Smart EV Charging Will Require Utilities to Invest in Cybersecurity Systems

The technology architecture associated with electric vehicle (EV) charging is continuing to evolve as utilities and other key players in the industry ecosystem identify business requirements and risks associated with adding significant new demands on the electrical grid. One of the most pressing challenges is related to securing financial transactions and end-to-end communications throughout the EV charging infrastructure, and a recent report from Pike Research indicates that these areas will be the focus of increased utility investment in cybersecurity systems over the next several years. The cleantech market intelligence firm forecasts that the EV cyber security market will increase from just $26 million in 2011 to $144 million by 2015, with a cumulative investment of $432 million during that period.

“Smart charging management will be the primary driver of expanded utility spending on EV cyber security,” said senior analyst Bob Lockhart. “The IT and communications infrastructure supporting charging equipment will need to be resilient and secure in order to mitigate risks associated with financial transactions and the threat of hacking that is posed by the addition of these new endpoints. A malicious attack on the EV cyber infrastructure could potentially result in brownouts or stranded vehicles, and any failure in smart charging systems could strike a huge blow to utilities as well as consumer confidence in the reliability and viability of electric vehicles as a preferred mode of transportation.”

Lockhart adds that, in addition to their benefits for smart charging, EV cybersecurity systems will also strengthen customer information management systems and enable new forms of data analytics that will be advantageous for utilities and end users alike. However, Pike Research’s analysis indicates that the EV cyber securitymarket is still nascent and is somewhat hamstrung in the near term by the lack of security standards and binding regulation or legislation related to these issues. Lockhart believes that the lack of a common approach is likely to make security for EV infrastructure more expensive than it needs to be, and more complex, over the next several years.

Featured

  • Until We Meet Again

    A short three years ago we were all pondering whether to attend any tradeshows all thanks to COVID-19. Sorry to bring that nightmare up again, but it seems that little pandemic is in the rear-view mirror, and it’s time to meet again. Read Now

    • ISC West
  • Cyber Hygiene: What it Looks Like for IoT Devices

    Cyber Hygiene: What it Looks Like for IoT Devices

    For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices. Read Now

  • ISC West Announces 2023 Keynote Series Speaker Lineup

    The International Security Conference (ISC), in collaboration with premier sponsor Security Industry Association (SIA), announced five of this year’s ISC West Keynote Series speakers. ISC West will kick off its annual conference on March 28 (SIA Education@ISC: March 28-30 | Exhibit Hall: March 29-31) at the Venetian Expo in Las Vegas, Nevada. Read Now

    • ISC West
  • Accelerating Security Modernization

    In recent years, the term “digital transformation” has been one of the most frequently used buzzwords across industries. On its most basic level, it refers to the reimagining of how an organization leverages its technology systems to improve business processes. Read Now

Featured Cybersecurity

New Products

  • Dinkle DKU Barrier Terminal Blocks

    Dinkle DKU Barrier Terminal Blocks

    New DKU screw type terminal blocks use a spring-guided system where the screws are integrated and captive within the terminal enclosure. These screws can be backed out so that ring- or U-shaped cable lugs can be inserted, without the possibility of losing the screw. 3

  • Pivot3 Surety

    Pivot3 Surety

    Pivot3 has announced Surety, a new intelligent software framework to simplify the management and monitoring of physical security environments. 3

  • Paxton10 CORE Cameras

    Paxton10 CORE Cameras

    The new CORE Series cameras feature edge processing for ultimate scalability, built-in edge storage, and plug-and-play installation. The addition of the CORE Series gives installers new hardware, better choice, and more value than ever before. 3