2020
DOI: 10.2172/1706221
|View full text |Cite
|
Sign up to set email alerts
|

Securing Vehicle Charging Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Fig.2. A minimal implementation of ESMS, adapted from the STRIDE threat model proposed by the Sandia National Laboratories[19] …”
mentioning
confidence: 99%
“…Fig.2. A minimal implementation of ESMS, adapted from the STRIDE threat model proposed by the Sandia National Laboratories[19] …”
mentioning
confidence: 99%
“…Even if an attacker cannot decipher the transmitted data, they may still be able to interrupt an EV's charging process by intercepting and replaying communications, such as those that initiate and end charging sessions. The local authorization list features available in OCPP versions 1.5 and 1.6 ensures that an EVCS can continue to serve its customers during a network outage [27].…”
Section: Cybersecurity Attacks In Evsmentioning
confidence: 99%
“…(2) Man-in-the-Middle: In an EVCS, a Man-in-the-Middle (MITM) attack occurs when an unauthorized attacker inserts themselves between the communication channels of the system. The attacker intercepts and manipulates the data transmission between the Electric Vehicle Supply Equipment (EVSE), the Plug-in Electric Vehicles (PEVs), and the Smart Charging Management System (SCMS) [27]. By gaining access to the communication flow, the attacker can alter, discard, or misrepresent the data exchanged, leading to various malicious outcomes [4].…”
Section: Charging System Threat Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The EVSEs are smart internet of thing (IoT) devices that can connect the BEVs to an available power source, with support for both grid-to-vehicles (G2V), and a reverse vehicle-to-grid (V2G) energy transactions. However, BEVs and EVSEs can be easily manipulated, individually or collectively, by adversaries to gain access and act as conduits to breach their internal security, leading to malicious attacks and life-threatening situations, for instance, traffic accidents [3] in BEVs, and disrupt or cause power systems failure through high or low voltages on feeder circuits in EVSEs [4].…”
Section: Introductionmentioning
confidence: 99%