Federal Fleet Cybersecurity

The Federal Energy Management Program (FEMP) has developed resources to help fleet managers and information technology teams plan for the emerging cybersecurity vulnerabilities associated with modern vehicles. As vehicles become safer overall, the dangers change from distracted drivers to privacy intrusion and compromised operation. 

To help federal agencies understand the cyber-physical threats to modern vehicles—including connected and automated vehicles, telematics systems, and electric vehicle supply equipment (EVSE)—FEMP and the National Laboratory of the Rockies (NLR) compiled recommendations for federal fleet teams procuring modern vehicle technologies.

The recommendations below are adapted from NLR's technical report, Vehicle Cybersecurity Threats and Mitigation Approaches.


Fleet Cybersecurity Toolkit


Modern Vehicles

Potential attack vectors in many modern vehicles.
Potential attack vectors in many modern vehicles.
Illustration by Joelynn Schroeder, NLR

Modern vehicles are governed by electronic control units that communicate along internal broadcast networks, like the controller area network (CAN) bus. Access to the CAN bus—physically or remotely—coupled with exploitation of any existing security vulnerabilities, can allow hackers to control vehicles remotely. This is highlighted in a video from WIRED that shows security engineers manipulating a car remotely.

Fleet managers can work with their information technology and contracting colleagues to mitigate incidental risks created by modern vehicle technology. General mitigation efforts should include security practices like encrypted communications for any equipment communicating over cellular or wireless networks. Specific procurement recommendations that are particularly relevant to motor vehicles are detailed in the sections below.

Connected and Automated Vehicle Cybersecurity

Illustration shows connected vehicle communications.
Vehicles communicate through sensors, 5G and dedicated short range communications (DSRC), and vehicular ad hoc networks (VANET).
Illustration by Joelynn Schroeder, NLR

Connected vehicles can communicate with other vehicles through a vehicular ad hoc network or with transportation infrastructure. Automated vehicles have the ability to operate without direct human intervention to some degree—from lane centering to fully independent operation without a steering wheel in the vehicle.

While strong evidence shows that vehicle safety features like automatic emergency braking can reduce the frequency and severity of accidents (see IIHS' news story about front crash prevention systems), this sophistication creates different risks associated with safety and privacy.

 

Telematics Cybersecurity

Many fleets benefit from telematics—if used to their maximum extent, telematics could help reduce accidents significantly and help federal fleet managers save over $2,000 per vehicle in a given year (read more in the NLR technical report, Telematics Framework for Federal Agencies: Lessons from the Marine Corps Fleet). However, aftermarket telematics devices are physically connected to motor vehicles and provide data to a remote management system. Both of these aspects provide entry points for hackers if they are not properly secured.

EVSE Cybersecurity

Illustration shows EVSE cybersecurity measures.
EVSE communications should be secured between the charging unit and the central system, web server, and FTP server, and between the charging unit and the vehicle.
Illustration by Joelynn Schroeder, NLR

Electric vehicles (EVs) fuel in a different manner than conventional vehicles—they communicate with EVSE during the charging process. Different types of EVSE have varying levels of communication capabilities. While some communication is essential to establish a connection and greater capabilities provide additional benefits such as power demand management and billing options, they also expose EVs to cybersecurity threats.

 There are three EVSE communication standards commonly used for federal fleet vehicles:

  • J1772 Level 1 or 2 EVSE use pulse width modulation
  • SAE J1772 Combined Charging System EVSE use power line communication
  • CHAdeMO EVSE use certain CAN signals (the same network used by vehicles).

EVSE risk mitigation techniques vary by communication standard as detailed in the NLR Vehicle Cybersecurity Threats and Mitigation Approaches report and summarized in the illustration above. The following recommendations apply to EVSE from a general perspective.