{"id":1224,"date":"2021-04-29T14:09:00","date_gmt":"2021-04-29T14:09:00","guid":{"rendered":"https:\/\/iot-ngin.eu\/?p=1224"},"modified":"2021-04-29T14:09:08","modified_gmt":"2021-04-29T14:09:08","slug":"e-mobility-iot-cyber-security","status":"publish","type":"post","link":"https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/","title":{"rendered":"e-Mobility IoT &#038; Cyber Security"},"content":{"rendered":"\n<p>Electric mobility is leading to a complex integration of automotive products within the internet of things, giving rise to the emergence of new threats from a cybersecurity point of view. As e-mobility is still perceived as a young industry, the level of cybersecurity investment for each product varies by individual manufacturer and supplier. \u201cElectric mobility is a bit of a wild West when it comes to cybersecurity\u201d<sup>1 <\/sup> says Andrew Barratt, UK CEO of Coalfire, a cybersecurity consultancy. Currently most of the vulnerabilities in electric vehicles lie in the battery management and the main digital interface, however, if we consider that the research is directed towards the production of autonomous cars, the threat is greater as the vehicles would be linked together and they would also be linked to networked road systems. \u201cA nation state or serious organized crime group could induce a range of vehicles to crash at high speeds. Attackers wishing to harm critical national infrastructure without direct loss of life could force all traffic to attempt to go through certain areas, creating large localized traffic jams\u201d says Vic Harkness of F-Secure Consulting, a security consultancy. Another example of a threat was presented by a group of computer science experts from UTSA<sup>2<\/sup>, who showed that it is possible to hack electric scooters, for example the Segway miniPro and other models such as Xiaomi&#8217;s M365 scooter, which are provided with a mobile application that is combined with the use of the electric scooter. It has been shown that a good knowledge of Assembly language can be sufficient to overcome the safety protections, thus taking control of the device, so as to be able to stop the race or decide where to direct people, for example to a place where they could be easily robbed. It is clear that the introduction of safety at the design stage is vital for electric mobility as well as a sharing framework, so that overall safety increases faster thanks to cooperation between manufacturing companies. In the IoT-NGIN project, electric mobility will be present in various pilot sites and among the many activities that will be carried out during the project there will be IoT systems protecting from cyber-attacks (e.g., contradictory, adversarial or sybil poisoning attacks, backdoor adversary attacks) to assist ML-based anomaly detection and implement novel low and medium interaction adversarial nets to identify malicious or suspicious IoT nodes.<\/p>\n\n\n\n<p><sup>1 <\/sup><a rel=\"noreferrer noopener\" href=\"https:\/\/www.ft.com\/content\/137077ad-58a6-450a-8944-a7416597e49f\" target=\"_blank\">https:\/\/www.ft.com\/content\/137077ad-58a6-450a-8944-a7416597e49f<\/a><\/p>\n\n\n\n<p><sup>2 <\/sup><a rel=\"noreferrer noopener\" href=\"https:\/\/www.utsa.edu\/today\/2020\/01\/story\/escooter-hacking.html\" target=\"_blank\">https:\/\/www.utsa.edu\/today\/2020\/01\/story\/escooter-hacking.html<\/a><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Electric mobility is leading to a complex integration of automotive products within the internet of things, giving rise to the emergence of new threats from a cybersecurity point of view. As e-mobility is still perceived as a young industry, the &hellip;<\/p>\n","protected":false},"author":1,"featured_media":178,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[17],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>e-Mobility IoT &amp; Cyber Security - IOT NGIN<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"e-Mobility IoT &amp; Cyber Security - IOT NGIN\" \/>\n<meta property=\"og:description\" content=\"Electric mobility is leading to a complex integration of automotive products within the internet of things, giving rise to the emergence of new threats from a cybersecurity point of view. As e-mobility is still perceived as a young industry, the &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"IOT NGIN\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-29T14:09:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-29T14:09:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/iot-ngin.eu\/wp-content\/uploads\/2020\/10\/pexels-pixabay-373543-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1706\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/iot-ngin.eu\/#website\",\"url\":\"https:\/\/iot-ngin.eu\/\",\"name\":\"IOT NGIN\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/iot-ngin.eu\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/iot-ngin.eu\/wp-content\/uploads\/2020\/10\/pexels-pixabay-373543-scaled.jpg\",\"contentUrl\":\"https:\/\/iot-ngin.eu\/wp-content\/uploads\/2020\/10\/pexels-pixabay-373543-scaled.jpg\",\"width\":2560,\"height\":1706},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/#webpage\",\"url\":\"https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/\",\"name\":\"e-Mobility IoT & Cyber Security - IOT NGIN\",\"isPartOf\":{\"@id\":\"https:\/\/iot-ngin.eu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/#primaryimage\"},\"datePublished\":\"2021-04-29T14:09:00+00:00\",\"dateModified\":\"2021-04-29T14:09:08+00:00\",\"author\":{\"@id\":\"https:\/\/iot-ngin.eu\/#\/schema\/person\/cebfbe511c2eb2dbde553122133bac85\"},\"breadcrumb\":{\"@id\":\"https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/iot-ngin.eu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"e-Mobility IoT &#038; Cyber Security\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/iot-ngin.eu\/#\/schema\/person\/cebfbe511c2eb2dbde553122133bac85\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/iot-ngin.eu\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/db162e437fcca6c2aa6c6ef097e3a122?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/db162e437fcca6c2aa6c6ef097e3a122?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/iot-ngin.eu\"],\"url\":\"https:\/\/iot-ngin.eu\/index.php\/author\/alexis_administrator\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"e-Mobility IoT & Cyber Security - IOT NGIN","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"e-Mobility IoT & Cyber Security - IOT NGIN","og_description":"Electric mobility is leading to a complex integration of automotive products within the internet of things, giving rise to the emergence of new threats from a cybersecurity point of view. As e-mobility is still perceived as a young industry, the &hellip;","og_url":"https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/","og_site_name":"IOT NGIN","article_published_time":"2021-04-29T14:09:00+00:00","article_modified_time":"2021-04-29T14:09:08+00:00","og_image":[{"width":2560,"height":1706,"url":"https:\/\/iot-ngin.eu\/wp-content\/uploads\/2020\/10\/pexels-pixabay-373543-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/iot-ngin.eu\/#website","url":"https:\/\/iot-ngin.eu\/","name":"IOT NGIN","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/iot-ngin.eu\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/#primaryimage","inLanguage":"en-US","url":"https:\/\/iot-ngin.eu\/wp-content\/uploads\/2020\/10\/pexels-pixabay-373543-scaled.jpg","contentUrl":"https:\/\/iot-ngin.eu\/wp-content\/uploads\/2020\/10\/pexels-pixabay-373543-scaled.jpg","width":2560,"height":1706},{"@type":"WebPage","@id":"https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/#webpage","url":"https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/","name":"e-Mobility IoT & Cyber Security - IOT NGIN","isPartOf":{"@id":"https:\/\/iot-ngin.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/#primaryimage"},"datePublished":"2021-04-29T14:09:00+00:00","dateModified":"2021-04-29T14:09:08+00:00","author":{"@id":"https:\/\/iot-ngin.eu\/#\/schema\/person\/cebfbe511c2eb2dbde553122133bac85"},"breadcrumb":{"@id":"https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/iot-ngin.eu\/index.php\/2021\/04\/29\/e-mobility-iot-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/iot-ngin.eu\/"},{"@type":"ListItem","position":2,"name":"e-Mobility IoT &#038; Cyber Security"}]},{"@type":"Person","@id":"https:\/\/iot-ngin.eu\/#\/schema\/person\/cebfbe511c2eb2dbde553122133bac85","name":"admin","image":{"@type":"ImageObject","@id":"https:\/\/iot-ngin.eu\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/db162e437fcca6c2aa6c6ef097e3a122?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/db162e437fcca6c2aa6c6ef097e3a122?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/iot-ngin.eu"],"url":"https:\/\/iot-ngin.eu\/index.php\/author\/alexis_administrator\/"}]}},"cc_featured_image_caption":{"caption_text":false,"source_text":false,"source_url":false},"_links":{"self":[{"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/posts\/1224"}],"collection":[{"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/comments?post=1224"}],"version-history":[{"count":4,"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/posts\/1224\/revisions"}],"predecessor-version":[{"id":1228,"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/posts\/1224\/revisions\/1228"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/media\/178"}],"wp:attachment":[{"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/media?parent=1224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/categories?post=1224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iot-ngin.eu\/index.php\/wp-json\/wp\/v2\/tags?post=1224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}