Cyber Resilience Act Explained: What It Means for the Automotive Industry

With the rapid rise of products utilizing AI, IoT, and connected technology, there has been growing concern across all industries of the cybersecurity risks associated with embedded technology. In response, in December 2024, the European Union put into force the Cyber Resilience Act (CRA), aiming to raise the baseline for security for all digital products and solutions sold in the EU.

Though the regulation originated in Europe, its impact will be global, as today’s interconnected market and supply chain crosses borders. Here’s a closer look at the CRA, why it matters, and its implications on the world’s automotive sector.

What is the Cyber Resilience Act?

The CRA is a legal framework that outlines cybersecurity requirements for products (both hardware and software) with digital elements sold within the European Union. The CRA casts a much wider net than requiring cybersecurity for traditional IT systems, covering everything from smart watches, refrigerators, to agricultural vehicles. In fact, the regulation not only applies to the products themselves, but the full lifecycle of IoT and digital products.

The objective of the CRA is to improve consumer safety, build trust in the digital marketplace, and ensure that manufacturers are held accountable for the security of their products. With this overarching regulation, the hope is that the CRA will foster more transparency for the digital ecosystem, ultimately encouraging innovation while still protecting both businesses and consumers from emerging cyber threats.

The CRA mandates a “security-by-design” approach, which means that companies must integrate cybersecurity from design through the end-of-life (EOL). It also requires vulnerability management and updates, along with compliance and documentation.

Key Implications for Industries Utilizing Connectivity

More and more industries are implementing connected technologies into their supply chain, which means the CRA targets a wide range of industries, including defense, IT infrastructure, and robotics/smart factory, to name a few.

Healthcare & Medical Devices: Many healthcare products now boast connectivity and dedicated user support. Products like remote monitoring tools, smart implants, and other medical devices must secure processed data and ensure device integrity.

Smart Manufacturing: Factories often use IoT and smart automation to optimize their factory lines. Networks and real-time operations must protect against cyberattacks that could disrupt industrial processes.

Space & Defense Systems: Satellites and mission-critical technologies must use robust protection to safeguard against cyber threats and protect sensitive operations for national security.

Agricultural Machinery: Like connected vehicles, agricultural transport is becoming much more connected and software-driven, meaning vehicles like autonomous tractors and sensor-based farming equipment must comply with the CRA as well.

CRA: More than the Law

The CRA represents more than just regulation within the EU. It signals a global shift towards mandatory cybersecurity standards for connected solutions, including all types of vehicles. Early preparation will be key, as manufacturers must utilize security-by-design principles from the development stage of all products.

The CRA introduces a risk-based product classification system, allowing a transition period until December 2027 for full compliance.

CRA timeline infographic

A lack of cybersecurity resilience increases likelihood of a cyber attack, which can not only lead to operational disruption and financial loss within a company’s supply chain and sales funnel, but can also result in legal ramifications. Non-compliance will result in fines of up to €15 million or 2.5% of global turnover and potential EU market bans, which could also result in a lack of brand awareness or worse, negative brand image.

Why the Automotive Industry Should Care

While most automotive vehicles are excluded from the CRA due to the overlapping nature of the CRA regulations with existing regulations (like the WP.29 R155 and EU General Safety Regulation, GSR), certain automotive components like digital components, aftermarket software, andconnected services, as well as vehicles not covered under R155 (like construction or agricultural vehicles) are still subject to the CRA.

Vehicles are complex digital ecosystems, and with more and more technology being embedded into the architecture, compliance will also become more complex. While the details of the CRA are still being worked out, the automotive industry will have to move quickly, as the impacts of the regulation will be wide-ranging. Manufacturers and suppliers can begin by aligning with existing guidelines for cybersecurity resilience in vehicles:

   •  Standard and Regulation Compliance: Automotive manufacturers will have to ensure that they comply with the existing regulations like UNR-155 and GSR, and are recommended to follow standards like ISO/SAE 21434 when it comes to vehicle architecture and connected platforms.

 •  Secure OTA Updates: Manufacturers can ensure that their Over-the-Air (OTA) capabilities are secure and efficient, and ensure that vulnerabilities are patched in real-time.

 •  Regular testing: Testing current architecture for vulnerabilities can be a great starting point to analyze where mitigation is needed.

 •  V2X security and Security Credential Management Systems: While a Security Credential Management System (SCMS) isn’t explicitly required by the CRA, it can support compliance by demonstrating security best practices.

AUTOCRYPT has been closely involved in cybersecurity regulatory compliance from the early stages, focusing on practical, optimized solutions for manufacturers and suppliers. Our expertise in automotive and IT cybersecurity empowers our partners to seamlessly meet regulatory requirements while strengthening their product reliability, market competitiveness, and maintain a positive brand image.

To learn more about the CRA, click here. To contact our team about how your company can get started with CRA compliance, contact global@autocrypt.io.

Exploring Maneuver Sharing and Coordinating Service (MSCS) in Autonomous Driving

Autonomous driving is advancing rapidly, with self-driving cars being tested in urban mobility, highways, and logistics. Have you ever wondered how these vehicles communicate to navigate safely? Unlike human drivers, who rely on signals and intuition, autonomous vehicles use data-sharing systems. This blog examines the limitations of cooperative driving systems and introduces Maneuver Sharing in Autonomous Driving through the Maneuver Sharing and Coordinating Service (MSCS) as a solution to improve vehicle communication, safety, and efficiency.

Current cooperative autonomous driving systems rely on Basic Safety Messages (BSMs) within Vehicle-to-Everything (V2X) communication. Each vehicle regularly transmits BSM data, sharing essential information such as speed, position, and heading with surrounding vehicles. This allows vehicles to assess potential collision risks and respond accordingly.

However, BSMs alone cannot convey the intent behind a vehicle’s movements. As shown in the graph below, a BSM provides only fundamental status data without explaining why a vehicle is moving in a certain way.

Basic Safety Messages within V2X

In other words, while BSMs enable cooperative autonomous driving, they lack the capability to communicate driving intentions. If vehicles could understand the purpose behind each movement in advance, particularly in emergency situations, driving safety and efficiency would significantly improve.

Real-World Scenario: The Need for MSCS

To illustrate this, let’s define two key entities:

  • HV (Host Vehicle): The vehicle transmitting its movement intention.
  • RV (Remote Vehicle): The vehicle receiving the movement information.

Now, consider a different scenario: What if the HV had already informed nearby RVs of its intent to change lanes in advance? In that case, the RV could adjust its route ahead of time, leading to a smoother and safer driving experience.

The same idea applies beyond driving. In any situation, whether at work, in school, or during teamwork, understanding someone’s intentions before they act allows for better planning, coordination, and overall efficiency.

What is MSCS?

To overcome the limitations of BSMs, the Maneuver Sharing and Coordinating Service (MSCS) offers a smarter approach to cooperative driving.

MSCS enhances V2X communication by enabling vehicles to share their intended maneuvers. Understanding the purpose behind a vehicle’s movement enables better analysis and response, enhancing overall road safety and efficiency.

Unlike traditional BSM-based driving, which reacts to real-time data, MSCS enables proactive decision-making by considering the planned maneuvers of surrounding vehicles. This advancement leads to a smoother and more coordinated driving experience.

Autonomous Maneuver Sharing in SAE J3186 standards

MSCS operates in compliance with SAE J3186 standards, which defines its primary use cases as:

  1. Cooperative Lane Change
  2. Cooperative Lane Merge

These scenarios demonstrate how MSCS enables smoother lane changes and merges by allowing vehicles to communicate their intended movements. Through MSCS, vehicles notify one another and cooperate to execute maneuvers safely.

It is important to note that MSCS is designed to function based on vehicle intent and follows two distinct communication protocols:

  1. General Vehicle Protocol: Requires mutual negotiation through request and response interactions.
  2. Emergency Vehicle Protocol: Prioritizes emergency vehicles (e.g., ambulances, police cars) without requiring negotiation from surrounding vehicles.

In general, standard vehicles (following the General Vehicle Protocol) must yield to emergency vehicles (following the Emergency Vehicle Protocol). This ensures that special-purpose vehicles can operate efficiently without mutual negotiation.

By implementing MSCS, vehicles can share movement intentions, enabling others to adapt proactively. This results in safer, more efficient, and cooperative autonomous driving.

MSCS and MSCM

Next, let’s differentiate between MSCS and MSCM to explore the operational aspects of MSCS.

  • MSCS (Maneuver Sharing and Coordinating Service): The overall system that enables maneuver coordination
  • MSCM (Maneuver Sharing and Coordinating Message): The message exchanged between vehicles to communicate movement intent

The graph below illustrates the structure of MSCM:

Structure of Maneuver Sharing and Coordinating Service (MSCM)

In MSCS, a Maneuver represents a coordinated movement involving multiple vehicles, while a Sub-Maneuver refers to the individual actions each vehicle takes to carry out that Maneuver.

The Executing Vehicle (HV) initiates the Maneuver request and identifies surrounding Affected Vehicles, which receive MSCM messages to coordinate movement. HV must obtain agreement from Affected Vehicles unless it is an emergency vehicle.

MSCM Data Structure

MSCM Data Structure

MSCM messages contain key data components, including the MSCM Type, which classifies messages into one of eight types:

Autonomous Maneuver Sharing: MSCM Type

Additionally, each Maneuver in MSCM consists of multiple Sub-Maneuvers, structured as follows:

Sub-Maneuvers Data

In conclusion, there are 8 types of protocols for each Maneuver in MSCM.

MSCS Operational Process

To understand the operation of MSCS, let’s examine how it functions in standard vehicles. The system follows three sequential stages:

  1. Awareness State
  2. Maneuver Negotiation State
  3. Maneuver Execution State

MSCS Operational Process

  1. Awareness State
    • This is the preliminary stage of MSCS operation
    • While vehicles are aware of their surroundings via BSM, they have not initiated MSCS yet
    • Only MSCM Type 0 messages (intention notifications) can be sent in this stage
  2. Maneuver Negotiation State
    • Vehicles begin negotiating the execution of a Maneuver
    • Emergency vehicles skip this step, as negotiation is not required
    • MSCM Types 1-3 are used to request and confirm Maneuvers, while Types 4-5 handle cancellations
  3. Maneuver Execution State
    • Vehicles execute the approved Maneuver
    • The HV and RV reach a mutual agreement and act accordingly
    • MSCM Type 7 messages confirm execution, and the Maneuver concludes when all Sub-Maneuvers are completed.

In conclusion, Maneuver Sharing and Coordinating Service (MSCS) represents a significant advancement in autonomous driving, allowing vehicles to communicate their movement intentions and not just their basic status. By enhancing Vehicle-to-Everything (V2X) communication, MSCS improves safety, coordination, and efficiency on the road. Unlike traditional systems that react to real-time data, MSCS enables proactive decision-making, particularly in complex scenarios like lane changes or merges.

With protocols that prioritize emergency vehicles and ensure smooth coordination, MSCS creates a structured environment for vehicles to work together seamlessly. This proactive approach helps prevent collisions, reduces traffic congestion, and leads to safer, more efficient roads. As autonomous vehicles continue to evolve, MSCS will be at the forefront of shaping a future where roads are not only safer but also smarter, bringing us closer to a fully integrated, autonomous transportation system.

 


To stay informed about the latest news on mobility tech and software-defined vehicles, read our blog for more technology insights or subscribe to AUTOCRYPT’s monthly newsletter.

Exploring the Future of Mobility: What is a Software-Defined Vehicle?

In recent years, the automotive industry has been abuzz with the term “software-defined vehicle” (SDV). With an increasing number of original equipment manufacturers (OEMs) claiming to be at the forefront of SDV development, it’s essential to understand what truly makes a vehicle software-defined. In this blog post, we will delve into the concept of SDVs, their current state of development, and the industry trajectory for the future. 

The Ultimate SDV: What Does It Entail? 

Before we dive into the ultimate vision for SDVs, it’s crucial to recognize that modern vehicles already incorporate various software-defined features like in-vehicle infotainment, driver assistance systems, and cellular connectivity technologies. These features are adding advanced capabilities to our vehicles, digitizing the way we interact with our cars and improving the driving experience. However, they do not represent the final destination of SDV technology. 

The ultimate SDV is a vehicle that has undergone a profound transformation in its design and functionality. It is not just about adding software-enabled features, it’s about making software the central nervous system of the vehicle.  

An SDV’s value lies primarily in the software that enables advanced capabilities like cloud connectivity and autonomous driving. And while the hardware is still important, software will be the differentiating factor in new generation SDVs. Software maintenance and upgrading will be the most economical, convenient, and efficient way for future OEMs to provide a differentiated product and improve customer satisfaction. OEMs are spending countless resources on R&D to make this possible. 

The ultimate software-defined vehicle is a supercomputer vehicle that supports increased flexibility, customization, and remote upgradeability of functionalities.  

A crucial element that enables this level of flexibility in SDVs is cloud connectivity which powers over-the-air (OTA) software downloads and updates. Vehicle-cloud connectivity has the potential to significantly cut back costs for new software rollouts, as new functionalities can be introduced over-the-air without the need to alter underlying hardware.  

Besides development cost savings, OTA software implementation can create monetary value in the face of software subscription models for OEMs. We have already seen this phenomenon rise in the industry with the likes of Tesla offering subscription-based functionalities, like full self-driving, to its customers. 

The goal of the industry is to reach a point where vehicle software and hardware development can be done independently from each other. This will require the entire industry to embrace innovation and shift away from the traditional vehicle manufacturing process. 

Necessary Technology for SDVs 

Emphasizing the role of software in a vehicle will require separating vehicle software from its hardware. Achieving complete software and hardware decoupling requires a fundamental shift in vehicle architecture and supply chain operations.  

Traditionally, Tier 2 electronic control unit (ECU) manufacturers embed software within the hardware. This limits OEMs from implementing software changes down the road. The decoupling of software from hardware would allow the vehicle software to operate independently, similar to a smartphone. Applications can be downloaded from the app store and updated OTA. 

In addition, complete software-hardware decoupling has the potential to significantly accelerate software development times. This enables scaled and continuous software improvement across a vehicle’s serviceable life, all while incurring lower development costs.  

Reaching decoupling will take a complete reshuffling of the current distributed electrical/electronic (E/E) vehicle architecture into a centralized system defined by a central computing unit. This cardinal change is needed due to the fact that a distributed vehicle architecture cannot keep up with the increasingly higher computing power needed for SDVs. On the other hand, if a car has 100 ECUs, all of these ECUs would have different embedded software that could be based on completely different platforms. This makes software implementation very difficult, if not impossible.  

Centralizing vehicle electronics simplifies management and allows for more efficient software integration. The development of a centralized architecture would allow OEMs to implement software updates directly to the central processing unit, which is exponentially more time and cost-efficient. It will also encourage OEMs to utilize standardized or open-source software platforms for SDVs. This shift will allow for higher system integration within the vehicle and functions like high-speed connectivity to the cloud, other vehicles, and smart infrastructure. 

Moreover, open-source software is gaining traction in the automotive sector. Open-source software platforms provide a collaborative environment for developers to contribute to SDV technology, accelerating innovation. 

Current State and Future Trajectory 

The entire automotive industry is currently in the midst of the transformation towards software-defined vehicles. Normally, Tier 2 component suppliers, who are in charge of embedding software within their chips, do not have direct contact with OEMs and have to go through Tier 1 suppliers. However, nowadays we are witnessing a seismic shift in supply chain operations signified by a demand for software suppliers. Tier 2 and pure-play software developers are gaining a stronger position within the supply chain, indicating a shift towards prioritizing software expertise. As the automotive industry is going through a technological shakeout, the supply chain is also turning more horizontal, allowing for less restricted relations between supply chain participants. 

Furthermore, there is a rising trend of industry collaboration as automakers realize the complexity and scale of SDV development. We have seen some of the largest traditional OEMs welcome partnerships with technological companies. Stark examples are partnerships between Qualcomm and Mercedes-Benz, BMW and Amazon, BYD and Baidu, where automakers are turning to tech companies to spearhead SDV development.  

Cross-industry partnership is showing that the automotive sector is ready to stir away from tradition in the name of innovation.  

Regulations and Standards 

As the SDV landscape evolves faster than ever, regulations and standards play a crucial role in ensuring vehicle safety and security. The United Nations UNECE WP.29 set out two regulations for vehicle type approval. UN R155 addresses vehicle type approval with a focus on cybersecurity and cybersecurity management systems, and UN R156 mandates secure software updates and implementation of software update management systems. 

These regulations enforce software-defined vehicle development that is secure by design. UN R155 mandates that cybersecurity principles are implemented at the core of business processes, vehicle architecture design, risk assessment, and security control implementation. This means that cybersecurity regulations are implemented throughout the entire supply chain.  

While these regulations are legally binding for the countries that have signed the agreement, ISO/SAE 21434 serves as an international standard for road vehicle cybersecurity engineering. Companies may choose to adhere to this standard voluntarily. 

Enabling SDVs is more than just creating advanced software for vehicles. SDVs must be designed with cybersecurity as a core element. Regulations and standards ensure safe and standardized SDV development.  


The concept of software-defined vehicles represents a transformative shift in the automotive industry. The ultimate SDV envisions complete software and hardware decoupling, cloud-based software, and a smart, connected driving experience. With the industry’s current trajectory towards SDV development, coupled with evolving regulations, we are witnessing the dawn of a new era in mobility where software takes the driver’s seat. 

AUTOCRYPT secures the rapidly evolving mobility space with in-vehicle cybersecurity solutions developed according to WP29 and ISO standards. Backed by decades of expertise in automotive cybersecurity we ensure a safe transition to software-defined vehicles.  

To learn more about our services and solutions contact global@autocrypt.io

When Last Mile Delivery Turns Autonomous – What are the Considerations?

As more of our lives becomes connected to networks and online services, we are finding that previously labor-intensive tasks like getting groceries or using public transportation are becoming streamlined as reservations and payments can be made online, even bringing items to your front door. But with increased connectivity comes greater expectations for faster, efficient, affordable, and secure services and deliveries.

The delivery process may seem straightforward – order your product, the seller arranges products for delivery, and the delivery service brings it to you – the actual process of getting the many different products with different supply chains together in one place, then arrange the transport going from the hub to the final destination. This portion of the trip is called “last-mile delivery” as it’s one of the trickiest parts of the supply chain process. Not only is last mile delivery the part that we as consumers often care the most about, last mile delivery accounts for around 53% of the total cost of shipping and sellers are taking less of a cut as supply chains struggle to meet demand and deadlines.

last mile delivery challenges

(Source: EFT)

Last mile deliveries are often inefficient because of the sheer volume of deliveries necessary with a low drop size. This means that efficiency is virtually impossible with retail sales only going up, especially with a global pandemic.

Taking care of the last-mile challenge

The supply chain management industry experts have been looking for solutions to this dilemma. Many have pointed to models that utilize digital platforms to crowdsource local services to ensure that consumers are able to get what they need. Instead of manually dispatching delivery people to make the trip, platforms will utilize machine learning and AI to quicken this process.

Another solution that many companies are already cashing in on is the concept of autonomous delivery technology, with the market expected to reach 84.72 billion USD by 2030. In order to make last-mile deliveries more efficient and truly door-to-door, development has been focused on autonomous pods, which can navigate more difficult and uneven terrain to ensure completion of delivery.

Smaller pods focus on small, dynamic designs to ensure efficiency in last-mile delivery. This allows for reduced costs in the delivery pod itself, as well as increased security as the vehicles do not actually carry human beings, allowing for more focus on the actual delivery and of the safety of those around them. Especially with the global pandemic, solutions like autonomous delivery allow for contactless service, without driving up costs. Analysts at McKinsey found that semiautonomous and autonomous technology reduce delivery costs on average by approximately 10 to 40 percent.

Autonomous delivery challenges

We can already see this crowdsourcing model mentioned in the previous section in the real world, prevalent in industries like transportation (think ride-hailing apps), food delivery, and retail apps. But this solution isn’t without challenges of its own, as local services still have a high maintenance cost, and with actual human drivers, there’s likely going to be a larger margin of error and limitations.

This is why tech industry experts say that long-term, autonomous driving technology is the answer. Autonomous vehicle technology has made great headway in the last decade – from the testbeds to public roadways — and while use cases are moving from theoretical plans to reality, there’s still a lot of doubt and logistical issues when it comes to application.

Technology and infrastructure limitations

While there are some companies who have gotten the autonomous delivery robot/pod concept to real-world application, there’s still a lot at risk in terms of how the technology works. Passenger vehicles have yet to be at a Level 4 of autonomous driving (according to the SAE regulations), so it’s not completely realistic to expect autonomous pods to be at this level. We need to be careful to ensure that the priority is placed in keeping human beings (pedestrians and vehicle passengers) safe when pods are navigating through streets.

While the technology is being developed, we also must remember that technology can’t be the only thing to change. Cities also need to ensure that current infrastructure supports the autonomous delivery movement, for example, making sure that roads are paved properly and that any obstacles like potholes or cracks are quickly repaired.

Lack of universal standards and liability regulations

To deal with the infrastructure challenges mentioned in the earlier section, there needs to be universal regulations that allow for both services and end users to use services more effortlessly across state or even country-lines.

In countries like the United States where there are differing federal and state regulations, using mobility services like last-mile deliveries with autonomous technologies can be a challenge. For example, in the state of Pennsylvania, autonomous delivery bots are allowed to maneuver their way through sidewalks as well as roadways. They are technically considered “pedestrians” meaning that the bots can move at a maximum speed of 12 miles per hour in a pedestrian area with a load limit of 550 pounds. This isn’t true for all states as some have no regulations regarding delivery systems like this, while others require permits to be issued by the state.

These technicalities can make a major difference when it comes to not only service operations, but also liability frameworks in the case of an accident. As autonomous technology has not yet been perfected, there is risk when it comes to operation no matter how safe the company deems it. A universal standard or regulation will allow for the risk to be minimized, as much as possible.

Risks of security breach

Because of the groundbreaking nature of this technology, many often focus on the issues surrounding the technology itself. However, we must remember that this technology is connected in nature, meaning that thousands of messages containing data are being exchanged each second in each vehicle. With data like PII, vehicle data, as well as access points to connected devices, a successful breach can be a goldmine for malicious actors.

While autonomous delivery vehicles like pods or robots do not carry any passengers, the personal data that they carry, their operations on pedestrian sidewalks, as well as the close nature of door-to-door delivery still carries implications that we must consider before application.

Short and long-term solutions for autonomous delivery

The technology for autonomous delivery bots will continue to progress. But how quickly this happens depends on other factors. In the long run, standards and regulations will have to be made by legislators and committees, which will influence new infrastructure that will enable this kind of technology to have more widespread adoption.

In the short-term, however, both manufacturers of these pods as well as service providers can prioritize security like authentication and encryption, ensuring that the data stays private. Security solutions can be built into the chipsets in the manufacturing stage, protecting data privacy before vehicles, and pods, hit the road. Solutions like these can ensure that vehicles of all sizes protect not just the items carried inside, but also those around them.

The Role of Machine Learning in Strengthening Autonomous Vehicle Security

With Tesla considered one of the best bubble stocks for 2021 (shares soared 743% in 2020 and made Elon Musk the richest person in the world for a few days), the company is at the center of people’s attention as it’s been evolving on a very public stage. While the market indicates an increasing interest in autonomous driving, AAA’s 2019 annual vehicle survey found that 71 percent of Americans are afraid to ride in self-driving vehicles, especially after several high-profile incidents came to light the past few years.

The statistics above suggest that we may still be a few years away from driving fully autonomous cars. For self-driving cars to be fully autonomous, they need to deploy technologies such as RADAR (Radio Detection And Ranging), and LiDAR (Light Detection And Ranging) as well as algorithms to detect and respond to surroundings.

Can Autonomous Vehicles Be More Dangerous Compared to Traditional Vehicles?

Autonomous vehicles can be much more vulnerable than other devices we use in our daily lives as they utilize a combined deployment of various sensors and vehicle-related technologies. It’s known that even a single vulnerability can allow hackers to exploit the entire vehicle – meaning hackers may not only gain access to the operating system but possibly the entire network as well.

What’s more, autopilot has helped set the standard for numerous autonomous vehicles and gave a taste of what self-driving cars will be like in the near future. However, experts at the Tencent Keen Security Lab demonstrated that they could remotely compromise the Autopilot system on a Tesla vehicle. Even though the bug was promptly fixed after the presentation, this situation sheds some light on the potential for exploitation. As autonomous vehicles rely highly on “connectivity” itself, there’s no doubt that hackers see autonomous vehicles as tempting targets that contain countless amounts of data that can be used to exploit the system, which in theory could end up destroying every single aspect of the vehicle.

That is why in-vehicle security and the complexities involved have been the major focus of any discussion about autonomous vehicles. In-vehicle security isn’t just about protecting and securing the autonomous vehicle itself, but rather about mitigating as many risks as possible through the delivery of a comprehensive and holistic approach to automotive driving security.

How Can Autonomous Vehicles be Secured?

In order to secure the whole autonomous driving process, an important fact needs to be emphasized; these vehicles aren’t like the traditional ones out there. The complexity of autonomous vehicles makes it far more difficult to fully secure the vehicle – though it’s not impossible – and the only way to do that is by prioritizing security.

One possible solution is in-Vehicle Security (IVS) which is the car’s first line of defense that helps protect vehicles from external threats, monitors all relevant communications, and responds to any abnormal activity. As a result, deploying IVS is what’s most important in securing the vehicle. IVS needs a reliable Intrusion Detection System (IDS) that provides the security modules needed to guarantee safe communications between Electrical Control Units (ECUs).

Additionally, with the adoption of new regulations, it’s important to make sure that your provider is prepared to meet the requirements of WP.29 along with other industry standards of deploying a system that secures communication between vehicles, devices, and infrastructures.

This is where machine learning comes in.

How Can Machine Learning Enhance the Security of Autonomous Vehicles?

Machine learning is the process of using, storing, and finding patterns within massive amounts of data, which can eventually be fed into algorithms. It’s basically a process of using the data accumulated by the machine or device that allows computers to develop their own algorithm so that humans won’t have to create challenging algorithms manually.

With all the features and applications of machine learning, it’s easy to understand how our collected data are stored and used via a proper platform which in turn analyzes logs and patterns. In this way, this platform can warn and even mitigate risks occurring within the vehicle.

In other words, once the logs are collected and stored, machine learning technology can start analyzing and detecting these logs to see if there are any abnormalities. As machine learning enhances the detection model, it develops algorithms that can be used to detect malware activities and unusual behaviors of the vehicle. This process enhances the driver assistance technology by classifying the right data and patterns through various sensors attached to the vehicle.

Moreover, thanks to the advances in wireless technologies, a vehicular (ad-hoc) network is being formed among moving vehicles or RSUs (Roadside Units) and other communication devices. This network is considered a proprietary system that is seen differently from average computer networks, making it easier to predict the movements of vehicles. Machine learning can be employed in training algorithms from the very beginning to detect malicious exploits by differentiating normal from acute driving behavior which alerts the driver and prevents an attack.

In order to realize this, NXP is taking the lead in manufacturing microcontrollers with AI and machine learning capabilities that can be plugged into the OBD-II port. This not only observes but also allows the device to capture the vehicles’ data patterns to detect and monitor any abnormalities. Once it’s monitored, the microcontroller basically tries to prevent and alert the driver and becomes the replacement for traditional algorithms employed in vehicles.

Autonomous Driving is Not the Distant Future

It’s important to realize that autonomous vehicles that aren’t prioritizing security will cause far more serious consequences that involve physical harm or could even be abused by rogue nations and terrorists that are looking to cause chaos. Therefore, different security technologies must be considered when designing the security architecture from the very beginning.

Also, machine learning can become an essential tool for OEMs, Tier-1 suppliers, or manufacturers that are looking to secure their autonomous vehicle and driving-related resources. After all, the new transportation system will need a total security solution that covers from intelligent transport system to in-vehicle, charging and connections security.

AUTOCRYPT’s Automotive Cybersecurity Solutions

AUTOCRYPT provides a total vehicle security solution that secures all parts of a vehicle by providing various security modules such as firewalls, authentication systems, to secure the vehicle from end to end.

To keep informed with the latest news on mobility tech and automotive cybersecurity, subscribe to AUTOCRYPT’s monthly newsletter.

How Autonomous Vehicles Solve Urban Space Shortage

With more than half of the global population living in cities, space shortage is becoming an increasingly urgent problem for urban planners and developers. The two major challenges that impact urban residents the most are housing shortage and parking space shortage.

Housing shortage can be partially resolved by utilizing vertical space. Indeed, the number of skyscrapers built for residential use is quickly overtaking that of office buildings in major cities across the world from Toronto and Vancouver to Sydney and Melbourne. Yet even doing so is not enough to cool down the housing shortage as non-resident investors drive up demand.

In this blog, we focus on discussing the second challenge. In fact, parking space shortage and traffic congestion are much more difficult to deal with than housing shortage. As one can imagine, building upwards is not an option because it would be ridiculously expensive and inefficient to have a 30-storey parkade. Also, most cities do not have enough public funding to build elevated highways and tunnels at a large scale.

Like it or not, this urban movement is set to continue as the UN projects global urban population to reach 68% by 2050. Just as urban researchers are seeking new creative ways to solve space shortage, an unexpected potential solution has gained popularity both in theory and in practice — autonomous vehicles. Self-driving cars are expected to solve urban space shortage in three different ways: 1) by reducing the need for parking space, 2) by reducing traffic congestion, and 3) by increasing vehicle occupancy rate.


How Do Autonomous Vehicles Reduce the Need for Parking Space?

The idea is to have cars park themselves in the parking lot so that drivers can get off the car at the entrance and let the car do the rest of the job, just like having an automated valet parking system. So how and why does this system reduce the need for parking space?

First of all, each single parking slot for autonomous vehicles can be made much smaller than a conventional parking slot. This is because a conventional parking slot has to leave enough space for the car doors to open on both sides so that passengers can get off. When it comes to autonomous vehicles, the driver and passengers can get off the car ahead of time before the car enters the slot, so that no extra space is needed on the sides of the car.

Another reason is a reduction in the need for driveways. In a conventional parking lot, the driveways take up about half of the total land area (see Figure 1a). Civil engineering researchers at the University of Toronto have shown through their work that autonomous vehicles could potentially decrease the need for parking space by an average of 62% and a maximum of 87% (Nourinehjad, Bahrami, and Roorda 2018)*. The reason is that instead of having a driveway between every two rows of parked vehicles, a parking lot that is fully dedicated to autonomous vehicles only needs a driveway between every four rows of parked vehicles. In other words, there can be up to four rows of vehicles parked together without any driveways in between (see Figure 1b). When a “landlocked” vehicle needs to get out, the vehicle in front of it would automatically move out to free its way.

Figure 1. a) Conventional Parking Lot vs. b) Autonomous Vehicle Parking Lot
(Nourinehjad, Bahrami, and Roorda 2018)*

Nourinejad, M., Bahrami, S., & Roorda, M. J. (2018). Designing parking facilities for autonomous vehicles. Transportation Research Part B: Methodological, 109, 110-127.

How Do Autonomous Vehicles Reduce Traffic Congestion?

A common misconception is that autonomous vehicles are nothing more than cars with sensors that detect surrounding environments. In reality, SAE Level 4 and Level 5 autonomous vehicles are much more sophisticated than that. These vehicles are able to communicate with other vehicles on the road, with pedestrians and cyclists, with traffic lights, and with the entire transportation infrastructure, all through the internet. All the communications are enabled by V2X (vehicle-to-everything) technology embedded into the vehicles, and end up forming a massive smart transportation network. This brings us to the question: how does V2X technology reduce traffic congestion?

Surprisingly, the main cause of traffic congestion is not having too many cars on the road, but the delays caused by each driver’s reaction time. When a traffic light turns green, for example, it takes a second or two for the driver at the front row to notice the signal change and another 0.5 second before pressing the pedal, the driver behind starts pressing the pedal 0.5 second after the first car moves forward, and this 0.5 second delay stacks up for every car behind, accumulating to a significant latency — this is assuming that everyone pays full attention to the road. (We all know that one bad driver who is just too busy on their phone to pay attention to the signal change.)

With V2X technology, all cars waiting in line would be notified of the signal change with near-zero latency, so that all cars can start accelerating at the same time and move forward at the same speed. This would significantly reduce traffic jams. A research team from the Delft University of Technology discovered through their virtual experiment that under a particular traffic jam which lasted an average of 41.7 minutes with an average speed of 11.7 km/h, if only 10% of all vehicles had V2X technology, the average lasting time would be reduced to 3.6 minutes with the average speed increased to 41 km/h. This huge improvement is made possible by all vehicles being able to accelerate and brake at the same time (Wang, Daamen, Hoogendoorn, and Bart van Arem 2015)*.

* Wang, M., Daamen, W., Hoogendoorn, S. P., & van Arem, B. (2015). Cooperative Car-Following Control: Distributed Algorithm and Impact on Moving Jam Features. IEEE Transactions on Intelligent Transportation Systems, 17(5), 1459-1471.

How Do Autonomous Vehicles Increase Occupancy Rate?

According to the National Household Travel Survey conducted by the US Department of Transportation, the average occupancy rate of vehicles on American roads dropped from 1.59 in 1995 to 1.54 in 2007. This means that not only are we having more cars on the road, each car is carrying less people, with a majority of cars on the road occupied by only one person. This low occupancy rate is largely due to the inconvenience of the public transit system of North American cities.

As SAE Level-5 autonomous vehicles start to go into their testing phase, traditional car manufacturers are starting to seek potential in the ridesharing market. Take General Motors’ subsidiary firm Cruise for example, the company recently developed Origin, a line of electric shuttle vans that are specifically designed for ridesharing. Without any driver’s seat and steering wheel, the vehicle is expected to travel fully autonomously on designated city streets, making ridesharing much easier and comfortable. As autonomous ridesharing becomes increasingly convenient to use, vehicle occupancy rates in cities are expected to increase, reducing the burden of city roads.

AUTOCRYPT’s Role in Autonomous Driving

AUTOCRYPT is a total cybersecurity solutions provider for automobiles, providing all the security software components that are necessary (and soon mandatory) to keep autonomous vehicles safe on the road. With two decades of experience in authentication and data encryption technologies, AUTOCRYPT’s solutions ensure the legitimacy of all parties involved in V2X communications and the integrity of all data being transmitted. Recognized as the best automotive cybersecurity product/service by the prestigious TU-Automotive Awards, and one of the top 5 global market leaders for V2X cybersecurity by Markets and Markets, AUTOCRYPT is the foundation for the future of autonomous driving, ridesharing, and everything mobility.

Watch this video to see a brief introduction of AUTOCRYPT.

To learn more details about AUTOCRYPT’s solutions and services, click here.

To keep informed with the latest news on mobility tech and automotive cybersecurity, subscribe to our monthly newsletter.