Warning: session_start(): open(/opt/alt/php72/var/lib/php/session/sess_3c820eb9848fc6d7522aaf599fa4686d, O_RDWR) failed: Disk quota exceeded (122) in /home/shweuqjw/awajludhianaki.org/wp-content/plugins/jnews-social-login/class.jnews-social-login.php on line 83

Warning: session_start(): Failed to read session data: files (path: /opt/alt/php72/var/lib/php/session) in /home/shweuqjw/awajludhianaki.org/wp-content/plugins/jnews-social-login/class.jnews-social-login.php on line 83
The achilles heel of the EV ecosystem, ET Auto - Awaj Ludhiana Ki
Wednesday, May 14, 2025
  • Home
  • National
  • International
  • Movies
  • Technology
  • Business
  • Fitness
  • Lifestyle
  • Punjab
  • Contact us
No Result
View All Result
No Result
View All Result
Home Automobiles

The achilles heel of the EV ecosystem, ET Auto

by author
July 10, 2024
in Automobiles
0
The achilles heel of the EV ecosystem, ET Auto
0
SHARES
25
VIEWS
Share on FacebookShare on Twitter


<p>EVs present enticing targets for malicious actors seeking unauthorised access or control. </p>
EVs present enticing targets for malicious actors seeking unauthorised access or control.

New Delhi: India’s electric vehicle (EV) market is at an inflexion point. EVs accounted for about 5% of total vehicle sales between October 2022 and September 2023—and could reach more than 40% penetration by 2030 owing to the government’s Electric Mobility Promotion Scheme, incentivising people to buy EVs. While this is a great step towards achieving India’s net zero goals, the ever-present cybersecurity threat must be considered as this system is built out.

A recent study found that in 2023, the number of large-scale incidents potentially impacting thousands or even millions of mobility assets increased by x2.5. Additionally, 95% of cyberattacks are executed remotely and 85% are long-range, indicating the need for robust security mechanisms to be built into electric vehicles and the corresponding infrastructure such as charging stations.

Given EVs’ interconnected nature and reliance on local power grids, a new set of risks is created for drivers, companies and infrastructure. This makes it critical for all organisations within the EV ecosystem to adopt a preventive security approach to get ahead of threat actors and deliver secure vehicles and infrastructure.

What could possibly go wrong?

Related posts

AISIN ASK JV eyes opportunities as systems supplier, Auto News, ET Auto

AISIN ASK JV eyes opportunities as systems supplier, Auto News, ET Auto

February 24, 2025
Regulatory bump may stall Tesla entry into India, ET Auto

Regulatory bump may stall Tesla entry into India, ET Auto

February 24, 2025

EVs present enticing targets for malicious actors seeking unauthorised access or control. EV systems such as navigation and optimal route planning rely on WiFi and cellular networks to provide real-time updates. If threat actors compromise these networks, they can access key systems that put drivers at serious risk or create massive disruptions. For example, if malicious actors gain control of the vehicle’s primary operating system, they could at a minimum “brick” the vehicle, or in a worst-case scenario, disable software-controlled braking or steering systems.

A study by HSB found that globally, 44% businesses fear that malware would damage or destroy their vehicles’ data, software, or operating systems. More than half (56%) are somewhat or very concerned about their vehicles being immobilised, and their safety compromised (54%).

Most vehicle components are manufactured outside the final assembly plant by third-party manufacturers. This extends risk beyond the assembly plant to all manufacturing facilities and the plants of all supply chain partners. These risks include the introduction of malicious code into the vehicle components by a bad actor. The illicitly modified components would then be assembled into vehicles without anybody knowing the difference. A study by AT&T found that 61% of organisations are in the ideation, research, planning, and proof-of-concept stages when it comes to integrating security of edge devices.

The increasing EV adoption in India has also given rise to the demand for EV service equipment like charging stations, which are quickly cropping up across the country. Charging stations record information such as the vehicle owner’s credit card data, Vehicle Identification Numbers (VIN) and information tied to drivers’ EV application profiles. Such vulnerable charging stations offer a potential path to exfiltrate data that could compromise driver accounts. This is perhaps why only 21% of automotive industry executives across the world, believe that customers will trust OEMs to safeguard their data

Public charging stations use local power grids. Attackers could compromise charging stations and move laterally to infect car systems with advanced persistent threats (APTs) that lie in wait until cars are plugged in. Another attack vector would be lateral movement to other charging stations, preventing EV owners from charging their vehicles on a massive scale, a very disruptive action. Another example would be to use charging stations as a way to manipulate the grid itself, disrupting power supplies.

How do we fix this problem?

EV vendors, servicing organisations and owners in the EV ecosystem need security solutions that address device code integrity, user access and overall operational security. user logins and access. Intersections (e.g., APIs), be they device to device such as EV to charging station, vehicle to cloud, or charging station to the cloud must be investigated for vulnerabilities and secured.

Critically within vehicles, there exists an implicit trust relationship between the various components – essentially the ABS system trusts the Infotainment system just because they are both inside the same vehicle. This model may have been acceptable before hyper-connectivity existed, but in today’s rapidly evolving environment, it is quite dangerous. Something like the Infotainment system should at least be isolated from critical safety components, similar to what’s done in commercial IT networks today. By reducing the number of intersections at all positions of the interconnected EV universe, for users, it’s possible to limit the overall attack surface.

EV manufacturers bear the responsibility to secure the vehicles being manufactured. EVs are essentially computers on wheels, many of which are embedded in hardware systems. The result is the perfect setup for firmware failures if manufacturers don’t take the time to ensure proper system isolation and the integrity of system firmware.

Full visibility and continuous monitoring: To mitigate OT and IoT risks, manufacturers need full visibility into all the operational assets that control sourcing, fabrication and assembly processes. Deep knowledge of all types of devices in the OT network, including patch levels, firmware versions and backplane information, is essential. EV manufacturers must account for dormant devices not communicating regularly over the network. This is done with on-premises device monitoring.

We need to consider the extended support infrastructure as well. As mentioned earlier, devices such as EV charging systems are entry points for malicious activity. These devices, which may be considered “IoT in nature, must be secured and monitored. Vulnerabilities must be assessed and mitigated, and the devices monitored to ensure no malicious activities emanate from them.

Prioritised remediation: To ensure vulnerabilities are remediated promptly, the monitoring of the extended EV infrastructure must perform risk prioritisation such that the biggest risks are identified quickly. Doing so requires a unified Exposure Management solution that can monitor risks on different types of technologies such as on-prem, cloud, OT and IoT and from one place. In other words, complete and continuous visibility from a single perspective is essential.

Prevention is better than reaction: Preventive security solutions like exposure management identify policy violations, anomalous behaviours and vulnerabilities allowing for preventative actions to be taken. This allows organisations in the ecosystem, to set and fine-tune detection methods so they are optimised for their environment. Exposure management also provides organisations with context-rich alerts, so they can quickly respond and mitigate threats impacting operations and safety.

As the connected vehicle ecosystem becomes more complex and introduces large-scale cyber risks, EV organisations must take a multidimensional approach to cybersecurity. The approach must consider all potential ways an attacker could compromise the integrity of the overall EV ecosystem – not just a single view. Disparate organisations must also cooperatively share data and act collaboratively. Only then can we ensure a highly reliable and very safe EV infrastructure.

  • Published On Jul 10, 2024 at 12:21 PM IST

Join the community of 2M+ industry professionals

Subscribe to our newsletter to get latest insights & analysis.

Newsletter icon

Download ETAuto App

  • Get Realtime updates
  • Save your favourite articles


Scan to download App




Source link

Previous Post

Rasayanam: Blending Modern Science With Traditional Wisdom | India News

Next Post

Vikrant Massey starrer The Sabarmati Report faces new hurdles – Director Ranjan Chandel replaced with Tushar Hiranandani by Ektaa R Kapoor over differences; reshoots commence: Report : Bollywood News

Related Posts

AISIN ASK JV eyes opportunities as systems supplier, Auto News, ET Auto
Automobiles

AISIN ASK JV eyes opportunities as systems supplier, Auto News, ET Auto

February 24, 2025
Regulatory bump may stall Tesla entry into India, ET Auto
Automobiles

Regulatory bump may stall Tesla entry into India, ET Auto

February 24, 2025
Electric 2-wheeler sales remain in fast lane, market share may grow three-fold in five years, ET Auto
Automobiles

Electric 2-wheeler sales remain in fast lane, market share may grow three-fold in five years, ET Auto

February 24, 2025
Tesla fever grips India again even while Musk keeps mum, ET Auto
Automobiles

Tesla fever grips India again even while Musk keeps mum, ET Auto

February 22, 2025
MoRTH has adopted a big data driven approach to infra planning, says Nitin Gadkari, ET Auto
Automobiles

MoRTH has adopted a big data driven approach to infra planning, says Nitin Gadkari, ET Auto

February 20, 2025
BS7 committee examining compliance challenges of ethanol-blended fuels, ET Auto
Automobiles

BS7 committee examining compliance challenges of ethanol-blended fuels, ET Auto

February 20, 2025
Next Post
Vikrant Massey starrer The Sabarmati Report faces new hurdles – Director Ranjan Chandel replaced with Tushar Hiranandani by Ektaa R Kapoor over differences; reshoots commence: Report : Bollywood News

Vikrant Massey starrer The Sabarmati Report faces new hurdles – Director Ranjan Chandel replaced with Tushar Hiranandani by Ektaa R Kapoor over differences; reshoots commence: Report : Bollywood News

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RECOMMENDED NEWS

UP: Over 80 lakh beneficiaries will receive free food grains at 80,000 fair price shops under PMGKAY on August 5 | India News

UP: Over 80 lakh beneficiaries will receive free food grains at 80,000 fair price shops under PMGKAY on August 5 | India News

4 years ago
Tea imports from Nepal hurting Indian tea industry

Tea imports from Nepal hurting Indian tea industry

4 years ago
Arrested ISIS India Head Haris Farooqi Plotted Bomb Blasts In UP, Uttarakhand To Incite Communal Tension | India News

Arrested ISIS India Head Haris Farooqi Plotted Bomb Blasts In UP, Uttarakhand To Incite Communal Tension | India News

1 year ago
Perform Or Perish: Congress’ Strong Message To Party Cadres At Ahmedabad Session | India News

Perform Or Perish: Congress’ Strong Message To Party Cadres At Ahmedabad Session | India News

1 month ago

BROWSE BY CATEGORIES

  • Animals
  • Architecture
  • Automobiles
  • Business
  • Culture
  • Fitness
  • International
  • Lifestyle
  • Movies
  • National
  • Sports
  • Technology
  • Travel

BROWSE BY TOPICS

Architecture culture Fitness indian architecture indian culture indian culture and heritage indian news lifestyle national news Technology technology news Travel travelling

About Us

Awaj Ludhiana Ki

Address

2667/3, Kishore Nagar, Tajpur & Jail Road, Ludhiana – 141008

Recent News

  • What India Achieved With Operation Sindoor: From Terror Camp Elimination To Strategic Red Line – A Detailed Analysis | India News
  • Can Pakistan Afford War With India? Shortage Of Artillery Ammunition Reveals Its Military Capacity | India News
  • She’s 115 And Still Smiling — UK’s Oldest Woman Reveals Her Longevity Secret, And It’s Not What You Think | World News
  • WAVES 2025: Prime Video unveils first-look teaser of Panchayat season 4 : Bollywood News
  • UMEED Act 2025: TMML Alleges Obstruction By People With Vested Interests, Pushes For Justice | India News

Category

  • Animals
  • Architecture
  • Automobiles
  • Business
  • Culture
  • Fitness
  • International
  • Lifestyle
  • Movies
  • National
  • Sports
  • Technology
  • Travel

Search

No Result
View All Result

Email

contact@awajludhianaki.org

  • About
  • Advertise
  • Careers

Copyright © 2019 Awaj Ludhiana Ki or it's affiliates | Website by Awaj Ludhiana Ki Team

No Result
View All Result
  • Home
  • Contact us
  • Animals
  • Architecture
  • Automobiles
  • Business
  • Culture
  • Fashion
  • Fitness
  • Food
  • International
  • Lifestyle
  • Movies
  • National
  • Sports
  • Technology
  • Travel
  • Punjab

Copyright © 2019 Awaj Ludhiana Ki or it's affiliates | Website by Awaj Ludhiana Ki Team

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In