Cyber and transport: planes, trains and electric vehicles

zjvwpunG{olGjohsslunlSGlunpullypunG{olGylzwvuzlaGjp}ps
j ‰Œ™Gˆ•‹G›™ˆ•š—–™›aG
—“ˆ•ŒšSG›™ˆ•šGˆ•‹G
Œ“ŒŠ›™ŠGŒŠ“Œš
Like the rest of society, transportation is now facing new
cyberthreats. Simon Michell reviews the vulnerabilities within
the transport sector and looks at how, with a little help from
cybersecurity, electric vehicles can boost national grid supplies
T
hat the internet has morphed
from its origin as an experiment
on powering academic research
into something that may have the
ability to bring society to its knees
is an uncomfortable yet plausible irony. Today,
with the developed world connecting almost
all of its electronic systems to the internet,
very little seems safe from cyberthreats.
Threats within the railway network
Transportation is a particularly vulnerable area.
While those in control of aviation, the railroads
and the highways will tell you that the threats
are exaggerated and that there are fail-safe
and fall-back systems, the transportation
community has already faced multiple attacks.
Each transportation sector has its own
vulnerabilities related, among other things,
to their customer-facing websites and the
digital systems they use to control their
fleets. Although the railway system has so
far remained relatively free of cyberattack,
there is concern over the latest GSM-Railway
(GSM-R) wireless standard that is being
adopted in Africa, Asia and Europe to enable
communications between controllers and
drivers and control of track-switching systems.
The GSM-R system is more secure than
the 2G set-up it is starting to replace, but
according to a leading expert from Germany’s
Technische Universität Darmstadt, Professor
Stefan Katzenbeisser, there is a theoretical
vulnerability in the way in which encryption
codes are distributed. The codes are generated
by computer and distributed via USB sticks;
if an unauthorised person got hold of one of
these sticks, the potential for a cyberattack
16 — Securing the Cybersphere | Preview Edition
is clear. Such an attack would not necessarily
lead to a crash, but it could certainly create
the conditions for gridlock.
For some years now, commercial aviation
has been in the process of upgrading its
networks, particularly in the US under the
NextGen programme and in Europe as part
of the SESAR project. In both cases, the aim
is to expand capacity and increase efficiency
so that more aircraft can use the network on
routes that burn less fuel.
A backbone of both of these new systems
is digital technology, which is already being
introduced worldwide. Ever more aircraft
are replacing elements of their voice
communications between the cockpit and
ground-based traffic controllers with digital
messaging protocols akin to emails. In addition,
aircraft over a certain size have been fitted
with an electronic system, known as ADS-B
(automatic dependents surveillance –
broadcast), which automatically sends out
information about an aircraft’s identity and
position in the sky. Significantly, a similar
system, AIS (automatic identification system),
has been adopted by commercial shipping
for vessels over a certain tonnage.
The theoretical vulnerability for digital
messaging is that a hacker might be able to
get into the system and alter messages or send
bogus instructions to and from pilots and the
air-traffic controllers using the controller-pilot
data link communications (CPDLC). Another
possibility, although much more technically
challenging, would be to create a virtual
aircraft with an ADS-B signal and ‘fly’ it close
enough to other aircraft to force them to
change their position quickly. The danger is
that any rapid change of position by an aircraft,
particularly in congested airspace, such as an
airport approach lane, could lead to disaster.
The power of electric vehicles
The cyber vulnerabilities of automobiles,
however, are far more complex. Electric
vehicles – family cars in particular – will, in
a matter of years not decades, be integrated
into the energy grid so that they can charge
themselves and be used as a potential
electricity storehouse that can help to balance
supply and demand in the overall grid system.
Today, an average electric vehicle such
as the Nissan Leaf has a battery that holds
approximately 25 kWh of power. This, of
course, is not a great amount, but the
potential to aggregate the power of 10,000
or maybe one million electric vehicles makes
it a possible game-changer for regional
and even national power providers.
One of the biggest challenges in electricity
supply is being able to balance the amount
ALVEY & TOWERS PICTURE LIBRARY/ALAMY
zjvwpunG{olGjohsslunlSGlunpullypunG{olGylzwvuzlaGjp}ps
Railway systems worldwide are
vulnerable to cyberattacks,
particularly as the tendency
to use wireless technology
operationally increases
of power being produced in the grid with the
demand for that power. Most, if not all, of
the time, this is out of kilter. The difficulties
for the utility independent-system operators
(ISOs), which control the amount of energy in
the grid, is that there is only ever a segment
of that supply that is a constant baseline –
from nuclear power stations and other regular
sources, such as hydropower. The bulk of the
electricity is created by the ISOs asking gas-,
oil- and coal-power stations to switch on their
systems in order to feed it into the grid. There
is regularly a long lead time in this transaction.
This represents one of the biggest inefficiencies
in the supply chain. If it could be solved, or at
least improved, then the consequences would
be huge – particularly for the reduction of
household energy bills.
Syracuse University cyber experts have
been aware of this implication for many years,
and are working on developing systems that
secure the network between the cars, their
electric-vehicle service equipment (EVSE)
charging systems, the middlemen – the thirdparty aggregators (TPAs) that will implement
the charging contracts and facilitate the
electricity supply – and the ISOs that will make
the decisions to be able to meet demand.
Protecting privacy
The security along the entire line of
transactions has to be assured in a way that
not only mitigates cyber vulnerabilities, but
also meets a range of other social, legal and
regulatory factors. One of the key elements is
the interface between the cars and the EVSE.
Drivers will want to be able to charge their cars
when they are out and about – at a restaurant,
a cinema, a hotel – as well as when the car
is parked in the home garage. To do this, a
foolproof identification-authentication protocol
will have to be implemented.
This is where a major hurdle comes into
play. The distribution agents, who will switch
on the electricity for the cars to be charged via
a grid-to-vehicle transaction, will want to know
that the owner will pay for that electricity.
The obvious way to do this is by identifying
the car and the billpayer.
However, with the increasing alarm over
the expansion of the ‘big brother’ society,
many car owners are likely to be reluctant
for their names to appear against a charger
that is not their home EVSE. In other words,
they will not want their movements to be
traceable according to the locations they
have charged their cars. Some anonymous
system has to be agreed before a large-scale
charging infrastructure can be implemented
and accepted by enough users to achieve the
grid-power balancing end goal.
Another factor, especially in the US, is that
some states, such as Maryland, have enacted
laws dictating that electricity cannot be sold at
a higher price than it was purchased for. Again,
this is a game stopper. The whole concept
of the electric vehicle as a regional/national
storage facility hinges on car owners being able
to buy electricity when it is cheap (at night)
Securing the Cybersphere | Preview Edition — 17
zjvwpunG{olGjohsslunlSGlunpullypunG{olGylzwvuzlaGjp}ps
JIM WEST/ALAMY
Electric vehicles, such as the
Nissan Leaf, have the potential
to transform the energy grid
and sell it when demand and therefore price
is highest (during the peak hours of the day).
The electric vehicle community itself will
want assurances that the system cannot be
penetrated and bills destined for one car
owner diverted to another. For their part,
the electricity suppliers will want guarantees
that the system is not vulnerable to theft
of the electricity itself – a problem that is
endemic in many parts of the world.
Moreover, the network of cars that are
plugged into this new smart grid must be
protected against hackers to prevent a
malicious penetration that can bring the grid
down. For electric vehicles to be used as a
storage facility that can help balance the grid’s
supply/demand challenge, there has to be a
mechanism that controls the EVSE network
in order to time the charging/discharging.
This way, it can balance the electricity-grid
supply in line with the charging requests
of the vehicle owners; this is the so-called
vehicle-to-grid transaction.
The nightmare scenario might be that,
during the night, when the majority of the cars
are plugged into the grid via their home EVSEs,
somebody hacks into the system and reverses
the electricity flow so that instead of the cars
being charged, they dump their electricity back
into the grid, causing an overload that might
create an outage. Of course, the reverse is
also possible. Getting all of the plugged-in cars
to suddenly start charging at the same time
18 — Securing the Cybersphere | Preview Edition
during daytime/evening peak demand period
could also create blackouts. These blackouts
could spread rapidly across the grid.
Most developed countries’ electricity
infrastructure of power lines and substations
is ageing and relatively prone to the occasional
shutdown – some of which, while traceable
to a very small incident, can be massive in
their impact. The 2003 blackout that affected
more than 55 million people in the north-east
of the US and Canada’s Ontario was due to
an overload that caused a power line to heat
up and sag onto some foliage beneath it. The
grid’s automatic attempt to reroute electricity
only exacerbated the problem, sending surges
of power and blackouts from state to state and
then to Canada, before returning to the US.
Syracuse’s preSAGE group
According to Steve Chapin, Associate
Professor at the Syracuse University College
of Engineering and Computer Science,
“Time is running out to get this right”. Many
countries in Asia, Europe and the Middle East
have already started installing the smartgrid electric-vehicle infrastructure to enable
the mass electric-vehicle market. Professor
Chapin warns: “If we don’t get the security
aspect solved in time, we might find ourselves
in the same situation as the PC industry,
where the vulnerabilities in the system are so
widespread that the cost of retrofitting the
security measures becomes too expensive.”
Indeed, producing the economic model before
putting the required protection in place is
what produced much of the current internet
vulnerability in the first place.
To ensure that this does not happen –
in the US, at least – the preSAGE (Privacy,
Regulation & Economics in a Smart Assured
Grid Ecosystem) group has been formed at
Syracuse University. The group highlights the
holistic approach that the university adopts
when dealing with cyber issues. PreSAGE was
created by a cross-disciplinary team from
the College of Engineering and Computer
Science in which Steve Chapin teaches, the
Maxwell School of Citizenship and Public
Affairs and the Institute for National Security
and Counterterrorism, all of which are within
a short walk of each other on the university
campus. The multi-dimensional, five-person
team that forms the group’s engine applies
four key perspectives to the problem:
technology, security, economics and law. As
Steve Chapin says: “Only by looking at all sides
of the issue can a workable solution that covers
all aspects of the challenge hope to be found.”
The revolution in the electric-vehicle
sector that could provide massive benefits
to society will depend on cybersecurity to
enable its public acceptance. However, also
involving elements of government regulation,
commercial practice, public opinion, legislation
and law enforcement, is far more than simply
an IT challenge.