Why Digital Car Keys Are Safer Than You Think

The vehicle locking system has gone through a century-long evolution. Despite being a subtle component, tremendous efforts have been put into making more secure locks and more convenient keys, with increasingly sophisticated technology and features built into them. Clearly, the car keys we use today show no resemblance of what they were like decades ago. In fact, the combined door and ignition key was only invented in the 1960s. Prior to that, vehicle owners needed to carry different sets of keys for the door locks and the ignition lock. Then in the 1980s, the remote keyless system (RKS) was adopted, commonly referred to as keyless entry, allowing drivers to remotely control the door locks with the press of a button on their key fob. This continued to evolve into the smart key fob, which by using RFID (radio frequency identification) technology, automatically unlocks a vehicle within proximity, enabling hands-free passive keyless entry. Today, many automotive manufacturers are taking one step further to eliminate the need for any physical form of key, by adopting the digital car key – a virtual smart key that combines wireless communication technologies with authentication software, readily installable onto smartphones.

Despite the convenience the digital car key offers, many remain skeptical of the idea of virtually “logging in” to a vehicle via a smartphone app, with security being the primary concern. Indeed, having a tangible key fob at hand does feel more psychologically secure than a virtual key on the smartphone. However, evidence suggests otherwise – digital car keys are much safer than we might think.

Worldwide Standardization for Digital Car Keys: CCC Digital Key

Unlike other software application services, the architecture of the digital car key is strictly standardized by the Car Connectivity Consortium (CCC), which publishes a detailed release for all manufacturers and software developers to follow, ensuring security and worldwide interoperability.

Since its establishment, the CCC Digital Key standard has received two major updates to incorporate more advanced technologies for added security and convenience. Besides adopting robust PKI-based authentication measures that exceed the security standards of the financial industry, the Digital Key also uses cutting-edge communication technologies to prevent man-in-the-middle (MITM) attacks that attempt to intercept messages. The latest standard, CCC Digital Key 3.0, was introduced in 2021, adopting two new wireless communication technologies – UWB (ultra-wideband) and BLE (Bluetooth Low Energy). These technologies are comparably more secure compared to the RFID technology used in smart key fobs.

Reducing the Risk of Relay Attacks

Although the smart key fob might appear safer than the Digital Key given that the owner has complete physical control of the key, it is in fact highly vulnerable to MITM attacks, particularly relay attacks. Since the smart key fob communicates with the vehicle via RFID signals, attackers can attempt to intercept the signals and use it for their advantage, mostly for stealing vehicles.

A relay attack is surprisingly simple and easy to implement, requiring no technical knowledge. All it needs is two people and two RFID transmitters. One person needs to stand within a certain range of the key fob (usually near the house of the car owner), carrying a transmitter device that picks up RFID signals from the key fob. The device then relays that signal to the second person, who stands beside the targeted vehicle holding a receiver device that picks up the relayed signal, hence unlocking the vehicle. These devices can be easily found and purchased online at affordable prices, with some of them being able to pick up signals from 100 meters away.

Relay attacks are by far the most common cause of vehicle thefts today. According to vehicle theft recovery firm Tracker, 93% of all vehicles it recovered were stolen by relay attacks. Of course, these attacks can be easily prevented by storing the key fob in a metal box or carrying it in a dedicated RFID blocking case. However, having to remove the key fob from a case prior to every use undermines the whole purpose of having a smart key fob in the first place – seamless entry.

Since the Digital Key uses more advanced communication technologies such as UWB and BLE, all of which aren’t vulnerable to MITM attacks, the Digital Key provides much stronger protection against vehicle thefts. In fact, evidence shows that there has not been a single successful case of Digital Key compromise. Although there have been a few cases of hackers who claimed to be able intercept the signals of a digital key through a relay attack, no vehicle theft has been reported as a result.

Chances of Remote Hacking?

Since the Digital Key depends on software-based authentication, many are concerned about the potentials of vehicle hacking. Precisely speaking, every connected system is prone to hacking, but the possibility of a hacker successfully bypassing PKI-based authentication and gaining access to the key is extremely low. Pwn2Own, one of the most popular cybersecurity contests, offered a $100,000 reward to anyone who could hack the digital key of a Tesla Model 3 through code execution, but nobody managed to compromise the key during the contest.

Many users also worry about losing their smartphone, hence losing access to their car. With the Digital Key, users can easily terminate or suspend their key by logging into their account from another device, preventing unauthorized usage of the lost or stolen key.

Additionally, unlike smart key fobs, which have limited buttons and features, the Digital Key provides much more versatile functionalities. For instance, the app can be used to set up a variety of configurations and commands, such as opening and closing the trunk, controlling the A/C, and even sharing the key with friends and family.

Secure Car Sharing

When using a physical key fob, vehicle sharing isn’t easy. Since only two pairs of key fobs are given when purchasing a new car, sharing the car with multiple family members or friends can be a hassle. Moreover, once the key is passed onto the shared user, the owner has no control of the car whatsoever, leading to security and safety concerns.

With the Digital Key, the car sharing process is made much more easy and secure. The owner simply needs to send an invitation link to the shared user to grant them access to the vehicle. Additionally, the owner retains partial control of the vehicle via the app, which allows them to configure the duration of shared usage, the maximum speed, the number of unlocks, and many more.

The vehicle sharing feature of the Digital Key is also beneficial for corporate cars and ridesharing service platforms. Since these publicly accessible vehicles tend to be used carelessly, incorporating the Digital Key offers great potential in enhancing both safety and convenience.


AUTOCRYPT’s Digital Key

As the first mobility security company in Asia to join the Car Connectivity Consortium, AUTOCRYPT’s Digital Key solution is a custom digital key development solution in compliance with the CCC standards, based on AUTOCRYPT’s proprietary PKI-based authentication system, issuing certificates that are embedded to the module during application development.

To stay informed and updated on the latest news about AUTOCRYPT and mobility tech, subscribe to AUTOCRYPT’s quarterly newsletter.

The Evolution of Tolling and the Potentials of V2X-Based Tolling

The way road tolls are collected has gone through quite an evolution. From manual tollbooths where drivers must come to a full stop to make payments — to the open road tolling (ORT) systems seen on many highways, tunnels, and bridges today, tolling has become increasingly convenient and seamless.

Speaking of a seamless driving experience, another technology that comes to mind is V2X (vehicle-to-everything), the wireless communications technology used for smart transportation. As the foundation for autonomous driving, V2X facilitates all kinds of real-time message transmissions between vehicles, infrastructure, and pedestrians. Today, as more and more vehicles and roadside infrastructure are equipped with V2X connectivity units (onboard units and roadside units), the idea of integrating tolling into the V2X ecosystem has become a hot topic.

The infographic below demonstrates how tollgates have evolved in the past, and how the path toward V2X-based tolling was paved.

The Potentials of V2X-Based Tolling

In terms of the user experience, V2X-based tolling isn’t much different from existing open road tolling systems. Then why is it worth adopting? The main reason is cost efficiency. Both ETC and ORT systems depend on radio transmission, which requires the installation of RFID readers on tollgates and radio transponders on vehicles. These devices, however, are solely made and used for tolling. On the other hand, V2X-based tolling operates on real-time communications between the onboard units (OBU) embedded in vehicles and the roadside units (RSU) embedded in road infrastructure. These devices are used for all types of communications for Vehicle-Infrastructure Cooperated Autonomous Driving (VICAD). In fact, many vehicles and smart road infrastructures today already contain OBUs and RSUs. Strictly speaking, the technology for V2X-based tolling isn’t an innovation in and of itself, but rather a readily available “byproduct” of autonomous driving development. Just like how the functionalities of MP3 players were naturally integrated into smartphones, tolling will eventually be integrated into the V2X ecosystem.


AUTOCRYPT’s Role in Securing V2X Connectivity

Since V2X communications serve a range of security-critical purposes including autonomous driving and tolling, cybersecurity systems must be pre-integrated into the communication process. With decades of experience specializing in encryption and authentication technologies, AUTOCRYPT plays a crucial role in securing V2X messages and participants, preventing unauthorized vehicle access and sensitive data exposure.

AutoCrypt® V2X is a security software package for V2X connectivity units, consisting of a software development kit (SDK) ready to be integrated into OBUs/RSUs, and a PKI-based authentication system for the secure verification of all end-entities.

To learn more about AUTOCRYPT’s V2X security offerings, contact global@autocrypt.io.

To stay informed and updated on the latest news about AUTOCRYPT and mobility tech, subscribe to AUTOCRYPT’s quarterly newsletter.

Trends in the E-Mobility Industry 2022

As climate change accelerates across the globe, facilitating a fast and smooth transition into electric vehicles (EV) and electric mobility (e-mobility) is now at the top of the agenda for governments, transport ministries, and the automotive and mobility industries. With tremendous investment and efforts pouring into the transition over the past several years, we have seen significant improvements in the quality, usability, and performance of EVs and their supply equipment (EVSE).

AUTOCRYPT considers contributing to the transition to e-mobility of utmost importance. That’s why we exhibited at this year’s EVS35 (Electric Vehicle Symposium and Exhibition) in Oslo, Norway to showcase our latest e-mobility solution EVIQ and propose our proprietary security framework for Plug&Charge (PnC). Being at the event also helped us gain insights into the latest trends in the fast-evolving e-mobility industry.

2022: The Tipping Point of EV Adoption

Although it can take quite some time before all vehicles on the road become electric, EVs are dominating new car sales in many countries. Norway, the leading country in EV adoption, showed a record-high annual EV market share of 86% over the year 2021, followed by another monthly record of 92% in March 2022. At this point, about 23% of all vehicles in use in Norway are EVs. Other leading EV adopters include Sweden, with an annual market share of 45% in 2021, followed by the Netherlands at 30%, Germany at 26%, Britain at 19%, France at 18%, and China at 15%.

Although Norway is currently the only country with an EV market share above 50%, there is little doubt that other countries will quickly catch up. Looking at Norway’s EV adoption pattern, it took about an equal amount of time for the market share to grow from zero to 20% and from 20% to 90%. This 20% mark can be seen as a tipping point, where adoption begins to accelerate.

EV Market Share in Norway (% of New Car Sales)

This pattern can be explained by two reasons. The first is peer influence. Whenever a new technology is introduced to replace an existing one, a great majority of people try to wait until the early adopters have fully tested the technology before making a purchase. This effect is especially salient when making a high-involvement purchase like a car. Once one in five people (20%) start to purchase the new technology, the worries dissipate, and the general population begins their adoption. When reaching a stage where two in five people (40%) go for the new technology, people begin to feel peer pressure and refrain from purchasing the older technology due to fear of being left behind and loss of resale value.

The second reason is of course the growth in EV technology itself.

Based on this pattern, we can estimate that the EV market share in the EU (currently at 20%) will likely reach 80% in five years, and China (currently at 15%) will reach 80% in six years. These estimates do not take into consideration the accelerating growth of e-mobility technology and infrastructure so; by taking that into account, the EV market share in both EU and China could potentially reach 80% in as soon as four years.

Even in slower markets like North America, 2022 is on track to becoming a promising year. Canada’s EV market share grew from 3.8% in 2020 to 5.6% in 2021, showing great potential of reaching the 10% mark within 2022.

Widespread Commercialization of Plug&Charge and V2G Technology

The V2G (vehicle-to-grid) communication interface defined by ISO 15118 is a protocol designed for bidirectional charging/discharging between EVs and chargers. Within the standard is a feature called Plug&Charge (PnC), which enables an EV to automatically prove its identity to the charger on behalf of the driver, then exchange its digital certificate with the certificate of the charger to allow for automated payment. To enable PnC, both the vehicle and the charging station must be PnC-compatible.

The initial years after PnC’s release showed slow progress. After the Plug&Charge section was first added to ISO 15118 in 2014, not a single OEM had a functional implementation until 2018. A few OEMs began demo testing between 2019 and 2020. Eventually, some exciting results were shown in 2021. Several vehicle models – including Hyundai IONIQ 5, 2021 Porsche Taycan, 2021 Lucid Air, and 2021 Ford Mustang Mach-E – are now fully compatible with PnC. The same goes for charging stations. In 2021, both Electrify America and Electrify Canada deployed PnC to their charging networks in North America. Ionity also announced in late 2021 that all their charging stations across Europe are PnC-compatible.

Although it still seems like very few OEMs and charge point operators (CPOs) are implementing the technology, it is great news that PnC is now widely available for commercial use with mass adoption underway, and AUTOCRYPT is fully prepared to implement its AutoCrypt PnC secure charging framework to protect the personal and financial data of the driver during the PnC process, as cybersecurity has become a requirement in ISO 15118-20.

As for the bidirectional charging and energy distribution aspects of V2G, there are very few market implementations today, but the industry is making great progress. Many providers are beta testing V2G chargers capable of selling electricity back to the grid, with hope to bring bidirectional home chargers to the market in the next two years.

Elevated Environmental and Regulatory Pressure

Over the past decade, governments around the world have been using the incentive approach to encourage EV ownership. By subsidizing the costs of vehicle acquisition and e-mobility infrastructure development, EVs have now become affordable for most middle-income families. The availability of charging stations has also greatly improved.

With more climate disasters occurring across the globe, governments are now pushing forward a disincentive approach by putting regulations in place to “punish” carbon emitters. In 2020, the European Union’s Regulation (EU) 2019/631 entered into force, setting specific emission targets for OEMs. For every year between 2020 and 2024, the average CO2 emission for an OEM’s entire fleet registered in the year must be kept below 95 g/km for cars and 147 g/km for vans. If the average emission figure exceeds the target, the OEM must pay an excess emissions premium (EEP) at 95 euros per every g/km exceeded, multiplied by the total number of its newly registered vehicles in the EU in that year. To further incentivize EV production, the regulation also adds a super-credits system for low-emission vehicles with less than 50 g/km, by loosening the targets for OEMs that sell more of these vehicles.

As a simplified example, a 2.5 L gasoline-engine 2022 Hyundai Sonata has an emission rate of 182 g/km, which exceeds the 95 g/km target. If Hyundai wants to avoid paying the EEP, it must sell a lot of IONIQ 5s in that same year to both loosen the target figure (to above 95 g/km) and pull its total average figure down.

Starting in 2025, the target emission standards will become stricter and set out on a per OEM basis as a percentage reduction from their 2020 starting points, encouraging continuous progress.

Adoption of eMobility in Fleets

Electric vehicles are not only becoming popular among consumers, but many companies have started adopting EVs for commercial use. Mobility service operators were among the first to adopt all-electric fleets, because EVs today are easily capable of ranges above 350 km, well above the daily needs of most MaaS and taxi drivers. Additionally, since gasoline prices around the world nearly doubled over the past two years, the electrification of commercial vehicles has become a necessary cost-saving measure for many businesses.

A more exciting trend is the electrification of heavy-duty commercial vehicles like delivery vans, semi-trailer trucks, and buses. Only a couple of years ago, all-electric heavy-duty vehicles were considered barely viable due to technological limitations in batteries and motors. Thanks to accelerating technological growth and decreasing battery prices, heavy-duty EVs have become widely available, with over 100 models of heavy-duty electric trucks and buses in the market today.

Of course, infrastructure must also be upgraded to match the needs of heavy-duty EVs. Charge point operators are expanding their networks of high-speed DC chargers with charging speeds above 250 kW, which can charge a semi-truck in about two hours. Since time is crucial for logistics companies, charger manufacturers have also been working on Mega chargers specifically designed for trucks, namely the Megawatts Charging System (MCS). These charging systems are capable of charging speeds in the megawatts range, capable of filling a semi-truck in minutes.

Lastly, investing in an all-electric fleet also gives the fleet operator the potential of participating in V2G bidirectional charging when it becomes more available in the coming years, allowing the operator to make profits from their unused fleets.


AUTOCRYPT’s Work Towards Connected eMobility

As an automotive cybersecurity and mobility solutions provider, AUTOCRYPT plays a range of roles in bringing convenience and security to e-mobility. Starting from AutoCrypt PnC, a PKI-based security module that secures the PnC charging framework, AUTOCRYPT expanded its offerings by launching its e-mobility solution, EVIQ, an all-in-one EV information and charging platform that provides a Charging Station Management System for CPOs as well as charger locator maps for EV drivers.

To learn more about AUTOCRYPT’s e-mobility offerings, contact global@autocrypt.io.

To stay informed and updated on the latest news about AUTOCRYPT and mobility tech, subscribe to AUTOCRYPT’s quarterly newsletter.

Managing Automotive Software Security With the Software Bill of Materials (SBOM)

The automotive industry is evolving at an incredible pace, characterized by changes in vehicle architecture, automotive software, and user experience. No longer are automobiles a mere transportation tool, but consumers are now expecting their car to function as their smart mobile device on the road, capable of not just (autonomous) driving, but also personal computing tasks from music and video streaming to in-car payment and cloud-based functionalities. Today, drivers and passengers want their interactions with the car to be personalized, synchronized, and most importantly, effortless.

A smart mobile device relies heavily on software applications. Just like smartphones and tablets, the modern vehicle operates on hundreds of software applications with millions of lines of source code, powered by up to a hundred application processors in the forms of MCUs (microcontrollers) and ECUs (electronic control units)—and in some cases, a couple of centralized CPUs. Whereas conventional vehicles are largely evaluated by their hardware, software is playing an increasingly important role in defining today’s vehicles. We are in an age where two vehicles with the exact same engine and technical specs can drive and feel entirely different depending on the underlying software.

The Role of Automotive Software

In a modern vehicle, a surprising number of features that consumers take for granted are enabled by software. To consumers, the most familiar type of automotive software is the user applications installed in the head unit (i.e., dashboard and infotainment system), which make up the human-machine interface (HMI). Yet, beneath the surface, there are hundreds of software applications embedded throughout the in-vehicle system, underpinning the smart features that are seamlessly integrated into the driving experience. For instance, software is embedded in every camera to process the captured imagery and transmit the visual information to the computing unit, enabling advanced driver-assistance systems (ADAS).

Looking deeper within the vehicle, all ECUs contain pieces of embedded software that act as communication modules, allowing them to communicate with one another throughout the CAN buses, the head unit, the telematics control unit (TCU), and externally to the telecommunications network and the clouds. These communication interfaces lay the groundwork for V2X (vehicle-to-everything) communications and vehicle-infrastructure cooperated autonomous driving (VICAD). Lastly, information collected from the in-vehicle system is likely recorded and transmitted to the OEM cloud, allowing for the vehicle security operations center (vSOC) to detect anomalies and respond to any potential cybersecurity threats. All these software-enabled features run seamlessly without the need for any manual intervention.

Who Develops Automotive Software?

Unlike hardware parts, most of the software components used in automobiles are not directly developed by OEMs or Tier 1 suppliers. Instead, they come from a diverse range of software vendors and providers, including HMI providers, middleware providers, operation systems providers, telematics providers, ADAS software providers, telecommunications providers, cloud providers, security providers, and many more. Some of these software components are installed directly on top of the infotainment system, while others are embedded within the wide array of in-vehicle systems prior to the assembly phase. Oftentimes, software vendors need to work with hardware suppliers and chipmakers during the production process to ensure cross-industry interoperability. As software becomes an integral part of production, the automotive supply chain is looking less like a vertical deliver-and-assemble process but more like a horizontal network of partnerships and co-developments.

The Components of Automotive Software

A vehicle’s software environment is much more complex than that of other computing devices like smartphones and PCs. Smartphones and PCs operate on a single OS, where all software applications are developed for the specific platform. In the vehicular software environment, however, vehicles do not run on a single OS nor a proprietary platform (even though OEMs are moving in that direction—topic for another time). This means that every software component is essentially independent, only to be stitched together by the rules set out by standardized communication protocols and interfaces.

Since automotive software components are developed by individual parties, a large portion of them contain open-source code and licenses. This isn’t surprising given that more than 70% of all the world’s software source code is open source—the most popular mobile OS Android was built on the grounds of the open-source Linux kernel, while over two-thirds of all web servers in the world run on the open-source Unix OS and its variants. Of course, these popular open-source distributions are often developed and managed by large corporations, ensuring that vulnerabilities are monitored, detected, and patched immediately. But this isn’t the case for automotive software, which comes from hundreds of vendors and developers across the world. Since open-source code is widely copied and modified during the development of applications, even developers can lose track of which components or licenses were used, or whether one component could form codependency with another. This makes it much more challenging to manage software updates and ensure that patches get to the right vehicles on time.

Fortunately, there is a promising solution that makes it easy for automotive OEMs to continuously manage their in-vehicle software throughout all stages of the software development lifecycle (SDLC)—the software bill of materials.


Securely Manage Automotive Software With the Software Bill of Materials (SBOM)

To counter the security risks that arise alongside the growing popularity of open-source software (OSS), the software bill of materials (SBOM) has become a popular tool to manage OSS vulnerabilities across many industries. An SBOM, as its name suggests, is a machine-derived list that contains a detailed breakdown of all open-source ingredients—including code and licenses—found within a piece of software. In 2021, a US Executive Order on enhancing OSS security made SBOM mandatory for certain sensitive industries. A detailed guideline was later published by the National Telecommunications and Information Administration (NTIA) of the US Department of Commerce.

Like many other industries, the SBOM is the most effective way for OEMs to manage automotive software. Not only does it help establish a vulnerability-free software environment in the first place, but it also allows OEMs to keep track of vulnerabilities in their OSS and licenses during the aftermarket stage and have them patched via OTA (over-the-air) updates to all impacted vehicles.

AUTOCRYPT’s newly launched AutoCrypt® Security Analyzer (SA) is an SBOM-based software analysis and management tool that accurately detects and categorizes software components, enabling OEMs to continuously manage their automotive software during all stages of the vehicle’s lifecycle.

To learn more about AutoCrypt® Security Analyzer and AUTOCRYPT’s mobility service solutions, contact global@autocrypt.io.

To stay informed and updated on the latest news about AUTOCRYPT and mobility tech, subscribe to AUTOCRYPT’s quarterly newsletter.

Protecting Vulnerable Road Users (VRU) With V2P Technology

Vulnerable road user (VRU) is a term used to describe any road user who is not inside a motor vehicle. This can mean a pedestrian, a cyclist (or motorcyclist), a scooterist, or someone in a wheelchair. Compared to motorists, VRUs are much more likely to suffer from severe injuries or death in a traffic accident due to their lack of external protection. Although vehicle-pedestrian crashes are much less common than vehicle-vehicle crashes, these accidents still contribute to a significant number of road fatalities. According to the Insurance Institute for Highway Safety (IIHS), pedestrian fatalities account for 17% of all casualties from traffic accidents, while cyclist fatalities account for another 2%.

Why Are VRU Fatalities Increasing?

During the past decade, we have seen significant improvements in Advanced Driver-Assistance Systems (ADAS), including features like pedestrian detection and warning. This gives us an intuition that VRU safety must have been improving. Shockingly, a completely opposite trend was observed. Pedestrian fatalities have in fact increased by 51% over the past ten years, most of which occurred in urban areas.

Given all the technological advancements, why isn’t the pedestrian fatality rate falling? One possible explanation is the growing popularity of SUVs, which are taller than sedans and more likely to hit the pedestrian’s upper body in crashes. Another likely cause is that both drivers and pedestrians today face constant smartphone distraction, making them less focused and attentive on the road.

The Struggles to Keep VRUs Safe

Over the past few years, urban planners and policymakers have been implementing progressive approaches to improve VRU safety by either eliminating roadways in crowded urban centers or reducing the speed limit to less than 30 km/h in city streets. However, these countermeasures are only effective in cities with a well-established public transit system that can handle a drastic increase in passengers. For many cities that rely heavily on personal vehicles, implementing such measures can be quite disruptive and inefficient for daily commuters.

Protecting VRUs isn’t about sacrificing one group for the other. It is essentially about protecting everyone, as every driver technically becomes a VRU the moment they exit the car. Hence, finding a balanced solution that benefits both motorists and VRUs is crucial. In this regard, V2P technology shows great potential. V2P (vehicle-to-pedestrian) technology is a sub-type of V2X (vehicle-to-everything) communications technology that allows vehicles to communicate with pedestrians in real-time wirelessly. With V2P, vehicles and pedestrians will be able to cooperate seamlessly on the road to prevent accidents.

How Does V2P Differ From V2V and V2I?

V2P operates under the same mechanism as other types of V2X communications like V2V (vehicle-to-vehicle) and V2I (vehicle-to-infrastructure). However, there are some unique aspects of V2P that make its deployment and application somewhat different from the other two.

Installation

To enable any V2X communication, a V2X connectivity unit must be installed on every end entity of the ecosystem. An end entity can be a vehicle, a traffic signal, a roadside camera, and many more. The V2X connectivity units can either be embedded within the end entities during the manufacturing process or externally connected to existing vehicles and infrastructure that do not have embedded units.

However, we cannot simply install V2X connectivity units on unpowered V2P entities like bicycles, scooters, skateboards, wheelchairs, and of course, the human body. In this case, smartphones can act as end entities. A compact and lightweight portable V2X device can be plugged into the mobile devices of VRUs so that they can easily participate in V2P communications. These portable V2X devices are extremely versatile and can be plugged anytime into all kinds of smart devices such as phones, tablets, and vehicle head units via common ports like USB-C.

Another potential deployment method relies on a specific type of V2X mode—the C-V2X Uu interface. Different from the PC5 interface—which enables end entities to communicate directly with each other without going through any medium—the Uu interface sends all messages through the mobile broadband spectrum, connecting all entities to the cellular network. Under this mode, all smart devices with cellular connectivity become readily available V2X connectivity units with no need for external hardware.

Application

Whereas V2V and V2I communications are used to serve the purpose of vehicle-infrastructure cooperated autonomous driving (VICAD), V2P adds VRU cooperation to the mix, taking autonomous driving to the next level. By doing so, it further enhances the safety of autonomous driving in urban areas by complementing conventional ADAS and pedestrian warning systems. In application, vehicles receive the real-time location, speed, and direction of every VRU in their surroundings, allowing them to respond immediately to all kinds of unexpected behaviours.

On the other hand, V2P can also be used to issue warning messages to pedestrians. Many observational studies have pointed out the severity of pedestrian smartphone distraction. One study in Melbourne found that 20% of all walkers were on their smartphones while crossing the road. These “smartphone zombies” are at a significantly higher risk of traffic accidents. With V2P-enabled smartphones, these walkers can be alarmed at traffic signals and pedestrian crossings.


Better Autonomous Driving Starts from Road User Cooperation

Even though most developments in autonomous driving have been focusing on V2V and V2I applications, we should not forget that vehicles are not the only road users. To make autonomous driving smarter and safer, more participants should be invited to join the ecosystem. Adding VRUs to the cooperated autonomous driving mix has the potential to greatly reduce vehicle-VRU accidents and improve road safety and efficiency in urban areas.

AUTOCRYPT is actively working on developing technologies that accelerate V2P deployment. To stay informed and updated on the latest news about AUTOCRYPT and mobility tech, subscribe to AUTOCRYPT’s quarterly newsletter.

To learn more about AUTOCRYPT’s mobility service solutions, contact global@autocrypt.io.

A Technological Path Towards Universal Mobility

What Is Universal Mobility?

Universal mobility refers to the state in which everyone has access to reliable means of transportation for necessities like going to work and school, accessing public services and healthcare, as well as shopping and socializing. Despite being taken for granted by many, there is a significant percentage of the population whose basic mobility needs are not met.

Achieving universal mobility can indeed be challenging, considering that car ownership might not be a viable option for everyone, and that there are many less-developed nations as well as sparsely populated regions where transit services are not financially sustainable. What’s more, even in places with adequate transit services, they can be difficult or impossible to access for those facing mobility challenges—for instance, people with temporary or permanent disabilities, parents of young children, and older people who need moving assistance. According to WHO estimates, 1% of the world’s population needs a wheelchair, while 3.2% of the world’s population is affected by blindness or some form of visual impairment.

Universal mobility is only said to be achieved when every member of the society—regardless of their place of residence, financial status, and physical condition—can enjoy reliable transportation on a day-to-day basis.

The Two Barriers to Universal Mobility

There are two main barriers to achieving universal mobility. The first is systematic barrier. This can be defined as a lack of motivation and initiative to improve transportation infrastructure for those in need. This could be due to a lack of public awareness with regard to accessibility needs or incompetent governments.

A second barrier is financial barrier. Even with strong motivation and improvement plans, financial challenges tend to prevent these plans from turning into actions. Problems such as high operational and maintenance costs and expensive fares make it difficult to expand transit services for sparsely populated regions and improve accessibility.

In many parts of the world, financial barrier has been the biggest obstruction to the path towards universal mobility. Indeed, building and maintaining transit services is expensive. Operating accessible transit services is more expensive. Even some of the largest metropolitan transit operators with millions of daily passengers can experience frequent budget deficits that need to be filled by government subsidies. For decades, governments around the world have been trying to solve these issues with policy changes but saw no significant improvements.

To break through the financial barrier, maintaining profitable services is crucial. Even though profitability and universal mobility may sound contradictory, they are in fact mutually inclusive. It is important to acknowledge that universal mobility is only achievable if all services are capable of long-term financial sustainability. In this regard, several newly developed mobility technologies offer great potential.

A Technological Path Towards Universal Mobility

Rather than struggling with endless policy changes, we can pave a technological path to improve transportation coverage and achieve universal mobility. With the integration of smart mobility technologies, we can make transportation and mobility services more sustainable by cutting down unnecessary costs and improving efficiency.

V2X and Autonomous Driving

V2X (vehicle-to-everything) is the wireless communication technology used for real-time message transmission from vehicles to vehicles (V2V), vehicles to infrastructure (V2I), and vehicles to pedestrians (V2P), making it an essential building block for L3+ autonomous driving. How does autonomous driving help achieve universal mobility?

Even though taxi and mobility services are common in cities, they are less common and often nonexistent in smaller towns and rural regions due to a lack of profitable business models. With L4 and L5 autonomous driving, mobility service operators can deploy autonomous vehicle fleets in these less-populated regions to fill the unaddressed demands, without incurring the cost of hiring new drivers.

Fleet Management and Service Optimization

From the perspective of a mobility service operator, every mile on the road without a passenger indicates an opportunity cost. Hence, minimizing vehicle vacancy is crucial to the long-term financial sustainability of a mobility service. A fleet management system collects mechanical and location data from every vehicle in real-time, allowing the service platform to match demands to their closest supplies and map out optimized routes to the destinations, ensuring that the vehicle fleet is utilized to its maximum capacity.

In fact, in terms of serving sparsely populated regions and those with special accessibility needs, demand-responsive transport (DRT) services are much more efficient than fixed-route transit. With the help of big data and AI, barrier-free DRT services have great potential in such niche markets.

For this reason, AUTOCRYPT started its barrier-free DRT solution, AutoCrypt EQ, helping businesses establish accessible DRT platforms for those with mobility challenges, while ensuring that all data shared through the platform are end-to-end encrypted and verified.

Reliable Transport Enhanced by Connectivity

Although cutting down unnecessary expenses is beneficial, maintaining reliable and high-quality service is equally important for achieving universal mobility. Ensuring that all services are safe, secure, and reliable is a crucial task not only for mobility service operators but also for automotive OEMs. With the accelerated adoption of vehicle connectivity and autonomous driving, it is more important than ever to secure vehicles from hacking attempts and unauthorized access. As mandated by industry regulations and standards, many automotive OEMs now run a Vehicle Security Operations Center (vSOC) that monitors the real-time security status of their active vehicles using data collected from the OEM cloud, while identifying and reporting any potential intrusions immediately.


New Business Models for Universal Mobility

These new smart mobility technologies are not only beneficial to existing service providers. They also encourage new operational models and provide growth opportunities for businesses and NGOs that look forward to improving transportation coverage and accessibility. These new business models not only have the potential to break through the typical financial challenges of public transit, but also generate more initiatives in serving niche markets and bring us closer to universal mobility.

AUTOCRYPT shares this vision and is actively working with partners to develop innovative mobility service models in the form of DRT services, accessibility mapping, and multi-modal MaaS platforms.

To learn more about AUTOCRYPT’s mobility service solutions, contact global@autocrypt.io.

To stay informed with the latest news on mobility tech and automotive cybersecurity, subscribe to AUTOCRYPT’s monthly newsletter.