Hackers reveal nasty new car attacks-with me behind the wheel. Forbes online. July 24th 2013. Available from:
  8. (Haas and Möller 2017) Haas, R. E., Möller, D. P. F.: Automotive Connectivity, Cyber Attack scenarios and Automotive Cyber Security. In Proceedings IEEE/EIT Conference, Lincoln, NE, 2017Google Scholar
  9. (Hinderer et al. 2016) Hinderer, H., Pflugfelder, T., Kehler, F. (Eds): Electromobility – Opportunities for suppliers and manufacturers (in German). Springer Automotive Media, 2016Google Scholar
  10. (Kampker et al. 2013) Kampker, A., Vallee, D., Schnettler, A.: Electromobility – The Basis of a Future Technology (in German). Springer/Vieweg Publ., 2013Google Scholar
  11. (Knieps 2016) Knieps, S.: Humans will always want to drive themselves - Daimler Board member Entenmann about the future of the community car and how the autonomous car will change the business model of car2go (in German)Google Scholar
  12. (Kuchler and Strzelczyk 2013) Kuchler, G., Strzelczyk, M.: Tire Pressure Monitoring – Safety Aspects and Value-added Functions (in German). ATZ elektronik, 02/2013Google Scholar
  13. (La Vinh and Cavalli 2014) La Vinh, H., Cavalli, A. R.: Security attacks and solutions in vehicular ad hoc networks: a survey. International Journal on AdHoc Networking Systems (IJANS), Vol. 4, No. 16, pp. 1–20, 2014Google Scholar
  14. (Lampart and Bähren 2015) Lampart, O., Bähren, H.: Hardware- and Software-Security Solutions for Infotainment Systems (in German), ATZ elektronik, 03/2015Google Scholar
  15. (Loogen 2015) Loogen, F.: Moment of Electromobility (in German). ATZ elektronik, 03/2015Google Scholar
  16. (McMillan 2011) McMillan, R.: With Hacking, Music Can Take Control of Your Car. PCWorld online. March 11th 2011. Avaliable from:
  17. (Meyer and Shaheen 2017) Meyer, G., Shaheen, S.: Dirupting Mobility – Impacts of Sharing Economy and Innovative Transportation on Cities. Springer Publ. 2017Google Scholar
  18. (Miller and Valasek 2015) Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. August 10th 2015. Available from:
  19. (Pickhard et al. 2015) Pickhard, F., Emele, M., Burton, S., Wollinger, T.: New Thinking for Secure Connected Vehicles (in German). ATZ elektronik, special edition, 7/2015Google Scholar
  20. (Reimann 2014) Reimann, W.: Electrified into the future (in German). ATZ elektronik, 06/2014Google Scholar
  21. (Reindl et al. 2016) Reindl, S, Klümper, M., Maier, B.: Mobility Services in the Automotive Industry (in German). In Dietz, W., Reindl, S., Bracht, H.: Principles of the Automotive Management (in German), Springer Automotive Media, 2016Google Scholar
  22. (Rees 2016) Rees, J.: Mobility – Never have to park yourself (in German). Wiwo online. May 6th 2016. Available from:
  23. (Schlesiger 2016) Schlesiger, C.: Flixbus – The creepy triumphal mach of the startup. Wirtschaftswoche online. October 17th 2016. Available from:
  24. (Schöttle 2015a) Schöttle, M.: Security for Software and IT (in German). ATZ elektronik, 03/2015Google Scholar
  25. (Schöttle 2015b) Schöttle, M.: Hacker instead of Cracker (in German), ATZ elektronik, 04/2015Google Scholar
  26. (Serio and Wollschläger 2015) Serio, G., Wollschläger, D.: Networked Automotive Defense Strategies in the Fight against Cyberattacks (in German). ATZ elektronik, 06/2015Google Scholar
  27. (Stockburger 2016) Stockburger, C.: IT security of cars: You have no choice but to trust the manufacturers (in German). Spiegel online. November 1st 2016. Available from:
  28. (Sorge 2016a) Sorge, N.V.: Electric Cars threaten the creation of value in Germany, The Explosive Billionpoker around the Battery Manufacturers (in German). Manager Magazin online. October 26th 2016. Available from:
  29. (Sorge 2016b) Sorge, N.-V.: Warren Buffett’s Electric Car Chinese – BYD is attacking Daimler with its own factory in Europe (in German). Manager Magazin online. October 13th 2016. Available from:
  30. (Stellet et al. 2014) Stellet, J., Gießler, M., Gauterin, F., Puente León, F.: Model-based Traction Control for Electric Vehicles (in German). ATZ elektronik, 02/2014Google Scholar
  31. (Vembo 2016) Vembo, D.: Connected Cars – Architecture, Challenges and Way Forward. Whitepaper Sasken Communication Technologies Pvt. Ltd. 2016. Available from:–-architecture-challenges-and-way-forward-0
  32. (Wolf et al. 2016) Wolf, A, Greiff, S., Obermaier, R.: Vehicle access systems of tomorrow (in German). ATZ elektronik, 03/2016 Google Scholar
  33. (Zetter 2015) Zetter, K.: Researchers Hacked A Model S, But Tesla’s Already Released A Patch. Wired online. August 6th 2015. Available from:



    1. (URL10 2017)
    2. (URL11 2017)

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  • Dietmar P. F. Möller
    • 1
  • Roland E. Haas
    • 2
  1. 1.Clausthal University of TechnologyClausthal-ZellerfeldGermany
  2. 2.QSO TechnologiesBangaloreIndia

Personalised recommendations