EV Engineering & Infrastructure

  • News
  • Articles
    • Q&As
    • Tech Spotlight
  • Batteries
  • Charging
    • Wireless Charging
    • Vehicle-to-Grid (V2G)
  • Electrification
  • Testing and Safety
  • Learn
    • Learning Center
    • Tech Toolboxes
    • Webinars
  • Resources
    • Digital Editions
    • Diversity & Inclusion
    • Voices
  • Advertise
  • Subscribe

How to safely secure the software-defined EV

By Francesco Fiaschi, Cybersecurity Expert | Littelfuse, Inc. | November 3, 2025

As electric vehicles (EVs) become software-defined and cloud-connected, they introduce powerful new capabilities and a far broader attack surface. Over-the-air (OTA) updates, vehicle-to-everything (V2X) communication, and intelligent charging networks all rely on digital trust.

This article examines how automakers and suppliers can engineer cybersecurity resilience across the full EV lifecycle, from secure boot and zonal network isolation to charger authentication and post-quantum cryptography.

Cybersecurity is no longer optional. It has become a foundational pillar of modern vehicle design and infrastructure.

It also explores how ISO/SAE 21434, ISO 15118, and UNECE R155/R156 frameworks establish the foundation for security compliance in electrified platforms.

By adopting lifecycle security design, defense-in-depth architectures, and cryptographic agility, EV manufacturers can safeguard data and functionality, ensuring reliable, trusted mobility as the industry moves toward greater autonomy and connectivity.

Cybersecurity as a core design discipline

Connectivity, electrification, and automation have pushed the modern vehicle far beyond its mechanical roots. A contemporary light-duty EV, a long-haul truck with advanced telematics, or an autonomous-ready off-highway machine is a distributed computing platform on wheels. Dozens of electronic control units (ECUs), zonal architectures, Ethernet backbones, and cloud links create a rich environment for innovation — and a large attack surface.

However, a vulnerability in a telematics gateway, a misconfigured charger, or a third-party mobile app can propagate laterally and affect functions that are safety-critical.

As a result, cybersecurity can no longer be treated as a late-stage add-on. It must be engineered into requirements, architecture, and verification, and maintained through operations and decommissioning. This demands an explicit coupling of functional safety (ISO 26262) with cybersecurity engineering (ISO/SAE 21434), so that hazards and threats are evaluated together and mitigations are complementary rather than competing.

Threat modeling and architectural guardrails

Security begins with system definition and threat modeling. Engineers should enumerate assets (keys, credentials, firmware images, sensor data), trust boundaries (vehicle-to-cloud, charger-to-vehicle, workshop-to-ECU), and likely adversaries (criminal groups, insiders, hobbyist attackers).

From there, attack trees and misuse cases inform architectural guardrails: domain separation between safety-critical and non-critical networks; message authentication and freshness to prevent spoofing and replay; secure boot to block unsigned firmware; and hardware roots of trust to anchor device identities.

Within zonal architectures, isolate perception and motion-control stacks from infotainment and consumer devices. Gateways should enforce least-privilege routing and filter malformed or rate-abusive traffic. For cloud paths, mutual TLS with certificate pinning and short-lived credentials minimizes the blast radius if a secret is exposed.

Lifecycle security

Unlike consumer devices, vehicles live for a decade or more and pass through multiple owners and use cases. A lifecycle view is mandatory.

  • Design and development: Apply secure coding standards, static/dynamic analysis, and secret-free builds. Provision development and manufacturing environments with least privilege, enclave signing keys in HSMs, and maintain a software bill of materials (SBOM) for all ECUs and companion apps.
  • Production  and validation: Enforce secure boot, component attestation, and end-of-line cryptographic credentialing. Validate OTA pipelines end-to-end, including rollback logic, power-fail recovery, and delta-update integrity for bandwidth-constrained fleets.
  • Operation and maintenance: Run intrusion detection at the edge (ECU-level anomaly monitors) and centrally (fleet analytics). Monitor certificate expiry, rotate keys, and orchestrate patches based on risk. Harden diagnostic paths (UDS) with role-based access and time-bound tokens for service tools.
  • Decommissioning: Erase keys and personal data, revoke credentials in back-end systems, and attest that ECUs return to a non-personalized state prior to resale or salvage.

With software now driving vehicle innovation, securing code, data, and connectivity is mission-critical.

Regulatory and compliance landscape

Security is now a type-approval issue, rather than solely a best practice. Several international standards now govern how it is applied in practice:

  • ISO/SAE 21434 provides the engineering framework for cybersecurity risk management across the V-model.
  • UNECE WP.29 R155 and R156 require OEMs to operate a Cybersecurity Management System (CSMS) and a Software Update Management System (SUMS), with auditable processes covering design through post-production. For EV charging,
  • ISO 15118 enables Plug & Charge with certificate-based mutual authentication;
  • OCPP 2.0.1 strengthens charger-to-backend links and device management; newer profiles add bidirectional energy support as V2G scales.

Compliance is essential, as it institutionalizes threat analysis, ensures traceability between risks and controls, and creates the operational discipline to monitor and react when the threat landscape changes.

Securing the grid

As electrification scales, vehicles are tightly coupled to energy infrastructure. That brings unique risks and opportunities, including:

  • Charger integrity: Compromised firmware can manipulate billing, deny service, or inject malformed messages into the vehicle. Secure boot, signed updates, and device identity anchored in a hardware security module are non-negotiable for charge points.
  • Vehicle-to-grid (V2G): Bidirectional power flow increases value and risk. ISO 15118-20 formalizes cryptography and contract certificates; back-end systems must enforce revocation and promptly quarantine misbehaving nodes.
  • Fleet operations: Mixed fleets (light vehicles, heavy trucks, and yard equipment) span depots, public corridors, and remote jobsites. Connectivity may be intermittent. Designs should support store-and-forward logging, resumable updates, and risk-based patch staging to avoid bricking assets during a duty cycle.
  • Off-highway specifics: Harsh EMC environments and limited bandwidth argue for lightweight telemetry formats, high-tolerance OTA recovery, and physical tamper detection on ECUs that may be exposed to untrusted service procedures.

Proactive resilience

Attackers iterate quickly; purely reactive patch cycles lag behind. A resilience-oriented design blends prevention, detection, and recovery.

  • Defense-in-depth: Layer application whitelisting, ECU attestation, network segmentation, and rate limiting. Gateways should enforce least-privilege routing between zones and throttle anomalous storms.
  • Runtime monitoring: Combine rule-based anomaly detectors with ML models trained on normal behavior. Prioritize explainability so field engineers can triage alerts without guesswork.
  • Safe degradation: If a subsystem is compromised or unstable, the vehicle should enter a defined safe state (for example, limp-home modes, feature gating, or controlled restart) while preserving forensic data for post-incident analysis.
  • Cryptographic agility: Build keystores, APIs, and OTA logic so algorithms and key sizes can evolve without hardware swaps. Hybrid signatures (e.g., classical + post-quantum) can smooth transitions while standards mature.

Preparing for the post-quantum era

Future mobility depends on proactive, quantum-ready cybersecurity strategies across the ecosystem.

Quantum computing threatens the hardness assumptions underlying RSA and ECC. Automotive systems depend on digital signatures for ECU firmware, OTA pipelines, V2X, and charger authentication.

To future-proof these trust anchors, the industry is moving toward NIST’s PQC portfolio: ML-KEM (Kyber) for key establishment, ML-DSA (Dilithium) for signatures, and SLH-DSA (SPHINCS+) as a conservative, hash-based alternative.

Migration requires more than swapping libraries. Key material lifetimes, certificate chains, ECU compute budgets, and message sizes must be reassessed.

Many teams will adopt hybrid cryptography during transition, signing artifacts with classical and PQC algorithms, so existing devices remain compatible while new ones gain quantum-resistant guarantees.

OTA update frameworks and hardware security modules should be upgraded now to accept multiple algorithms and key types without refactoring the entire stack.

 

You might also like


Filed Under: Charging, FAQs, Featured Contributions, Software, Vehicle-to-Grid (V2G), Wireless charging
Tagged With: charging, cybersecurity, FAQ, littelfuse, ota, software, v2g, v2x
 

Next Article

← Previous Article
Next Article →


 
“ee
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EV professionals.

Tech Spotlight

  • Battery sensor enhances early detection of thermal events in EVs
  • Why pressure sensing is critical to EV thermal management
More Tech Spotlight

Featured Contributions

  • Q&A: Engineering modular powertrains for software-defined EVs
  • Reimagining EV design with AI-enhanced EDA tools
  • Q&A: How sensing advances are shaping the future of EV battery safety
  • Why pressure sensing is critical to EV thermal management
  • How to safely secure the software-defined EV
More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: Power Efficiency
Discover proven strategies for power conversion, wide bandgap devices, and motor control — balancing performance, cost, and sustainability across industrial, automotive, and IoT systems.

Learning Center

EE Learning Center

Sponsored Content

  • Converting custom materials for EV applications
  • Advantech Powers Versatile Electric Vehicle Charging Systems

EV Training Days

ev
EV Engineering & Infrastructure
  • 5G Technology
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Engineer’s Garage
  • Microcontroller Tips
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips
  • Contact Us

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search EV Engineering & Infrastructure

  • News
  • Articles
    • Q&As
    • Tech Spotlight
  • Batteries
  • Charging
    • Wireless Charging
    • Vehicle-to-Grid (V2G)
  • Electrification
  • Testing and Safety
  • Learn
    • Learning Center
    • Tech Toolboxes
    • Webinars
  • Resources
    • Digital Editions
    • Diversity & Inclusion
    • Voices
  • Advertise
  • Subscribe