Cyber Security

Prioritising the Highest Cyber Safety Standards

At Evie, we prioritise the highest standards of cybersecurity to ensure the safety and integrity of our systems. One of the key pillars of our robust security framework is our implementation of AES256 encryption, a widely recognised and trusted encryption algorithm.

AES256 (Advanced Encryption Standard 256-bit) is a symmetric encryption algorithm that has been adopted by various industries, including the military and banks, for its exceptional level of security. With AES256, we ensure that the telemetry data transmitted between our autonomous vehicles and the fleet management system remains confidential and protected from unauthorised access.

Let’s delve into the details of how Evie Autonomous securely manages encryption keys and ensures the frequent rotation of these keys to strengthen our overall security posture.

Key Management

We employ a stringent key management system to safeguard the encryption keys used by our AES256 algorithm. These keys are generated using cryptographically secure random number generators and are stored in highly secure hardware modules known as Hardware Security Modules (HSMs). HSMs provide tamper-proof protection and prevent unauthorised extraction or modification of the keys.

Key Exchange

When establishing a secure communication channel between our autonomous vehicles and the fleet management system, we utilise asymmetric encryption algorithms like RSA or elliptic curve cryptography (ECC) to securely exchange the AES256 encryption keys. This ensures that even if an attacker intercepts the key exchange process, they cannot derive the AES256 encryption key.

Key Rotation

To maintain a high level of security, Evie Autonomous employs frequent key rotation. This means that the encryption keys used for securing telemetry data are changed at regular intervals. The rotation interval is carefully determined based on industry best practices and the specific requirements of our system.

Secure Key Distribution

During key rotation, the new encryption keys are securely distributed to all authorised components within our infrastructure. We utilise secure channels and cryptographic protocols to ensure the confidentiality and integrity of the key distribution process. This prevents any unauthorised entities from gaining access to the new encryption keys.

Seamless Transition

Our key rotation process is designed to be seamless and transparent to autonomous vehicles and the fleet management system. The encryption keys are updated in a coordinated manner, ensuring uninterrupted communication while maintaining the highest level of security.

Comprehensive Security Measures

By adhering to these comprehensive security measures, Evie Autonomous guarantees the confidentiality, integrity, and availability of telemetry data transmitted between our autonomous vehicles and the fleet management system. Our utilisation of AES256 encryption, trusted by the military and banks, ensures that the data remains protected even in the face of sophisticated cyber threats.

At Evie, we continually invest in state-of-the-art security technologies and protocols to stay ahead of emerging threats. Our commitment to robust encryption practices and secure key management allows us to provide our clients with the utmost peace of mind when it comes to the security of their autonomous vehicle operations.

In addition to our strong focus on encryption and cybersecurity, Evie Autonomous adopts a unique approach to ensure the safety and autonomy of our vehicles. We prioritise the principle of human oversight while minimising direct remote control. Let’s explore how our system operates to maintain a balance between autonomy and human intervention.

At Evie, we firmly believe in the power of autonomous decision-making by our vehicles, guided by advanced artificial intelligence algorithms. Our vehicles are designed to analyse and interpret their surroundings using an array of sensors, cameras, and sophisticated algorithms. This allows them to navigate and make informed decisions independently, without the need for constant remote control.

Rather than enabling direct remote control of the vehicles, our system incorporates a mechanism for seeking clarification when confronted with ambiguous or challenging situations. When a vehicle encounters such a scenario, it does not request remote control from an operator. Instead, it seeks permission or guidance to proceed on a particular path. Upon encountering a situation that requires additional clarification, the vehicle presents the operator with several predefined choices, typically including options such as “continue” or “go around.” These choices are generated based on a combination of real-time sensor data, environmental conditions, and the vehicle’s internal decision-making algorithms. The operator, with their expertise and understanding of the broader context, can review the available options and make an informed decision. Once the operator provides their choice, the vehicle processes this information and proceeds accordingly. It is important to note that at no point during this process is the vehicle being directly controlled remotely.

This approach strikes a balance between the autonomous capabilities of our vehicles and the valuable oversight provided by human operators. It allows for real-time human intervention when necessary while empowering the vehicles to make decisions autonomously within predefined boundaries.
By incorporating human oversight in a selective and controlled manner, we enhance the safety and reliability of our autonomous vehicle operations. Our system ensures that our vehicles are equipped to handle a wide range of scenarios independently, seeking human guidance only when required.
At Evie Autonomous, we are committed to providing a safe and efficient autonomous driving experience, where human intervention acts as a supportive layer in critical decision-making. Our unique approach combines the power of advanced technology, reliable sensors, and human expertise to deliver a comprehensive autonomous solution that meets the highest standards of safety and reliability.