Cyber risks on India’s electric roads

As the computer-on-wheels revolution reaches Indian roads with the launch of Tesla and other connected vehicles, the country needs to prepare for cybersecurity challenges by laying down standards for ...

By
Ranjan Pal, Bodhibrata Nag and Saral Mukherjee
Last Updated: Oct 17, 2025, 18:42 IST8 min
As Tesla started delivering the first batch of its cars in India importing its SUVs from Shanghai and Germany, India faces a steep cyber security learning curve. 
Image: Shutterstock
As Tesla started delivering the first batch of its car...
Advertisement

When Tesla finally rolled onto Indian streets in mid July 2025, with online bookings for the Model Y opening at ₹22,220 and the first showroom inaugurated in Mumbai’s Bandra Kurla Complex, it marked more than just the arrival of a luxury EV brand; it heralded a transformation of India’s motoring, logistics and digital ecosystems all at once.

Advertisement

As Tesla started delivering the first batch of its cars in India importing its SUVs from Shanghai and Germany, India faces a steep cyber security learning curve. Here’s an unvarnished look at the primary cyber-attack vectors which can potentially exploit India’s rapidly electrifying transportation landscape and urgent actions that must be taken to ensure that Indian roads remain resilient, secure, and prepared for the digital threats.

Cybersecurity Challenges

As India accelerates toward electrified mobility, its emerging electric road networks face a series of serious cybersecurity threats:1. Expanding attack surface on wheels: Tesla’s true differentiator is its software-first approach to mobility. Its vehicles receive seamless over-the-air (OTA) firmware updates, featuring advanced driver-assistance systems such as Autopilot and Full Self-Driving (FSD), and operate within a deeply integrated ecosystem of connected services, from navigation and remote diagnostics, to live-traffic data and mobile app-based controls. In essence, a Tesla is less an automobile and more a data centre on wheels. It is a continuously connected platform where every line of code, wireless link, and open API could double as a gateway for innovation or a potential entry point for cyber threats. In a nation as digitally diverse as India, weak encryption during software updates, poor key management at home charging stations, and outdated firmware in public chargers or roadside systems create potential entry points for attackers. Such vulnerabilities could allow remote manipulation of steering or braking systems, or the covert extraction of GPS and driver-behaviour data—all without raising immediate alarms. Imagine a scenario where a compromised service kiosk at a dealership linked directly to the manufacturer’s network becomes the entry point for a cyberattack. Malicious firmware could be quietly pushed to multiple electric vehicles during routine updates. This isn’t a distant threat. Vulnerable V2X (vehicle-to-everything) modules or infotainment systems could equally serve as gateways into broader networks, from city traffic systems to cloud infrastructures. Without robust cybersecurity protocols, secure update mechanisms, and hardware-level defences, your state-of-the-art electric SUV could transform from a symbol of cutting-edge mobility into an instrument of surveillance, or worse, a remotely controlled node in a coordinated cyberattack.

2. Charging infrastructure and smart grid vulnerabilities: As Tesla expands its Supercharger network in India, integration with the national grid will be both an opportunity and a challenge. The next generation of smart charging stations will coordinate with utilities on load management, dynamic tariffs, and even vehicle-to-grid (V2G) energy transfers. Yet this intelligence comes with heightened exposure. The system’s connectivity extends across SCADA controls, payment terminals, and cloud-based billing platforms. A single cyber-attack through a tainted firmware update or compromised server could cripple charging infrastructure across multiple cities or inject malicious commands into transformers, potentially leading to large-scale power disruptions. India’s Production-Linked Incentive (PLI) scheme is driving rapid localization across the EV supply chain—but it’s also expanding the sector’s cyber risk surface. As domestic manufacturers ramp up production of EV charging components like PLCs, power modules, and inverters, many rely on imported microcontrollers or wireless chips sourced at low cost with limited security vetting. Without hardware-level safeguards such as Trusted Execution Environments, these components could become large-scale cyber vulnerabilities. Even innocuous elements such as communication modules or cable-control boards may carry preloaded malicious firmware. The risk extends to billing and payment systems as well. Breaches in energy management apps or transaction platforms could enable identity theft, pricing fraud, or remote shutdowns of charging infrastructure. With DISCOMs, OEMs, and charger operators expanding through public–private partnerships, India’s evolving EV ecosystem is becoming a complex, interconnected and increasingly attractive cyber target.

Also Read: Can India's electric vehicle makers take on Tesla?

3. Data privacy, telematics and user profiling: Beyond physical control, Tesla collects massive quantities of data—location traces, driver habits, biometric unlock patterns, in-cabin video feeds, and detailed logs of every brake, turn, and acceleration. This telemetry paints a near-complete behavioral fingerprint of the user. In the absence of a robust data protection regime, this rich data trove could be exploited by cybercriminals for stalking, blackmail, or hyper-targeted advertising. Corporate espionage becomes alarmingly feasible when competitor movements or executive travel patterns can be inferred from EV telemetry. For example, the repeated presence of a vehicle at the R&D wing of a major automotive rival could tip off investors or hackers to confidential activity. Worse, in politically sensitive cases, nation-state actors could compel Indian charging infrastructure providers, mobile networks, or data centres to hand over user metadata, effectively tracking high-value individuals by their comings and goings, mapping private routines, and even predicting future movements. A judge’s travel route, a journalist’s meetings, or a whistle-blower’s hideout could be silently compromised. In such a vacuum, the car ceases to be a private mobility device and instead becomes a rolling surveillance terminal—one that watches, listens, and remembers.

Advertisement

4. Regulatory and road network challenges: Indian roads are famously chaotic -- mixed traffic, informal roadside vendors, variable lane discipline, and inconsistent signage. Add to that an autonomous vehicle platform relying on HD maps, LIDAR/vision fusion, and V2X (vehicle-to-everything) beacons and you introduce new cyber risks with every municipal tech upgrade. For instance, imagine a hacked smart traffic light system in Delhi’s Connaught Place that feeds false green signals to incoming vehicles while blocking cross traffic, leading to intersection gridlock or collisions involving semi-autonomous vehicles relying on machine-verified traffic data. Or consider a spoofed V2X beacon in Bengaluru falsely broadcasting school zone alerts, causing abrupt deceleration in fast-moving traffic and triggering rear-end crashes. Without a clear regulatory framework mandating secure development lifecycles, vulnerability disclosure protocols, and certified security audits, each digital enhancement—whether it's an AI-driven traffic camera, an adaptive speed-limit sign, or a roadside sensor node—becomes a potential Trojan horse. These can be exploited not only to confuse individual vehicles but also to disrupt traffic flows across entire city sectors, weaponizing infrastructure against the very mobility it was designed to improve.

Cybersecurity management action items

India’s electric roads urgently need implementation of the following managerial action items.

Mandate a national EV cybersecurity standard: India must implement a national EV cybersecurity standard covering vehicle networks, OTA updates, and smart chargers. Automakers should isolate critical ECUs like braking and steering on dedicated CAN or CAN FD bus segments, with firewalls separating them from infotainment systems. OTA updates must use strong code signing (e.g., ECDSA) and mutual TLS, with tamper-evident binaries and rollback capability. For smart chargers, enforce ISO 15118 “Plug & Charge” with embedded secure elements and EMI/EMC compliance. On the grid side, chargers should include a “load-shedding handshake” to let utilities manage peak demand and avoid brownouts. While this raises pressure on supply chains, requiring secure microcontrollers and vetted firmware, it creates incentives for local semiconductor manufacturing under the PLI scheme.

Read More

Establish a joint cyber incident response cell: India should set up a 24x7 Security Operations Centre (SOC) jointly staffed by CERT-In, Tesla India’s security team, REN-ISAC, and DISCOM representatives. This cell would coordinate real-time threat monitoring using dashboards that aggregate IDS/IPS alerts from substations, EV chargers, and connected vehicles. A predefined escalation protocol featuring simulated “fire drills” would ensure that malware outbreaks, even on a small number of home chargers, trigger rapid emergency load-shedding commands and public warnings. The grid impact would be significant - shared anomaly indicators would allow DISCOMs to quickly “island” compromised feeders, preventing cascading blackouts. Additionally, by contributing to a shared threat intelligence pool, utilities would pressure their IT/OT vendors to adopt hardened SCADA systems, strengthening the overall resilience and security of India’s evolving grid infrastructure.

Enforce secure supply chain audits: India must mandate secure supply chain audits for all EV ecosystem vendors, including Tier 1 and Tier 2 suppliers. Critical components like PCBAs, battery management systems, and telematics units should undergo third-party penetration testing, with signed Supply Chain Level of Assurance (SLCA) certifications per ISO/SAE 21434. To prevent counterfeit or compromised hardware, key parts such as microcontrollers, power MOSFETs, and high-voltage contactors should use blockchain-backed traceability. This approach will raise quality across the board, transformer and switchgear vendors will face similar scrutiny, reducing substation failures and ensuring steadier EV charging. Long term, PLI-backed local fabs will scale semiconductor and PCB production, easing import dependency and lowering hardware costs.

Advertisement

Strengthen data protection legislation: India must urgently pass comprehensive data protection laws tailored to the EV ecosystem. Legislation should require drivers to give granular, journey-specific consent for any data sharing beyond safety-critical telemetry. By default, only anonymized, aggregate load curves should be shared with utilities. All raw location data and biometric unlock hashes must be stored within Indian borders and automatically deleted after 30 days unless the user opts to retain them longer. For the grid, clear data-use rules will allow DISCOMs to integrate anonymized EV charging profiles into demand-side management (DSM) algorithms, smoothing peak loads while respecting privacy. On the supply side, cloud providers, analytics firms, and AMI meter vendors will be required to establish India-based data centres, increasing capital investment and creating skilled jobs in Tier II and III cities.

Invest in cyber awareness and training: Building cyber resilience in India’s EV ecosystem requires widespread awareness and targeted skill development. Red team/blue team exercises should simulate real-world attacks on EV charging microgrids, including phishing attempts on substation staff and controlled detonation of ICS malware. In parallel, the National Institute of Solar Energy should offer an “EV Grid Cybersecurity Specialist” certification program, open to engineers from utilities like BSES, Tata Power, and Tesla service centres. This investment will create a skilled workforce capable of securing SCADA, network management systems, and charger platforms. Over time, vendors will face greater accountability, certified professionals will act as embedded auditors, and any supplier unable to explain protocols like IEC 62443 or IEEE 2030.5 risks losing their contracts. This shift will drive both innovation and discipline across the EV supply chain.

Ranjan Pal (MIT Sloan School of Management, USA)Bodhibrata Nag (Indian Institute of Management Calcutta)Saral Mukherjee (Indian Institute of Management Ahmedabad)

Advertisement
This article has been published with permission from IIM Calcutta. https://www.iimcal.ac.in/ Views expressed are personal.

First Published: Oct 17, 2025, 18:41

Subscribe Now
Advertisement