NHTSA takes next step on national crash-avoidance system

The National Highway Traffic Safety Administration has moved further down the road toward a networked vehicle crash-avoidance system, but skeptics continue to voice concerns about the implications for physical safety and cybersecurity.

NHTSA issued an advance notice of proposed rulemaking on Aug. 18 to solicit public comments on the technical specifics of its plans for a system that would use onboard wireless devices to transmit and share critical safety information among vehicles on the road. In a report issued with the notice, the agency said the system could save more than 1,000 lives per year and prevent almost 600,000 crashes.

According to an NHTSA statement, the report and notice will help the agency gather significant input from the public and stakeholders to support the goal of delivering a final rule by 2016.

"Safety is our top priority, and [vehicle-to-vehicle] technology represents the next great advance in saving lives," Transportation Secretary Anthony Foxx said in the NHTSA statement. "This technology could move us from helping people survive crashes to helping them avoid crashes altogether -- saving lives, saving money and even saving fuel thanks to the widespread benefits it offers."

The notice comes as the Federal Communications Commission considers opening more spectrum in the 5 GHz band to accommodate unlicensed wireless devices, including those involved in vehicle-to-vehicle communications. According to NHTSA, the national V2V system would transmit and receive messages in the 5.8-5.9 GHz range, and automakers and other groups have urged the FCC to be cautious about opening more of that band for use by unlicensed devices.

NHTSA's rulemaking notice asks for comments on the potential impact of the FCC's proposal, saying the FCC "has proposed the possibility of sharing the [dedicated short-range communications] frequency of 5.9 GHz with other unlicensed devices. What are the possible ramifications of this sharing on current safety applications and future applications that may be developed?"

The Alliance of Automobile Manufacturers released a statement saying, "As we begin to move from the research lab to the actual deployment of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications technology, it remains critically important that the FCC preserve the ability to use the radio spectrum reserved for it. We understand the pressing need for additional spectrum and are open to sharing this spectrum if it can be done safely. We continue to urge the FCC not to compromise the use of the spectrum until it is definitively established that sharing will not interfere with the safety of the driving public."

Radio interference is not the only issue with increasingly autonomous vehicles. As cars and trucks contain more onboard networked devices and gadgets, automakers' concerns about cybersecurity are growing. In July, the Alliance of Automobile Manufacturers created a voluntary information sharing and analysis center aimed at protecting the cybersecurity of increasingly Internet-wired vehicles. The organization said the center would collect and share information about existing or potential cybersecurity threats and vulnerabilities in motor vehicle electronics or associated in-vehicle networks.

"Despite the absence of reported cybersecurity incidents affecting vehicles on the road, we are taking action to prepare for possible future threats," according to a statement on the organization's website.

Additionally, a recently disclosed unclassified/for-official-use only memo issued by the FBI in May and posted by the Public Intelligence open-source website on Aug. 18 warns that onboard systems that run autonomous, driverless vehicles can contribute to safer driving but also offer advantages for criminals.

"While autonomous cars would likely face many hardships with evasive driving or car chases, these cars can optimize the best way to perform, say, a 'K turn' or other awkward maneuvers that could cause [emergency] responders to lose time in pursuit of a suspect or getting to a scene in a timely fashion."

However, those precision driving capabilities would also be available to criminals who are evading the police in a driverless or driver-assisted vehicle.

"Law enforcement officers and bad actors will both be able to conduct tasks that require use of both hands or take one's eyes off the road which would be impossible to conduct simultaneously today while driving a car manually," the FBI memo states.

NHTSA said key-encrypted communications technology will form the cybersecurity foundation of the V2V system. Transportation Department researchers compared three cybersecurity options -- symmetric encryption, group signature and asymmetric public-key infrastructure systems -- and chose a PKI option as the most effective approach to implementing communications security and trusted messaging for a large set of users.

About the Author

Mark Rockwell is a staff writer at FCW.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at or follow him on Twitter at @MRockwell4.

The Fed 100

Read the profiles of all this year's winners.


  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group