Prioritising security as electric vehicle charging ramps up

As governments around the world instigate and progress sustainable transport policies and initiatives, the need for more electric vehicle (EV) charge points grows. The IoT underpins this relatively new infrastructure by enabling the exchange of operational and other data. To secure and protect this data and charging assets, charge point operators (CPOs) must design their solutions with defence, detection and incident response in mind, says Justin Godfrey-Cass, head of transport solutions, Wireless Logic.

A growing EV charge point network

According to one analysis, there are over five million electric vehicles in the 27 EU member states and UK and, as a result, the number of public charging points has risen from 90,000 in 2016 to over 450,000 in 2022. However, while EV volume growth has been 50% in this time, charging points have failed to match this rate at only 31%.

Recognising this, the UK, with only 42,000 EV charge points currently, plans to have 300,000 public chargers by 2030.

Meanwhile, the US has its own plans to ramp up. With more than three million EVs on the road, supported by 130,000+ public chargers, the goal is for 500,000 charging points by 2030.

Why EV charge points are IoT-connected

The IoT connects EV charging stations so they can exchange data.

The data in question supports a range of operational needs. Firstly, to facilitate customer payments at public charging stations. Secondly, to enable CPOs to track usage, monitor performance and understand demands on the grid. This becomes increasingly important as charge points become part of a wider transformation of energy infrastructure to be smarter, less reliant on fossil fuels, and to draw on more sustainable energy sources.

Illustrating this, Ofgem predicts EV batteries, alongside other devices including heat pumps, could deliver savings up to £4.7bn by the end of this decade. The savings would come from efficient infrastructure use, which includes sending electricity back into the grid when needed.

For CPOs to support vehicle-to-grid charging, they need load balancing insights and for that they must monitor their infrastructure. Without visibility into usage and power consumption, they cannot take action to, for example, manage fluctuations, avert the risk of power outages and prevent power surges.

Charge point data therefore supports visibility and control for power consumption purposes, and it enables payments to be taken. There is a third important function and that is performance and maintenance. EV drivers need charge points that are in good working order. CPOs monitor their installed estate to identify where any issues need addressing so that drivers aren’t disappointed when they arrive at charging stations.

EV charge point security must be prioritised

Unfortunately, more charge points makes for more opportunities to compromise this important infrastructure which is fast becoming essential to the smooth running of road transport around the world. CPOs must secure their assets and data, and protect the privacy of customers’ data, 24/7.

All connected solutions face security threats. Cybercriminals will seek out vulnerabilities to exploit and profit from, and to cause disruption. Unfortunately, enterprises’ defences do get breached, so much so that, according to a report by SonicWall, there were 57 million IoT malware attacks in the first half of 2022, an increase of 77%.

Malware, ransomware and all other forms of cyberattack can cause significant damage on a number of levels. Businesses can incur considerable costs identifying and stopping an attack, after which they must pay to fix the issue, and then they can count the cost of incurred down time and recovery expenses.

What’s more, they can incur a fine if a security incident is adjudged to be a compliance failing. Despite all this, the biggest cost of all is often the impact on company reputation and brand.

Overall, the sums involved can be staggering. IBM’s Cost of a Data Breach 2022 report, for example, put the average cost of a ransomware attack at $4.5 million (€4.18 million).

Yet, despite all this, Kaspersky reports that 43% of businesses don’t fully protect their IoT solutions. To understand why, we find that over a third (35%) suffer from a lack of staff or specific IoT security expertise, while 40% cite difficulty in finding a suitable solution.

It is unsurprising, therefore, that a survey by Transforma Insights in 2022 found that security was the second most influencing factor, behind only IoT reputation/brand, when enterprises choose a vendor.

How to optimise IoT security for EV charge points

The security of EV charging stations must be given the highest priority. CPOs must make their solutions ‘secure by design’ to protect credentials, secure applications and ensure device communication is only with the correct destinations.

IoT security defends, detects and reacts against existing and emerging cyberthreats. CPOs connecting through cellular IoT, which is flexible, scalable and can support large-scale and multi-region deployments, can build security into their solutions through technology, standards and best practices.

To defend their installations, they must protect against unauthorised device, cloud infrastructure or data access. It makes good sense to begin here with IoT SAFE, as an industry standard to authenticate and authorise IoT devices to mobile networks. CPOs must also keep software up-to-date and stay abreast of relevant regulation to ensure compliance.

Despite all these measures, it is never enough to build in defences only to let things run without monitoring. Practically, that means automated anomaly detection, and usage-based insights and analytics to detect any abnormal activity so it can be investigated.

Armed with this insight, CPOs equip themselves to react as swiftly and comprehensively as possible, should an issue arise. That may involve quarantining and cleaning affected devices, reporting the incident and instigating corrective actions across systems.

Justin Godfrey-Cass

Essentially, CPOs must apply policies and best practices to their processes and employee training too. Vulnerabilities are often found in staff behaviour or company processes, and not only within the company responsible for the solution but potentially with their suppliers too. Any weaknesses this could expose must be plugged.

Also, CPOs should rehearse potential incidents. Through rehearsal they prepare themselves to react, should they need to, and give themselves the best chance of minimising damage.

As EV charging ramps up, CPOs and original equipment manufacturers (OEMs) must prioritise security at the point of design. Cyberthreats are ever-present, and the important data that charge points transmit can make them a target. A security strategy should cover technology, standards and best practices to defend, detect and react in the face of threats, and ensure IoT connections are as resilient and secure as they can be.

The author is Justin Godfrey-Cass, head of transport solutions, Wireless Logic.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

RECENT ARTICLES

Carson City upgrades to Iteris’ advanced Vantage Apex sensors

Posted on: April 26, 2024

Iteris has announced that Carson City, Nevada has chosen to upgrade the city’s intersection detection sensors to Iteris’ Vantage Apex hybrid sensors.

Read more

Make the Intelligent Choice: Embed X103 in Smart City Outdoor Devices

Posted on: April 25, 2024

The adage “less is more” is the current state of digital transformation, starting with existing technology that has already proven successful – and then further adapting and streamlining. The “smart

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into

Read more