Cybersecurity Challenges in the Era of Chinese Electric Passenger Vehicles
A Qualitative Study Investigating Data Security Measures in the European Union
Copyright (c) 2024 Hegyi Henrietta
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The copyright to this article is transferred to the University of Public Service Budapest, Hungary (for U.S. government employees: to the extent transferable) effective if and when the article is accepted for publication. The copyright transfer covers the exclusive right to reproduce and distribute the article, including reprints, translations, photographic reproductions, microform, electronic form (offline, online) or any other reproductions of similar nature.
The author warrants that this contribution is original and that he/she has full power to make this grant. The author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors.
An author may make an article published by University of Public Service available on a personal home page provided the source of the published article is cited and University of Public Service is mentioned as copyright holder
Abstract
The present research focuses on investigating the security of data transmitted by electric passenger vehicles originating from the People’s Republic of China, particularly when sent for remote processing. Initially, the study examines the factors contributing to the widespread presence of Chinese vehicles in the European market. Additionally, it explores the measures undertaken by the European Union to safeguard the information and data security of its member states. Following this investigation, an in-depth qualitative research method involving semi-structured interviews was conducted. Ten experts in information security were interviewed, and their insights were analysed concerning the identified challenges. The primary objective of this publication is to draw attention to the conceptual deficiencies that impede the protection of data and information, highlighting how a large volume of data collected from a third country, in this case, electric passenger vehicles, may pose national security risks.
Keywords:
How to Cite
References
BABBIE, Earl (2020): A társadalomtudományi kutatás gyakorlata. Budapest: Balassi.
China Mobile Limited (2020): Digitalized and Intelligent New Power for All. China Mobile Limited Sustainability Report. Online: https://www.chinamobileltd.com/en/ir/reports/ar2020/sd2020.pdf
CYBENKO, George – LANDWEHR, Carl (2012): Security Analytics and Measurements. IEEE Security & Privacy, 10(3), 5–8. Online: http://dx.doi.org/10.1109/MSP.2012.75
DEIBERT, Ron (2015): The Geopolitics of Cyberspace after Snowden. Current History, 114(768), 9–15. Online: http://dx.doi.org/10.1525/curh.2015.114.768.9
European Union Agency for Cybersecurity (ENISA) (2018): Good practices for security of Internet of Things in the context of smart manufacturing. 19 November 2018. Online: https://www.enisa.europa.eu/publications/good-practices-for-security-of-iot
European Union Agency for Cybersecurity (ENISA) (2020): Guidelines for securing the Internet of Things. 9 November 2020. Online: https://www.enisa.europa.eu/publications/guidelines-for-securing-the-internet-of-things
HEGYI, Henrietta – ERDŐDI, László (2023): Személygépjárművek adatforgalmának megfigyelési célú felhasználási lehetőségei. Biztonságtudományi Szemle, 5(1), 53–67.
KRIPPENDORFF, Klaus (2018): Content Analysis. An Introduction to Its Methodology. Thousand Oaks: SAGE.
NICHOLS, Elizabeth A. – PETERSON, Gunnar (2007): A Metrics Framework to Drive Application Security Improvement. IEEE Security & Privacy, 5(2), 88–91. Online: http://dx.doi.org/10.1109/MSP.2007.26
OMOYIOLA, Bayo Olushola (2020): The Evolution of Information Security Measurement and Testing. IOSR Journal of Computer Engineering, 22(3), 50–54. Online: http://dx.doi.org/10.9790/0661-2203025054
PERRIG, Adrian – CANETTI, Ran – TYAR, J. D. – SONG, Dawn (2002): The Tesla Broadcast Authentication Protocol. CryptoBytes, 5(2), 2–13.
PFLEEGER, Shari L. (2012): Security Measurement Steps, Missteps, and Next Steps. IEEE Security & Privacy, 10(4), 5–9. Online: https://doi.org/10.1109/MSP.2012.106
PFLEEGER, Shari L. – CUNNINGHAM, Robert (2010): Why Measuring Security Is Hard. IEEE Security & Privacy, 8(4), 46–54. Online: http://dx.doi.org/10.1109/MSP.2010.60
RYAN, J. C. H. – RYAN, D. J. (2008): Performance Metrics for Information Security Risk Management. IEEE Security & Privacy, 6(5), 38–44.
SCHWAB, Klaus (2023): The Fourth Industrial Revolution. Encyclopedia Britannica, 31 May 2023. Online: https://www.britannica.com/topic/The-Fourth-Industrial-Revolution-2119734
SNOWDEN, Edward (2019): Rendszerhiba. Trans. Tomori Gábor. Budapest: XXI. Század.
STOLFO, Salvatore – BELLOVIN, Steven M. – EVANS, David (2011): Measuring Security. IEEE Security & Privacy, 9(3), 60–65. Online: http://dx.doi.org/10.1109/MSP.2011.56
The Central People’s Government of the People’s Republic of China (2010): Decision on Accelerating the Cultivation and Development of Strategic Emerging Industries Released in October 2010. Online: http://www.gov.cn/zwgk/2010-10/18/content_1724848.htm
VENKAT, Subbu (2020): Evolving Automotive Gateways for Next-Generation Vehicles, Texas Instruments. Online: https://www.ti.com/lit/wp/spry333b/spry333b.pdf?ts=1712501484924
WANG, Ning – PAN, Huizhong – ZHENG, Wenhui (2017): Assessment of the Incentives on Electric Vehicle Promotion in China. Transportation Research Part A: Policy and Practice, 101, 177–189. https://ideas.repec.org/a/eee/transa/v101y2017icp177-189.html
WU, Yang Andrew – NG, Artie W. – YU, Zichao – HUANG, Jie – MENG, Ke – DONG, Z. Y. (2021): A Review of Evolutionary Policy Incentives for Sustainable Development of Electric Vehicles in China: Strategic Implications. Energy Policy, 148. Online: https://doi.org/10.1016/j.enpol.2020.111983
ZHANG, Xingping – LIANG, Yanni – YU, Enhai – JIAN XIE, Rao Rao (2017): Review of Electric Vehicle Policies in China: Content Summary and Effect Analysis. Renewable and Sustainable Energy Reviews, 70, 698–714. Online: https://doi.org/10.1016/j.rser.2016.11.250
ZORZ, Zeljka (2018): Researchers Hack BMW Cars, Discover 14 Vulnerabilities. Help Net Security, 23 May 2018. Online: https://www.helpnetsecurity.com/2018/05/23/hack-bmw-cars/