Welcome to the World of V2G

Electric Vehicles are no longer a future premise… In fact, from 2012 to 2018, global plug-in vehicle deliveries grew by 46-69%, and it’s likely that this growth will continue. We see EVs on the road and charging points in parking garages, and while the concept seems to be comparable to charging a mobile phone—plug it in, wait, and go… is the process really that simple?

In reality, charging a car involves several parties:

1. The OEM manufacturer who made the vehicle

2. The CPO that provides the Charge Point, similar to a gas pump for non-electric vehicles

3. The MO that registers members to be users for the charging service

This MO does not own the charging point itself, but builds the interface and the system required to use it. The MO is the party that has contact with the actual customers, and receives and maintains their charging data and information. The CPO, who owns the charge points, relays the operations of its station to the MO, and pays the network usage fee.

Users need to be certified by the OEM, MO, and CPO and then deliver the certificates to the V2G infrastructure in order to have the ecosystem ready for charging.

cpo mo oem process

While this may sound and look to be quite complicated, for the end-user, it’s quite simple. Plugin the charger at a nearby charging station, and then go—Plug & Charge (PnC). Just like a mobile phone, the process has been streamlined. All the certification, verification, and payment processing happen in an instant behind the scenes, and AUTOCRYPT V2G keeps those processes secure.

But what happens when the security landscape is always changing? From the early stages of the EV, AUTOCRYPT has been ready to bring solutions and products to the table, taking on the future era of EVs.

This also means that it has been and continues to be crucial to continue testing for compliance with not just domestic, but international standards, manufacturers, and guidelines around the world as this is an era that is constantly evolving. AUTOCRYPT has participated in several testing symposiums to meet international standards, and we continue to conduct interoperability testing with various companies. AUTOCRYPT has also been invited to share its unique V2G technology all over the world, as industries and organizations worldwide are increasingly eager to get into the conversation about EVs and the need for security, standardization, and quick integration.

AUTOCRYPT V2G ensures that your EV experience is a seamless one, letting you spend more time on the road without compromising your safety and security. For more on how the V2G experience works with AUTOCRYPT, click to watch our video below!

Infographic: All You Need to Know About Electric Vehicle Fill-ups

2020 is set to be the year of Electric Cars, according to numerous automotive analysts around the world.

More and more global manufactures are joining the wave of launching new electric vehicle products in hopes to lower the carbon dioxide (CO2) emissions level.

As a result, Electric Vehicle (EV) charging points are noticeably increasing on streets, highways, and parking spaces around all continents.

Now you can get a bird’s eye view on what you need to know about the new trend of vehicles including tips on electric vehicle fill-ups and charging.

(Accessibility version below)

electric vehicle fill-ups infographic

All You Need to Know About Electric Vehicle Fill-Ups

1. How far can I go on 1 hour of charge?

The distance your vehicle can go after an hour of charging depends on your vehicle model and the embedded battery type. The unit of measurement for charging is kilowatt-hours. Regular 120v power outlets allow for a distance of 6.5km per hour of charge, 240v residential chargers allow for 40km, Commercial chargers for 40km, and Fast-charge commercial chargers can allow for distances up to 300km.

2. How long does it take to charge?

Based on the time it takes to charge to 80% of a 63kWh battery (standard sized battery of a US BEV model as of May 2019), a 120v power outlet can take up to 42 hours, a 240v residential charger 2.6-15 hours, commercial chargers 20-60 minutes, and fast-charge commercial chargers 8-20 minutes.

3. Am I able to charge my EV at any charging point?

Unfortunately, no. Manufacturers have different models for plugs depending on the region, speed of charge, and the manufacturer brand. For example, the SAE Combo Coupler System (CCS), CHAdeMO, and Tesla are the three most common plug types.

4. How often should I charge my EV?

While frequency does depend on your driving habits, if you are a daily user of your EV and drive long distances each time, it’s recommended that you charge your EV battery each night. However, on average, EV users tend of charge about 2-3 times a week.

5. Where can I find the closest charge station?

Charge stations are marked clearly on most maps, but visit websites like PlugShare to find out more details. This site also indicates which plug types are supported by the charge points.

6. How much is the cost of an electric vehicle fill-up?

Costs vary greatly depending on the country and model of vehicle, but the national average rate for the USA is $0.13/kWh, for the UK 0.14pounds/kWh, and the EU at 0.21 euros/kWh. It also depends on the time of day (peak/off-peak), for example, for a 2018 Tesla Model 3, would cost about $1.56 for 50 miles, if you charged at an off-peak hour of 11pm. However, it would cost four times as much at $6.37 during peak hours.

For more information about EVs, security, and other automotive technology, visit autocrypt.io.

Infographic: 3 Must-Have Technologies For Autonomous Driving

With the rise of autonomous vehicles, it’s more essential than ever to consider what technologies and security systems are in place to ensure the safety of the vehicle and those in surrounding areas.

Take a look at what exactly defines an autonomous vehicle and the 3 must-have technologies for self-driving vehicles. (Accessibility version below)

3 Must-Have Technologies for Autonomous Driving

The levels of driving autonomy:

Level 1: Vehicles feature basic automated systems like braking or cruise control, but only as assistance. The driver must carry out actual driving.

Level 2: Vehicles can partially self-drive, controlling both speed or lane position in some situations, but the driver must be engaged and monitor at all times.

Level 3: Vehicles are in full control in many situations, monitoring traffic, steering, and braking — but may alert the driver to take over at a moment’s notice

Level 4: Vehicles can take over all driving tasks under certain use cases and conditions. The driver isn’t required to intervene, but has the option to do so if they desire.

Level 5: Vehicles do not require a human driver and can operate in any environments without human interaction.

To be truly autonomous, vehicles and their infrastructure systems must have certain technologies firmly in place to ensure the safety of the vehicles and those in surrounding areas.

Must-have #1: Sensors

In order to “see” what is ahead of them, autonomous vehicles use various types of sensors.

  • GPS: Identifies the exact location of the vehicle and assists in navigation from point A to point B.
  • Camera: Collects visual information from the road and traffic, sending it to the controller for processing.
  • Radar: Reflects radio waves off surrounding objects, transmitting information about object’s location and speed. Radar cannot distinguish between different objects.
  • Lidar: Uses laser pulses to build a 3D model of surroundings and differentiating objects. Lidar is not limited visually (e.g., dark, light, poor weather)

Must-have #2: Communication

To communicate with their surroundings, autonomous vehicles use various communication interfaces like V2V, V2I, V2N, V2P, to ensure safe driving.

Must-have #3: Security

According to a survey from 2017, 75% of respondents expressed concern that fully driverless vehicles may be susceptible to hackers. Automotive companies are spending more on cybersecurity measures, as the UN has mandated new regulations for managing vehicle cyber risks, which will take effect starting in 2021. In fact, cybersecurity spending is estimated to nearly double from 4.9 billion to 9.7 billion in 2030 (McKinsey).

Secure First, then Ride

With the rise of autonomous vehicles, it is inevitable that society will transition into a driverless one. But until this technology is more widely adopted, keep in mind the 3 must-haves to ensure that your ride is secure.

For more information on automotive technology and security, visit www.autocrypt.io

What Are Connected Cars and How Safe Are They?

The age of connected cars

Connected cars are no longer a thing of the future – the truth is that many of us are already driving one of these without realizing it. A connected car is a vehicle with internet connectivity and the ability to send and receive data. Since cars have been equipped with Bluetooth and GPS connections since long ago, the transition to internet connectivity is not as noticeable. Vehicles are generally connected in two ways: embedded and tethered. Cars with embedded internet connectivity come equipped with a built-in antenna and chipset to access the internet directly. On the other hand, cars with tethered connectivity connect to another device (i.e. smartphone) to borrow its internet connection.

Prevalent features of connected cars

Some connected features have already become prevalent in most newly manufactured cars. Take the navigation system, for example, a GPS navigation without an internet connection would not be able to provide any real-time information, and tend to show a significant lag at detecting locations. Many of the navigation systems today come equipped with embedded internet connectivity and provide real-time updates on all kinds of information including traffic jams, accidents, prices of nearby gas stations, and weather conditions. Another common feature of cars today is smartphone integration. Almost every vehicle sold in 2020 has Android Auto and Apple CarPlay as available options. This feature allows you to integrate your Android and iOS smartphones with the infotainment system so that you can access the contents of your phone through the infotainment screen. Car buyers today increasingly look for these convenience features for their new car. The infotainment system has become just as important a decision factor as the engine.

The future of connected cars

So far, internet connectivity for vehicles only seems to be a fancy add-on feature for entertainment purposes. Meanwhile, we are at a transition phase where internet connectivity is gradually becoming a necessity. With increased coverage of 5G infrastructure, autonomous driving with preventative safety features will soon kick in as the new standard, making our transportation system smarter. A smart transportation network is sophistically interconnected. Not only will vehicles be connected to our smartphones (vehicle-to-device, V2D), vehicles will connect and communicate with other vehicles on the road (V2V), with pedestrians (V2P), with infrastructures (V2I), and with the power grid while charging (V2G). All these connections are part of the vehicle-to-everything (V2X) network. How do these connections help? A vehicle in the V2X network would be able to automatically avoid physical contact with other vehicles, follow speed limits, and stop at traffic lights, without the need for manual intervention. Indeed, we are still a few steps away from full automation because it requires the active involvement of multiple parties, including governments. Nevertheless, starting from the high-end market, semi-autonomous vehicles will soon dominate our roads.

Click here to see how autonomous driving is classified and which stage your car is at.

Are connected cars safe?

The short answer is yes. Connected cars tend to have smart and preventative safety measures that older cars lack. However, these advanced features are only safe if the system works properly, thus keeping all the connections secured from potential cyberattacks is a crucial part of automotive safety. There is a key difference between IT security and mobility security. In an IT network, you make the connections, then secure them. In a V2X network, you cannot make the connections without securing them in the first place, thus there can be no such thing as an unsecured connection. This is why AUTOCRYPT is a key component of the V2X network. The bad news is that since we are at a relatively silent transition phase, some automakers seem to be lagging behind at adapting to the security standards of connected vehicles. Let’s take a look at this recently disclosed issue.

“Critical security vulnerabilities found on Volkswagen and Ford vehicles”

In early April, Britain-based Consumers’ Association, branded as Which?, teamed up with cybersecurity professionals to examine the connected elements of the two most popular cars in Europe – the Volkswagen Polo SEL TSI Manual 1.0L gasoline, and the Ford Focus Titanium Automatic 1.0L gasoline. The examination resulted in the discovery of several serious vulnerabilities that pose privacy and safety risks to the vehicle owners. First of all, the examiners were able to hack into the infotainment system of the Volkswagen Polo by exploiting a vulnerability found in the electronic traction control system. The infotainment system contains the personal data of the user, including their whole phone contact list, call history, and location history. Another vulnerability involved significant safety concerns. The examiners obtained access to the front radar module by simply opening up the VW emblem from outside the car. Gaining access to the radar system allows hackers to tamper with the collision detection and warning system. This could cause life-threatening consequences, especially if the vehicle were to travel in autonomous mode. The examiners were also able to interfere with the messages sent from the tire pressure monitoring system on the Ford Focus, and trick the system to display that the tires are fully inflated when they are actually flat.

Source: Which?

Only two vehicles were chosen for this experiment. More likely than not, a handful of other vehicles would have similar vulnerabilities. At first glance, these issues may not seem that vital. Some may say, “So what if the collision detection system malfunctions? You are supposed to keep your eyes on the road anyways.”

Indeed, as of now, these issues do not seem that harmful. However, remember that we are still at a transitional stage. As cars gain increased autonomy, such vulnerabilities would no longer be tolerated. You don’t want your vehicle to bump into the wall during remote parking, a feature that most news cars already have today. Mobility security deserves more attention. As consumers, we must treat these issues seriously to help build a better future for transportation.

For more information on how AutoCrypt V2X protects connected vehicles, click here.

AUTOCRYPT Reflection: A Letter to Our Friends

Hope everyone is not too worn out by the COVID-19 pandemic. Despite having to go through one of the hardest times in modern history, let us never lose hope and continue to protect the safety of ourselves and others.

We here at AUTOCRYPT also had a very busy spring. After spinning off from Penta Security last year and becoming an independent company, we have expanded our global customer base, increased our international collaboration, and participated actively in ITS developments.

As we relaunch our official website, we thought this would be a great time for us to share with you some of the accomplishments and milestones we have recently achieved.

Joining the 5G Automotive Association (5GAA)

AUTOCRYPT joined the 5G Automotive Association as a security expert, sharing insights and technologies with some of the largest automakers, telecommunications equipment makers, and on-board unit (OBU) manufacturers around the world.

Founded in 2016, 5GAA is an international organization formed by companies from all areas of the automotive industry. Its ten founding members consist of automakers Audi, BMW, Daimler, telecommunications equipment manufacturers Samsung, Intel, Nokia, Ericsson, Huawei, as well as OBU manufacturers Qualcomm and Harman.

First, the members are committed to creating a set of international standards for the intelligent transportation system (ITS); think of it as version 2.0 of the 1968 Vienna Convention on Road Traffic. 

Second, the members seek to collaborate on developing both in-vehicle and roadside solutions for the next generation of connected mobility and autonomous driving. 

Lastly, the members also work extensively with governments across the world on ITS projects, currently focused on testing smart roads with connected infrastructure.

Joining 5GAA is a complex process involving some of the most demanding requirements. As a worldwide pioneer of the mobility security industry, AUTOCRYPT possesses the most field experience in vehicle-to-everything (V2X) security and is proud to serve the latest security technologies for automakers, Tier 1 suppliers, and infrastructure developers.

Joining the Car Connectivity Consortium (CCC)

AUTOCRYPT has also become a member of the Car Connectivity Consortium, sharing its expertise on vehicle-to-device (V2D) security and experience in designing public key infrastructures (PKIs) with top firms in both automotive and mobile communication industries. 

CCC is a cross-industry organization that aims to advance technologies for smartphone-centric car connectivity solutions. AUTOCRYPT joined the consortium as the first mobility cybersecurity company from Asia Pacific. Other members include the world’s top automakers Toyota, Volkswagen, GM, Hyundai, and top smartphone makers Samsung and Apple.

CCC focuses on developing digital keys that enable drivers to use their smartphones to unlock their cars, turn on their engines, and share access with family members or valets. The goal is to allow the drivers to simply connect and ride, regardless of the device or vehicle.

Similar to 5GAA, AUTOCRYPT contributes its technical expertise in establishing a set of international technical standards. It also works on a series of projects related to digital key solutions performance evaluation.

Winning the 2019 TU-Automotive Awards

This was another great achievement for us. AUTOCRYPT won in the category of the Best Auto Cybersecurity Product/Service at the 2019 TU-Automotive Awards.

TU-Automotive holds an annual awards ceremony along with one of the largest automotive technology conferences. With 30 years of experience, it is exceptionally precise and accurate at analyzing products and services in the automotive sector. As such, these awards are considered one of the most prestigious in the car tech industry.

Competing with more than 400 companies, AUTOCRYPT was awarded for its outstanding future-oriented security technologies for autonomous and electric vehicles, as well as for the smart mobility infrastructure. The 2019 awards recognized major industry leaders in 12 different categories, including Amazon, Mitsubishi, and Honda, alongside AUTOCRYPT.

Shortlisted for the 2020 TU-Automotive Awards

This year, AUTOCRYPT got shortlisted again under the category of Industry Choice Award: The Automotive Teech Company of the Year. Facing off our biggest V2X competitor Qualcomm, does our twice-as-fast V2X verification speed give us an advantage at winning? Let’s leave if for the industry judges to decide.

We here at AUTOCRYPT are optimistic about the future of transportation and will stay dedicated to developing the best mobility solutions for automakers and Tier 1 suppliers.

Starting now, we will be sending out a newsletter to our followers every month, providing some short updates on AUTOCRYPT and the latest trends in the mobility industry.

Hope everyone has a great summer season ahead. Stay safe and healthy!

How Do Vehicles Connect to the Internet and Why Would Someone Hack Them?

It has only been a little more than a decade since the introduction of the smartphone, yet they have now replaced laptops and desktops as the primary personal computing device. As we become so used to being connected to the Internet anytime and anywhere, more and more “things” now come equipped with such connectivity. One of the most common Internet of Things (IoT) devices are vehicles, but what happens when vehicles connect to each other and infrastructure?

How does vehicle connectivity work?

Most new cars in 2020 come with either embedded (built-in) or tethered (brought-in) internet connectivity, or a mixture of both. Vehicles with embedded connectivity are equipped with a built-in modem to directly receive cellular data, while those with tethered connectivity borrow the driver’s smartphone data to access the Internet (similar to WI-FI hotspots).

Most automakers offer embedded connectivity free trials for a few months, after which the driver would need to pay for continued internet access. This works similarly to a smartphone plan. For instance, AT&Tprovides a connected car data plan at cost per month for coverage in the US and Canada.

Some automakers offer embedded connectivity only for critical functions such as remote control and crash notification, and require tethered internet for all other entertainment purposes.

Whether having embedded or tethered internet connectivity, connected vehicles bring a lot of convenience and joy to the drivers. They have remote control features that allow users to unlock the doors, turn on the engine, and adjust the in-vehicle environment via their smartphone. They allow users to listen to the news, search for information, and access their smartphone all through voice control. In addition, they provide high definition streaming media content for both drivers and passengers.

Why hack a connected vehicle?

Wherever there exists an internet connection, there are security threats. The cyberthreats a connected vehicle system faces are very similar to that of a traditional IT system, in which almost all threat actors are driven by financial or political motives. In the context of a traditional IT system, the three most common objectives of cyberattacks are:

1) to exfiltrate or encrypt data for financial gains (by using the data for phishing and identity theft, selling the data to third parties, or demanding a ransom),

2) to steal intellectual property from adversaries (either businesses or political units), and

3) to disrupt operations and activities of adversaries (either businesses or political units).

In contrast, let us take a look at the most common objectives for someone to attack a car:

Vehicle theft

Believe it or not, vehicle thefts are still common. Over 150,000 vehicles were stolen in California alone in 2018 according to the Insurance Information Institute. Connected cars with smart or digital keys might decrease the chance of theft from unskilled thieves, but could as well increase the chance of theft from high-skilled hackers.

Personal data theft

Connected vehicles collect and store tons of personal data. At the very least, they store the driver’s contact list, call history, calendar, search history, entertainment preferences, driving history, and location data. Some might even store financial information for automatic payment of toll fees and EV charging fees. Attackers who gain the data may use them for identity theft, sell them to third parties, or blackmail the car owner for ransoms.

Personal attack or terrorism

This is perhaps the most concerning risk involving connected vehicles. When used abusively, cars have the potential to cause serious physical damage and death. When a threat actor hacks the system and takes full control of a car, the car becomes a destructive weapon that can be used to target specific individuals or the general public. What’s worse is that such a crime would be very difficult and expensive to solve as cybercriminals are much harder to catch.

Notice that under the third objective, a so-called cyberattack has crossed the line of cyberspace to threaten our physical safety. This has always been the biggest concern of autonomous driving. To prevent criminal groups and terrorists from destroying our transportation system, governments must work with industry experts to establish a complete international regulatory compliance for vehicle security.

In a traditional IT system, we create the network, then secure it. In a connected car system, we secure first, then ride. Having an unsecured car network is essentially the same as having a bridge built with substandard materials. This is why it is critical for us to understand where the weaknesses come from and protect them accordingly. To read more on the specific threats modern vehicles face, click here.