Cyber Resilience Act Explained: What It Means for the Automotive Industry

With the rapid rise of products utilizing AI, IoT, and connected technology, there has been growing concern across all industries of the cybersecurity risks associated with embedded technology. In response, in December 2024, the European Union put into force the Cyber Resilience Act (CRA), aiming to raise the baseline for security for all digital products and solutions sold in the EU.

Though the regulation originated in Europe, its impact will be global, as today’s interconnected market and supply chain crosses borders. Here’s a closer look at the CRA, why it matters, and its implications on the world’s automotive sector.

What is the Cyber Resilience Act?

The CRA is a legal framework that outlines cybersecurity requirements for products (both hardware and software) with digital elements sold within the European Union. The CRA casts a much wider net than requiring cybersecurity for traditional IT systems, covering everything from smart watches, refrigerators, to agricultural vehicles. In fact, the regulation not only applies to the products themselves, but the full lifecycle of IoT and digital products.

The objective of the CRA is to improve consumer safety, build trust in the digital marketplace, and ensure that manufacturers are held accountable for the security of their products. With this overarching regulation, the hope is that the CRA will foster more transparency for the digital ecosystem, ultimately encouraging innovation while still protecting both businesses and consumers from emerging cyber threats.

The CRA mandates a “security-by-design” approach, which means that companies must integrate cybersecurity from design through the end-of-life (EOL). It also requires vulnerability management and updates, along with compliance and documentation.

Key Implications for Industries Utilizing Connectivity

More and more industries are implementing connected technologies into their supply chain, which means the CRA targets a wide range of industries, including defense, IT infrastructure, and robotics/smart factory, to name a few.

Healthcare & Medical Devices: Many healthcare products now boast connectivity and dedicated user support. Products like remote monitoring tools, smart implants, and other medical devices must secure processed data and ensure device integrity.

Smart Manufacturing: Factories often use IoT and smart automation to optimize their factory lines. Networks and real-time operations must protect against cyberattacks that could disrupt industrial processes.

Space & Defense Systems: Satellites and mission-critical technologies must use robust protection to safeguard against cyber threats and protect sensitive operations for national security.

Agricultural Machinery: Like connected vehicles, agricultural transport is becoming much more connected and software-driven, meaning vehicles like autonomous tractors and sensor-based farming equipment must comply with the CRA as well.

CRA: More than the Law

The CRA represents more than just regulation within the EU. It signals a global shift towards mandatory cybersecurity standards for connected solutions, including all types of vehicles. Early preparation will be key, as manufacturers must utilize security-by-design principles from the development stage of all products.

The CRA introduces a risk-based product classification system, allowing a transition period until December 2027 for full compliance.

CRA timeline infographic

A lack of cybersecurity resilience increases likelihood of a cyber attack, which can not only lead to operational disruption and financial loss within a company’s supply chain and sales funnel, but can also result in legal ramifications. Non-compliance will result in fines of up to €15 million or 2.5% of global turnover and potential EU market bans, which could also result in a lack of brand awareness or worse, negative brand image.

Why the Automotive Industry Should Care

While most automotive vehicles are excluded from the CRA due to the overlapping nature of the CRA regulations with existing regulations (like the WP.29 R155 and EU General Safety Regulation, GSR), certain automotive components like digital components, aftermarket software, andconnected services, as well as vehicles not covered under R155 (like construction or agricultural vehicles) are still subject to the CRA.

Vehicles are complex digital ecosystems, and with more and more technology being embedded into the architecture, compliance will also become more complex. While the details of the CRA are still being worked out, the automotive industry will have to move quickly, as the impacts of the regulation will be wide-ranging. Manufacturers and suppliers can begin by aligning with existing guidelines for cybersecurity resilience in vehicles:

   •  Standard and Regulation Compliance: Automotive manufacturers will have to ensure that they comply with the existing regulations like UNR-155 and GSR, and are recommended to follow standards like ISO/SAE 21434 when it comes to vehicle architecture and connected platforms.

 •  Secure OTA Updates: Manufacturers can ensure that their Over-the-Air (OTA) capabilities are secure and efficient, and ensure that vulnerabilities are patched in real-time.

 •  Regular testing: Testing current architecture for vulnerabilities can be a great starting point to analyze where mitigation is needed.

 •  V2X security and Security Credential Management Systems: While a Security Credential Management System (SCMS) isn’t explicitly required by the CRA, it can support compliance by demonstrating security best practices.

AUTOCRYPT has been closely involved in cybersecurity regulatory compliance from the early stages, focusing on practical, optimized solutions for manufacturers and suppliers. Our expertise in automotive and IT cybersecurity empowers our partners to seamlessly meet regulatory requirements while strengthening their product reliability, market competitiveness, and maintain a positive brand image.

To learn more about the CRA, click here. To contact our team about how your company can get started with CRA compliance, contact global@autocrypt.io.

Post-Quantum Cryptography, and the Future of Automotive Cybersecurity 

As of late, there’s been a lot of worried and concerned discussion regarding quantum computing. There are concerns that once quantum computers become available, all IT systems will collapse and be hacked; some blockchain enthusiasts worry that cryptocurrencies will become obsolete; governments worry that national security systems may be compromised. Are these valid concerns? In today’s blog, we’ll explore what quantum computers are and what we can do to manage concerns about the future.  

What is Quantum Computing?

The modern-day computer uses “bits” as the basic unit, while quantum computers use “qubits.” The key difference is the way that qubits exist. For example, a bit can be a 0 or a 1, but a qubit can be a 0, 1, or both at the same time. Imagine a spinning coin. While spinning, a coin can be both heads and tails. In quantum mechanics, this is called the principle of superposition, and this superposition allows for quantum computers to process many possibilities simultaneously.  

Another interesting property of qubits is entanglement. When qubits are “entangled,” the state of one qubit is directly related to the state of another. This means that if a qubit changes its state, it will instantly affect the other. This phenomenon of qubits enables quantum computers to perform complex calculations far more quickly than a computer using bits, which processes information in a linear, sequential manner.  

Quantum computers are still in the early stages of development, and larger tech companies have already begun to create and use quantum computers for research and experimentation. Many experts will say that the quantum computers available today have a relatively small number of qubits and are susceptible to errors. However, some are optimistic that the technology will achieve more accuracy and broader use very soon. 

What is Post-Quantum Cryptography (PQC)?

While quantum computing holds great promise for solving more complex problems, it also presents a great risk. If misused, quantum computers could, in theory, break encryption methods that secure sensitive data like personal communications, banking transactions, and even confidential government data.  

This is why the development of Post-Quantum Cryptography is crucial to safeguard against this potential threat.  

Post-quantum cryptography (PQC), in simple terms, refers to cryptographic algorithms that are secure even in quantum computing environments. Unlike the traditional cryptographic systems we use today, such as RSA or ECDSA, PQC algorithms rely on mathematical structures that quantum computers are less likely to break, such as lattice-based, hash-based, code-based, or multivariate polynomial-based.

Developing PQC for different use cases is essential because if we wait until quantum computing reaches supremacy, it could quickly render current cryptographic systems obsolete, leaving data vulnerable. The transition to PQC should begin now, as preparing for a quantum future will require proactive effort to ensure cybersecurity frameworks remain intact and resilient.  

PQC Standardization and Regulatory Development

In 2016, the National Institute of Standards and Technology (NIST) launched a competition to standardize PQC. Researchers from all over the world submitted algorithms and through several rounds, 82 proposals were reviewed and in 2022 four algorithms were chosen: SPHINCS+, CRYSTALS-DILITHIUM, CRYSTALS-KYBER, and FALCON. They are incorporating these standards into the Federal Information Processing Standards (FIPS) document, and additional rounds will likely select new algorithms for digital signatures or other uses.  

In April 2024, the European Commission published a recommendation for member states to develop a strategy for implementing PQC, which would define clear goals and timelines for the implementation. This has led several workstreams and think tanks to actively participate in developing and implementing PQC into the European digital infrastructure.  

In 2022, the U.S. passed the “Quantum Computing Cybersecurity Preparedness Act,” which included a federal mandate for federal agencies to transition to PQC. The NSA announced that by 2035, all national security systems should implement PQC.  

In South Korea, the transition to PQC is being actively addressed by the National Intelligence Service and the Ministry of Science and ICT. They released their roadmap for transitioning to quantum-resistant cryptographic systems in 2020, and the roadmap was designed to span over a 15-year period, setting the goal of fully integrating PQC by 2035. 

PQC in Automotive Cybersecurity

The global implementation of PQC roadmaps is ongoing, and use cases can vary across governments and organizations, but one of the most important areas is the automotive industry. As modern vehicles are increasingly becoming software-centric, vehicle architecture is becoming increasingly sophisticated, integrating advanced connectivity features like OTA updates and V2X communications. These advancements enable smarter and more convenient mobility but also create a myriad of cybersecurity challenges if the vehicle architecture is breached, as many of the cryptographic methods were designed for more traditional computing environments.  

However, though regulations and standards do not yet mandate its implementation, manufacturers, suppliers, and solution providers in the industry have already begun to explore and evaluate PQC implementation:  

  • NXP Semiconductors is developing quantum-resistant firmware updates for vehicle applications 
  • Vodafone is testing PQC-secured VPNs, which is focused more on network security, but the company states it could be extended to connected vehicle applications 
  • LG U+ showcased its PQC-based applications like secure digital keys and infotainment systems at CES 2023, and continues to develop quantum-resistant technology for network and cellular applications 

As with traditional IT systems, once quantum computing reaches supremacy, vehicle systems could be vulnerable to attacks. Transition to PQC before quantum computing reaches practical implementation is crucial, as many worry that bad actors could already be stockpiling encrypted automotive data, waiting for quantum computing to enable them to decrypt, a long-term attack strategy known as “Harvest Now, Decrypt Later” (HNDL). 

Preparing for the Post-Quantum Future

While there’s no way to know when quantum computers will reach practical supremacy, one thing is clear: the transition to PQC is no longer a theoretical need but an urgent necessity, especially invehicle applications.  

However, transitioning to PQCbased solutions comes with its own set of challenges. PQC algorithms require a greater amount of computational power, which can be a concern for existing automotive hardware. This is why early testing, standardization, and collaboration will prove to be invaluable for realistic integration.  

The dilemma is not whether we should implement PQC but how quickly we can make it a reality. The automotive sector has a lot of work to do, and security solutions providers like AUTOCRYPT are on track to ensure that the transition happens efficiently and securely. 

 


To stay informed about the latest news on mobility tech and software-defined vehicles, read our blog for more technology insights or subscribe to AUTOCRYPT’s monthly newsletter.

AUTOCRYPT Launches India-Compliant V2X Security Certification System, Expanding Global Reach

AUTOCRYPT becomes the only company to support V2X security standards across North America, Europe, China, Korea, and India. 

AUTOCRYPT, a leading automotive cybersecurity company, announced its successful development of its India-compliant V2X (Vehicle-to-Everything) security certification system, optimized for cloud-native environments. The system is now in delivery to Indian automotive manufacturers, further expanding the company’s global footprint in the V2X landscape. 

As the only company worldwide that supports all major V2X security credential management system standards, including North America (US-SCMS), Europe (EU-CCMS), China (C-SCMS), Korea, and now India, AUTOCRYPT continues to set new industry benchmarks. This achievement not only marks the company’s entry into an emerging market, but also validates its expertise in V2X security technology. 

The global V2X market is projected to grow and amid this changing landscape, Indian automakers and suppliers have made their presence known. India is increasing its demand for robust V2X technology as a key component in its smart city initiatives.  

India is the world’s fourth-largest automotive producer, with nearly 6 million vehicles manufactured in 2024. The Indian market represents a key opportunity for growth, but this also means that ensuring security and compliance will be critical,” said Seokwoo Lee, CEO of AUTOCRYPT. He continued, “With extensive expertise across V2X security deployment for multiple regulatory requirements, we are committed to advancing and playing a key role in India’s V2X ecosystem.” 

AUTOCRYPT most recently showcased its technological capabilities to DOT and industry leaders in Wyoming, successfully demonstrating V2X interoperability. AUTOCRYPT is well-positioned to ensure compliance with India’s security and type approval standards, allowing automotive manufacturers to seamlessly integrate secure V2X communications into vehicles. 

Learn more on how AUTOCRYPT secures V2X communications by contacting global@autocrypt.io. 

About Autocrypt Co., Ltd. 

AUTOCRYPT is the industry leader in automotive cybersecurity and connected mobility technologies. The company specializes in the development and integration of security software and solutions for in-vehicle systems, V2X communications, Plug&Charge, and mobility platforms, paving the way towards a secure and reliable C-ITS ecosystem in the age of software-defined vehicles. AUTOCRYPT also provides consulting and testing services along with custom solutions for UN R155/156 and ISO/SAE 21434 compliance. 

Exploring Maneuver Sharing and Coordinating Service (MSCS) in Autonomous Driving

Autonomous driving is advancing rapidly, with self-driving cars being tested in urban mobility, highways, and logistics. Have you ever wondered how these vehicles communicate to navigate safely? Unlike human drivers, who rely on signals and intuition, autonomous vehicles use data-sharing systems. This blog examines the limitations of cooperative driving systems and introduces Maneuver Sharing in Autonomous Driving through the Maneuver Sharing and Coordinating Service (MSCS) as a solution to improve vehicle communication, safety, and efficiency.

Current cooperative autonomous driving systems rely on Basic Safety Messages (BSMs) within Vehicle-to-Everything (V2X) communication. Each vehicle regularly transmits BSM data, sharing essential information such as speed, position, and heading with surrounding vehicles. This allows vehicles to assess potential collision risks and respond accordingly.

However, BSMs alone cannot convey the intent behind a vehicle’s movements. As shown in the graph below, a BSM provides only fundamental status data without explaining why a vehicle is moving in a certain way.

Basic Safety Messages within V2X

In other words, while BSMs enable cooperative autonomous driving, they lack the capability to communicate driving intentions. If vehicles could understand the purpose behind each movement in advance, particularly in emergency situations, driving safety and efficiency would significantly improve.

Real-World Scenario: The Need for MSCS

To illustrate this, let’s define two key entities:

  • HV (Host Vehicle): The vehicle transmitting its movement intention.
  • RV (Remote Vehicle): The vehicle receiving the movement information.

Now, consider a different scenario: What if the HV had already informed nearby RVs of its intent to change lanes in advance? In that case, the RV could adjust its route ahead of time, leading to a smoother and safer driving experience.

The same idea applies beyond driving. In any situation, whether at work, in school, or during teamwork, understanding someone’s intentions before they act allows for better planning, coordination, and overall efficiency.

What is MSCS?

To overcome the limitations of BSMs, the Maneuver Sharing and Coordinating Service (MSCS) offers a smarter approach to cooperative driving.

MSCS enhances V2X communication by enabling vehicles to share their intended maneuvers. Understanding the purpose behind a vehicle’s movement enables better analysis and response, enhancing overall road safety and efficiency.

Unlike traditional BSM-based driving, which reacts to real-time data, MSCS enables proactive decision-making by considering the planned maneuvers of surrounding vehicles. This advancement leads to a smoother and more coordinated driving experience.

Autonomous Maneuver Sharing in SAE J3186 standards

MSCS operates in compliance with SAE J3186 standards, which defines its primary use cases as:

  1. Cooperative Lane Change
  2. Cooperative Lane Merge

These scenarios demonstrate how MSCS enables smoother lane changes and merges by allowing vehicles to communicate their intended movements. Through MSCS, vehicles notify one another and cooperate to execute maneuvers safely.

It is important to note that MSCS is designed to function based on vehicle intent and follows two distinct communication protocols:

  1. General Vehicle Protocol: Requires mutual negotiation through request and response interactions.
  2. Emergency Vehicle Protocol: Prioritizes emergency vehicles (e.g., ambulances, police cars) without requiring negotiation from surrounding vehicles.

In general, standard vehicles (following the General Vehicle Protocol) must yield to emergency vehicles (following the Emergency Vehicle Protocol). This ensures that special-purpose vehicles can operate efficiently without mutual negotiation.

By implementing MSCS, vehicles can share movement intentions, enabling others to adapt proactively. This results in safer, more efficient, and cooperative autonomous driving.

MSCS and MSCM

Next, let’s differentiate between MSCS and MSCM to explore the operational aspects of MSCS.

  • MSCS (Maneuver Sharing and Coordinating Service): The overall system that enables maneuver coordination
  • MSCM (Maneuver Sharing and Coordinating Message): The message exchanged between vehicles to communicate movement intent

The graph below illustrates the structure of MSCM:

Structure of Maneuver Sharing and Coordinating Service (MSCM)

In MSCS, a Maneuver represents a coordinated movement involving multiple vehicles, while a Sub-Maneuver refers to the individual actions each vehicle takes to carry out that Maneuver.

The Executing Vehicle (HV) initiates the Maneuver request and identifies surrounding Affected Vehicles, which receive MSCM messages to coordinate movement. HV must obtain agreement from Affected Vehicles unless it is an emergency vehicle.

MSCM Data Structure

MSCM Data Structure

MSCM messages contain key data components, including the MSCM Type, which classifies messages into one of eight types:

Autonomous Maneuver Sharing: MSCM Type

Additionally, each Maneuver in MSCM consists of multiple Sub-Maneuvers, structured as follows:

Sub-Maneuvers Data

In conclusion, there are 8 types of protocols for each Maneuver in MSCM.

MSCS Operational Process

To understand the operation of MSCS, let’s examine how it functions in standard vehicles. The system follows three sequential stages:

  1. Awareness State
  2. Maneuver Negotiation State
  3. Maneuver Execution State

MSCS Operational Process

  1. Awareness State
    • This is the preliminary stage of MSCS operation
    • While vehicles are aware of their surroundings via BSM, they have not initiated MSCS yet
    • Only MSCM Type 0 messages (intention notifications) can be sent in this stage
  2. Maneuver Negotiation State
    • Vehicles begin negotiating the execution of a Maneuver
    • Emergency vehicles skip this step, as negotiation is not required
    • MSCM Types 1-3 are used to request and confirm Maneuvers, while Types 4-5 handle cancellations
  3. Maneuver Execution State
    • Vehicles execute the approved Maneuver
    • The HV and RV reach a mutual agreement and act accordingly
    • MSCM Type 7 messages confirm execution, and the Maneuver concludes when all Sub-Maneuvers are completed.

In conclusion, Maneuver Sharing and Coordinating Service (MSCS) represents a significant advancement in autonomous driving, allowing vehicles to communicate their movement intentions and not just their basic status. By enhancing Vehicle-to-Everything (V2X) communication, MSCS improves safety, coordination, and efficiency on the road. Unlike traditional systems that react to real-time data, MSCS enables proactive decision-making, particularly in complex scenarios like lane changes or merges.

With protocols that prioritize emergency vehicles and ensure smooth coordination, MSCS creates a structured environment for vehicles to work together seamlessly. This proactive approach helps prevent collisions, reduces traffic congestion, and leads to safer, more efficient roads. As autonomous vehicles continue to evolve, MSCS will be at the forefront of shaping a future where roads are not only safer but also smarter, bringing us closer to a fully integrated, autonomous transportation system.

 


To stay informed about the latest news on mobility tech and software-defined vehicles, read our blog for more technology insights or subscribe to AUTOCRYPT’s monthly newsletter.

Misbehavior Detection for the V2X Communication Ecosystem

The Vehicle-to-Everything (V2X) ecosystem runs on a secure, decentralized certification system utilizing public key infrastructure (PKI) technology. Standardized as the Security Credential Management System (SCMS), the system ensures that every V2X end entity is given a unique set of digital certificates, generated and distributed by multiple layers of independent certification authorities (CA). These V2X end entities, including the onboard units (OBU) installed in vehicles and the roadside units (RSU) connected to points of road infrastructure, use their private key to sign off messages sealed with their certificates.

Such a PKI framework ensures trust in V2X communication by validating messages’ authenticity and integrity. “Authenticity” implies that the message’s sender is truly who they claim to be, while “integrity” signifies that the message has not been altered during transmission.

 

Message accuracy: the limitation of PKI

Although the PKI guarantees end-to-end security for all V2X communications, it does not exert control beyond the communication endpoints. Due to this limitation, the PKI is not capable of validating the content of messages, such as, whether the message contains accurate information about the vehicle and its environment. For instance, if a car is broadcasting a V2X message stating that it is traveling at 60 km/h while it is in fact traveling at 80 km/h, detecting this discrepancy is beyond the PKI’s capability. Given that vehicles rely on these V2X messages to make decisions on the road, it is crucial to ensure that all information is accurate.

There are a couple of potential reasons behind an inaccurate V2X message. The first involves a hacked vehicle. A malicious road user might hack into their vehicle to purposefully create false or misleading messages in order to cause changes in traffic in their favor. An external hacker could also do so to manipulate traffic. Although hacking into a vehicle is extremely difficult to accomplish given the sophisticated security measures, it does pose a potential risk to the V2X ecosystem.

Another factor there could lead to an inaccurate message is that a vehicle’s internal systems might be experiencing a malfunction that results in incorrect signals given to its OBU. Although no malicious actions are involved, it is still considered misbehavior and poses a threat to its surrounding environment.

 

The need for misbehavior detection for V2X

To minimize the risk of false messages, a misbehavior detection mechanism needs to be implemented in the SCMS ecosystem so that potentially malicious users can be removed from the V2X ecosystem immediately.

How is this done? AUTOCRYPT’s misbehavior detection solution, AutoCrypt® MBD, is deployed in both the end entity and the PKI server. The LMBD (local MBD) is embedded in the OBUs, screening all incoming messages for anomalies. The GMBD (global MBD), situated in the SCMS server, receives the list of flagged certificates from the LMBD, allowing the misbehavior authority (MA) to review and revoke the respective certificates. Once a certificate is revoked, it is added to the certificate revocation list (CRL) and distributed back to the LMBD so that the certificate is no longer recognized in the V2X ecosystem.

 

autocrypt mbd

 

Although there has been no universal standard or agreement on what constitutes misbehavior, some common signs of misbehavior include:

  • Attempting to use expired or invalid certificates
  • Mismatched signature (private key)
  • Unintelligible data (time, location, speed, et cetera)

AutoCrypt® MBD periodically updates its list of misbehaviors to address the latest threats, adding a final layer of security for the V2X ecosystem.

To learn more about AUTOCRYPT’s secure V2X solutions and services for C-ITS, check out Secure V2X Communications.

High-Precision V2X Positioning: Why Centimeter-Level Accuracy Matters

In the rapidly advancing field of automotive technology, Vehicle-to-Everything (V2X) communication is becoming a cornerstone for future transportation systems. A fundamental element in V2X is positioning, which involves recognizing a vehicle’s absolute and relative positions concerning other surrounding objects. This article delves into why achieving high-precision positioning is crucial in V2X communication, the technologies enabling centimeter-level accuracy, some applications that benefit from such precision, and technology development considerations.

Importance of Achieving High-Precision Positioning in V2X Communication

The value proposition of V2X technology lies in road safety and road-traffic optimization. And while the technology has come a long way there is still some room for growth. To maximize the benefits of V2X the technology must achieve high-precision positioning.

One of the most proposed use cases of V2X, autonomous driving, requires a very high level of positioning accuracy because even minor errors can lead to fatal accidents. The goal of the industry is to provide precise and reliable positioning that ensures that autonomous vehicles can navigate safely and efficiently at any time in any environment.

Technologies Enabling Centimeter-Level Accuracy

Common positioning technology like Global Navigation Satellite System (GNSS) is already widely used in V2X positioning. While GNSS is exceptional at pin-pointing a car’s location in an open landscape, it is not suitable for congested urban environments with tall buildings and tunnels, where signal blockages often occur. Therefore, supplementing GNSS or employing more sophisticated technology is a crucial step to ensuring high-accuracy positioning in V2X.

Several technologies contribute to achieving centimeter-level positioning accuracy:

Cellular Positioning uses the cellular network to exchange dedicated positioning signals. Cellular networks offer more precise positioning than GNSS but are limited by geographical coverage.

Inertial Navigation System (INS) uses motion sensors and computational units to continuously calculate the vehicle position relative to its corresponding initial position. The major pro is that INS is not dependent on any external information. However, the system performance degrades with time due to the accumulation of measurement errors at each calculation.

Sensors and HD Maps can achieve centimeter-level positioning but are costly and require significant computational power. Sensors offer detailed information about vehicle surroundings but they may malfunction or be disrupted by cyber attacks, meaning that sensors are not always reliable. On the other hand, HD maps offer high-precision positioning and a 360-view of the road, however, the performance is highly contingent on the quality of map data. Furthermore, HD maps perform well only if the physical environment remains unchanged, which is not realistic in growing and ever-changing urban environments.

Each positioning method has its pros and cons. The good news is that they can supplement each other’s weaknesses and offer multiplied benefits, suggesting that a hybrid approach may be ideal. Hybrid Data Fusion Method of Positioning combines data from multiple sources, such as GNSS, INS, cellular networks, and HD maps, to improve positioning performance in V2X applications. By merging data collected from various sources, the final positioning result is more refined, accurate, and reliable than what could be achieved using any single method.

Applications Benefiting from High-Precision Positioning

While not all V2X applications will require high-precision positioning, several V2X use cases significantly benefit from centimeter-level positioning.

High-precision positioning is essential for autonomous driving as it enables vehicles to navigate safely and efficiently in complex road scenarios, maintaining their lane and avoiding obstacles.

In addition, accurate positioning is crucial for systems designed to prevent collisions by alerting drivers to potential hazards in real-time. Anti-collision warnings require robust high-precision positioning, since vehicles need to be able to identify dangers even in the most chaotic and unexpected road conditions.

High-precision positioning is also extremely beneficial for more mundane uses of V2X technology like parking assistance. Systems that assist with parking rely on precise positioning to maneuver vehicles into tight spaces, helping drivers avoid accidents in crowded parking lots.

V2X Technology Development Considerations

There are 2 main requirements and considerations that need to be accounted for in order to achieve consistent, stable, and accurate positioning at all times.

Variable Accuracy Requirements: Different use cases require different levels of accuracy. For example, a pre-crash warning system needs more accurate positioning than a congestion alert. Which means that not every positioning technique will be able to respond to the demands of some applications. Therefore, a larger number of technologies needs to be developed to ensure the required positioning accuracy for more sophisticated V2X use cases.

Cost Considerations: A number of technologies offering centimeter-level positioning, such as sensors and HD maps, require large computational power as well as advanced and expensive technology. At the current stage, one set of technology would not provide the sufficient accuracy for more advanced V2X applications. Hence, implementing and maintaining multi-level systems capable of achieving exceptional positioning accuracy may need a sizable investment at the initial stages of technological advancement. However, as the technology matures the costs will naturally decrease. In addition, the expected benefits of V2X technology, like increased traffic efficiency and reduced road accidents, will generate substantial cost savings down the line.

As the automotive industry advances towards greater automation and connectivity, the importance of high-precision V2X positioning becomes increasingly evident. Centimeter-level accuracy is essential for ensuring the safety, efficiency, and reliability of advanced V2X applications. By leveraging and combining advanced positioning techniques, the industry can achieve the level of precision needed to fully realize the potential of V2X. This progress will pave the way for a safer, smarter, and more connected transportation system.

To stay informed and updated on the latest news about AUTOCRYPT and vehicle-to-everything technology, subscribe to AUTOCRYPT’s newsletter.