SIM-Enabled IoT Devices as Critical Infrastructure: The Safety Imperative

RAVIT STERN

Marketing Manager

August 5, 2024

Upstream’s latest H1’2024 report asserts that SIM-enabled IoT devices in the automotive and smart mobility ecosystem should be classified as critical infrastructure. This classification is based on their significant impact on three crucial pillars:

  1. Safety: These devices play a vital role in ensuring the physical safety of individuals and the public at large. They are integral to various systems that control vehicle operations, traffic flow, and other aspects of mobility that directly impact human safety. Any compromise or malfunction in these devices could potentially lead to physical harm or life-threatening situations.
  2. Operational Availability: SIM-enabled IoT devices are fundamental to the functioning of modern transportation and mobility services. Any disruption to these devices can have wide-ranging effects on the availability of essential services, from public transportation to emergency response systems.
  3. Sensitive Data Security: These devices collect, process, and transmit vast amounts of sensitive data, including personal identifiable information (PII), location data, and financial information. The security of this data is crucial for maintaining privacy and preventing potential misuse.

In this blog, we’ll focus on the safety element, examining real-life examples that highlight the urgent need for enhanced cybersecurity measures in this rapidly evolving ecosystem.

EV Chargers: When Cybersecurity Vulnerabilities Threaten Public Safety

In February 2024, the UK’s Office for Product Safety and Standards suspended sales of Spanish EV chargers due to cybersecurity concerns, highlighting potential risks to public safety. The vulnerability, caused by the product’s internet connectivity and mobile app control, raised fears that attackers might gain access to many vulnerable chargers and disrupt the power grid by switching on thousands at once. 

This incident illustrates how EV charging vulnerabilities can result in damage to the entire power grid, potentially leading to widespread power outages. Such outages could have severe safety implications, affecting critical services like hospitals, traffic systems, and emergency response capabilities. This case underscores how a seemingly benign IoT device—an EV charger—could become a vector for attacks with far-reaching safety consequences.

Remote Access to Traffic Lights: A Cybersecurity Wake-Up Call

In June 2024, a security researcher discovered a critical authentication vulnerability in a traffic management system, exposing a severe threat to public safety. This flaw allowed unauthorized attackers to gain remote access to the software controlling traffic lights. The implications of this vulnerability are profound and directly impact public safety. 

Malicious actors could potentially manipulate traffic signals, causing chaos on the roads, increasing the risk of accidents, and endangering the lives of drivers, passengers, and pedestrians. Moreover, this vulnerability could be exploited to disrupt emergency services’ routes, potentially delaying critical response times. The incident underscores how SIM-enabled IoT devices in traffic management systems, if compromised, can directly and immediately jeopardize public safety on a large scale, turning essential urban infrastructure into a potential hazard.

Upstream’s Multi-Layer Approach to Securing Automotive and Smart Mobility IoT

Given these significant safety risks posed by vulnerabilities in automotive and smart mobility IoT devices, robust cybersecurity measures are crucial. Upstream’s XDR (eXtended Detection and Response) platform offers a comprehensive solution to complex challenges involving SIM-enabled IoT devices. The platform employs a multi-layered approach:

  1. The IoT Device Layer: Upstream’s platform monitors and protects connected components by leveraging manufacturing or production data, device logs, MQTT, OCPP data streams, diagnostics, and more.
  2. The IoT Cloud Layer: The solution expands detection capabilities to include backend systems, device telematics, OTA updates, remote commands, and diagnostics.
  3. The Application Layer: Upstream’s platform correlates API traffic with the contextual impact on operational systems and devices, enabling continuous API discovery and monitoring, as well as detection and response.

This comprehensive approach allows Upstream to deliver proactive threat analysis, robust detection, and response, coupled with effective monitoring and remediation.

Upstream’s H1 2024 report provides an in-depth analysis of emerging threats, regulatory developments, and innovative security approaches for the automotive and smart mobility ecosystem. Download the full report to gain insights that will help shape your organization’s approach to securing SIM-enabled IoT devices amid new attack vectors.

Newsletter Icon

The After-Sales Quality Report, Zooming in on the Power of AI

Newsletter Icon

Subscribe
to our newsletter

Stay up-to-date on the latest trends, emerging risks, and updates

The SELF DRIVE Act Returns: Why Congress Is Taking Another Shot at AV Regulation

Congress is making its third attempt at federal autonomous vehicle legislation. The SELF DRIVE Act, introduced in February 2026, follows failed efforts in 2017 and…

Read more

Turning fleet data into decisions in the Physical AI era

Connected vehicles have moved the industry into a new operating reality. Products are no longer defined at SOP (Start of Production). They evolve in the…

Read more

Live Digital Twins Power Dynamic and Multi-Dimensional Anomaly and Risk Detection

The automotive industry is entering a sophisticated new era where AI no longer lives solely in the digital realm but must navigate and master the…

Read more

Control Plane Under Attack: How a Platform Outage Escalated into Vehicle Access Failure

In late January 2026, a cyber incident hit a Russia-based provider of after-market automotive security, alarm, and remote access capabilities. Within hours, driver communities were…

Read more