Smart EV Charging Will Require Utilities to Invest in Cybersecurity Systems

The technology architecture associated with electric vehicle (EV) charging is continuing to evolve as utilities and other key players in the industry ecosystem identify business requirements and risks associated with adding significant new demands on the electrical grid. One of the most pressing challenges is related to securing financial transactions and end-to-end communications throughout the EV charging infrastructure, and a recent report from Pike Research indicates that these areas will be the focus of increased utility investment in cybersecurity systems over the next several years. The cleantech market intelligence firm forecasts that the EV cyber security market will increase from just $26 million in 2011 to $144 million by 2015, with a cumulative investment of $432 million during that period.

“Smart charging management will be the primary driver of expanded utility spending on EV cyber security,” said senior analyst Bob Lockhart. “The IT and communications infrastructure supporting charging equipment will need to be resilient and secure in order to mitigate risks associated with financial transactions and the threat of hacking that is posed by the addition of these new endpoints. A malicious attack on the EV cyber infrastructure could potentially result in brownouts or stranded vehicles, and any failure in smart charging systems could strike a huge blow to utilities as well as consumer confidence in the reliability and viability of electric vehicles as a preferred mode of transportation.”

Lockhart adds that, in addition to their benefits for smart charging, EV cybersecurity systems will also strengthen customer information management systems and enable new forms of data analytics that will be advantageous for utilities and end users alike. However, Pike Research’s analysis indicates that the EV cyber securitymarket is still nascent and is somewhat hamstrung in the near term by the lack of security standards and binding regulation or legislation related to these issues. Lockhart believes that the lack of a common approach is likely to make security for EV infrastructure more expensive than it needs to be, and more complex, over the next several years.

Featured

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.