2022
DOI: 10.3390/en15165773
|View full text |Cite
|
Sign up to set email alerts
|

Do Charging Stations Benefit from Cryptojacking? A Novel Framework for Its Financial Impact Analysis on Electric Vehicles

Abstract: Electric vehicles (EVs) are becoming popular due to their efficiency, eco-friendliness, and the increasing cost of fossil fuel. EVs support a variety of apps because they house powerful processors and allow for increased connectivity. This makes them an attractive target of stealthy cryptomining malware. Recent incidents demonstrate that both the EV and its communication model are vulnerable to cryptojacking attacks. The goal of this research is to explore the extent to which cryptojacking impacts EVs in terms… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…Researchers have also demonstrated how an attacker may cryptojack someone else's EV resources to mine for cryptocurrency [9]. An attacker can even hijack an entire fleet of EVs simultaneously for cryptojacking.…”
Section: Battery and Energy Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Researchers have also demonstrated how an attacker may cryptojack someone else's EV resources to mine for cryptocurrency [9]. An attacker can even hijack an entire fleet of EVs simultaneously for cryptojacking.…”
Section: Battery and Energy Attacksmentioning
confidence: 99%
“…and privacy concerns are increasing with the embedded sensors that collect information such as personal identifiable information (PII), financial, health, charging logs, driving habits, video, location coordinates, and car-related data [8]. There are also many potential cyber threats to vehicular technology, such as third-party application libraries, identity thefts, private data breaches, cryptojackings [9], and ransomware [10]. Due to these threats, the confidentiality and privacy of user data is at continued risk [11].…”
Section: Introductionmentioning
confidence: 99%
“…Another use case of these advanced techniques was presented in MikroTik routers between July and August of the year 2018, where a cryptojacking campaign managed to compromise more than 200,000 MikroTik routers; these routers were primarily located in Brazil; in the same way, researchers observed that routers that were not MikroTik were also compromised [ 26 ]. Moreover, a recent study explores cryptojacking and its impact on Electric Vehicles [ 27 ].…”
Section: Some Cases Of Cryptojackingmentioning
confidence: 99%