2019
DOI: 10.1177/0361198119837180
|View full text |Cite
|
Sign up to set email alerts
|

Time Series Association State Analysis Method for Attacks on the Smart Internet of Electric Vehicle Charging Network

Abstract: A robust, integrated and flexible charging network is essential for the growth and deployment of electric vehicles (EVs). The State Grid of China has developed a Smart Internet of Electric Vehicle Charging Network (SIEN). At present, there are three main ways to attack SIEN maliciously: distributed data tampering; distributed denial of service (DDoS); and forged command attacks. Network attacks are random and continuous, closely related to time. By contrast, when analyzing the alarm in malicious attacks, the t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
3
1

Relationship

4
5

Authors

Journals

citations
Cited by 30 publications
(14 citation statements)
references
References 4 publications
0
14
0
Order By: Relevance
“…With regard to the dependence and control relationship of program, we capture it with the algorithm proposed in ref. [32]. It should be noted that for industrial Internet protocols, the fields generally have the checksum (like the CRC) which will cause the deluge of taint data if transmitted in control information flow.…”
Section: Methods and Principlementioning
confidence: 99%
“…With regard to the dependence and control relationship of program, we capture it with the algorithm proposed in ref. [32]. It should be noted that for industrial Internet protocols, the fields generally have the checksum (like the CRC) which will cause the deluge of taint data if transmitted in control information flow.…”
Section: Methods and Principlementioning
confidence: 99%
“…(1) Use different training data sets to train the same type of model [12,13]. Bagging and random forest methods both generate different base models in this way.…”
Section: Related Workmentioning
confidence: 99%
“…From the perspective of saving defence cost, it gives the optimal strategy for intrusion detection service deployment in a wireless sensor network environment. To address the massive linkage control problem of attack detection, Li et al [28] used game theory to analyse the security combination model of firewall, intrusion detection system (IDS), and vulnerability scanning technology and gave the optimal intrusion detection calculation method. At the same 4 Complexity time, in the particular network environment with obvious resource constraints such as WSN network and mobile Adhoc network, the game theory is also applied to the solution of the optimal intrusion detection strategy [29][30][31][32][33][34].…”
Section: Related Researchmentioning
confidence: 99%
“…Many researches have been carried out in the academic world to address the network security risks introduced in the development of edge computing networks [12][13][14][15][16][17][18][19][20][21][22][23][24][25][26][27][28][29]. However, as the edge computing network is a hybrid network architecture that involves multiple links and multiple technologies, a unified international standard has not yet been formed.…”
Section: Introductionmentioning
confidence: 99%