2022
DOI: 10.1109/access.2022.3182689
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Attack on P2P Energy Transaction Between Connected Electric Vehicles: A False Data Injection Detection Based Machine Learning Model

Abstract: When cybersecurity is neglected, any network system loses its efficiency, reliability, and resilience. With the huge integration of the Information, Communication and Technology capabilities, the Connected Electric Vehicle (CEV) as a transportation form in cities is becoming more and more efficient and able to reply to citizen and environmental expectations which improve the quality of citizens' life. However, this CEV technological improvement increases the CEV vulnerabilities to cyber-attacks resulting to se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(7 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…This framework facilitates the creation of interconnected virtual networks for the purpose of generating and gathering flow data via the NetFlow protocol. [11] Flow termination occurs either after 15 seconds of inactivity or after 1800 seconds (30 minutes) of activity. The first dataset, denoted as D1, was utilized for training detection models, while the second dataset, denoted as D2, served for testing purposes.…”
Section: Data Gatheringmentioning
confidence: 99%
“…This framework facilitates the creation of interconnected virtual networks for the purpose of generating and gathering flow data via the NetFlow protocol. [11] Flow termination occurs either after 15 seconds of inactivity or after 1800 seconds (30 minutes) of activity. The first dataset, denoted as D1, was utilized for training detection models, while the second dataset, denoted as D2, served for testing purposes.…”
Section: Data Gatheringmentioning
confidence: 99%
“…Because of the abovementioned relationship, in these cases, the system move towards the balance state at the lower speed than Eqs. ( 14) and (15) for satisfying the abovementioned conditions (Eq. ( 19)).…”
Section: Algorithmic Steps Of Tea-fs Techniquementioning
confidence: 99%
“…The significant features of BC involving anonymity, decentralization, and security can apply secure data transactions and overcome centralized server dependence to support security in 5G-based IoT. Additionally, the inimitable property of dispersed data storage, smart contracts, and asset tracking make BC technology required for 5G-based IoT [15].…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, machine learning techniques can be utilized for anomaly detection in vehicle behavior [251,252]. By establishing the baselines of normal vehicle operation, machine learning models can identify deviations that may indicate unauthorized access or malicious control attempts [253,254]. This can help protect vehicles from cyber-physical attacks, such as remote hijacking or manipulation of critical systems [255,256].…”
Section: Machine Learning Techniquesmentioning
confidence: 99%