Review of Electric Vehicle Charger Cybersecurity Vulnerabilities, Potential Impacts, and Defenses
Abstract
:1. Introduction
2. Methodology
2.1. EV-to-EVSE Interfaces
- Mode 1 is a passive AC connection up to 16 A at 240 V single phase or 480 V three-phase;
- Mode 2 includes an in-cable control and protection device (IC-CPD) which performs control and safety functions. It operates up to 32 A at 240 V single phase or 480 V three-phase;
- Mode 3 includes the IC-CPD but increases the max current to 250 A;
- Mode 4 is DC connection up to 600 V at a current ≤ 400 A.
- Type 2—A 7-pin, three-phase connection defined in SAE J3068 [66]. This uses a Local Interconnect Network on the Control Pilot (LIN-CP) for digital communications between charger and vehicle.
- EE—A Mode 4 DC Combined Charging System (CCS) Combo 1 coupler. This connector superimposes two communication protocols on the cordset to communicate between EV and EVSE. The first is ISO/IEC 15118 [72] which uses a power line communication (PLC) internet protocol (IP) stack built on the HomePlug Green PHY (HPGP) [73] Data Link and Physical layers. The second protocol is the IEC 61851-1 pulse-width modulation (PWM) signal [65].
2.2. EV Operator Interfaces
2.3. EVSE Internet Interfaces
2.4. EVSE Maintenance Interfaces
3. EVSE Vulnerabilities
3.1. EV-to-EVSE Interface Vulnerabilities
3.2. EV Operator Interface Vulnerabilities
3.3. EVSE Internet Interface Vulnerabilities
3.3.1. Web Services
3.3.2. Internet-Accessible EVSE Services
3.3.3. Communications to Backend Server or Cloud Systems
3.4. EVSE Maintenance Interface and Hardware/Software Vulnerabilities
Researchers | Year | Vulnerability Description | Coupler | Citation |
---|---|---|---|---|
Höfer et al. | 2013 | Credential theft and privacy risks. | CCS | [111] |
Lee et al. | 2014 | EV ID spoofing, power stealing, falsifying meter data, and preventing operations. | CCS | [107] |
INL | 2017 | Malware potentially passed between EVs and EVSE. | CHAdeMO | [103] |
Boa et al. | 2018 | Session hijacking, charging repudiation, MITM, DoS, and masquerading attacks. | CCS | [108] |
Baker & Martinovic | 2019 | Eavesdrop on CCS charging sessions with radiated side-channel. | CCS | [101] |
Dudek et al. | 2019 | Developed V2G Injector software to read and write CCS HPGP data allowing the theft of network keys and injection of data through replay or MITM attacks. | CCS | [105] |
Rohde | 2019 | DCFC charging disruptions when EVSE HMI or EV is compromised and falsifies battery SOC. | CHAdeMO | [134] |
Dudek | 2021 | Injected a Log4Shell payload in a CCS HPGP charging session. | CCS | [106] |
Köhler et al. | 2022 | “Brokenwire” wireless/RF attack terminates CCS charging session(s) using an antenna and Software Defined Radio. | CCS | [102] |
Researchers | Year | Vulnerability Description | Interface | Citation |
---|---|---|---|---|
Friedland | 2016 | Insecure authorization mechanisms for EVSE operators. | RFID, smart phone, and MIFARE Classic | [113] |
Dalheimer | 2017 | RFID card cloning to falsify billing account. | RFID | [112] |
INL | 2018 | Poorly secured smart phone apps used to manage customer charging sessions. | iOS and Android apps | [115] |
Wright & Street | 2019 | Credit card skimmers on EVSE. | Card swipes | [114] |
Researchers | Year | Vulnerability Description | Interface | Citation |
---|---|---|---|---|
Shezef | 2013 | Open configuration web server running on EVSE. | EVSE web server | [96] |
Friedland | 2016 | Network traversal with OCPP. | EVSE/cloud | [113] |
Dalheimer | 2017 | Interception of RFID, credit card, or other near-field-communication (NFC) data. | EVSE/cloud | [112] |
Alcaraz et al. | 2017 | OCPP MITM vulnerabilities. | EVSE/cloud | [90] |
INL | 2018 | Unauthorized access to configuration files and data via insecure web servers, flat EVSE networking, inappropriate authentication methods, insecure FTP firmware server, XSS, etc. | EVSE web server, cloud | [115] |
Kaspersky Lab | 2018 | Buffer overflow in web server Common Gateway Interface. | EVSE web server | [121] |
Castro | 2018 | View or exfiltrate software information, statuses, and critical setup information. | Internet | [124] |
Hille & Allhoff | 2018 | Vulnerable services running on an EVSE that could be accessible from the mobile network interface. | Internet/HTTPS port | [125] |
Rubio et al. | 2018 | OCPP MITM vulnerabilities. | EVSE/Cloud | [128] |
Pen Test Partners | 2021 | Unauthenticated APIs, insecure direct object API references, account hijacking, insecure firmware update mechanisms, exposed OCPI endpoint. | Cloud, EVSE web servers | [116] |
Nasr et al. | 2021 | Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), Server-Side Request Forgery (SSRF), and information exposure. | EVSE web server | [118,120] |
Varriale, Crawford, & Jaynes. | 2021 | EVSE chargers on public internet with unnecessary/outdated services, weak credentials, or missing login timeout functions. | Open ports & services | [88] |
Researchers | Year | Vulnerability Description | Interface | Citation |
---|---|---|---|---|
Dalheimer | 2017 | Exfiltration of logs and configuration data (OCPP credentials, authentication tokens) via USB. | USB ports | [112] |
INL | 2018 | Weak hashing, insecure bootloaders, firmware modification, JTAG interfaces allowed direct control of the processor, etc. | Various | [115] |
Kaspersky Lab | 2018 | Factory reset using special blinking pattern. | Photodiode | [121] |
Pen Test Partners | 2021 | Extraction of credentials and other data from EVSE. | Memory | [116] |
Schneider Electric | 2021 | Hard-coded credentials, improper cryptographic signatures verification, insecure password hashing, etc. | Operating system | [118,120] |
4. Impacts
4.1. Functional Impacts
4.2. Financial/Privacy Impacts
4.3. Safety Impacts
4.4. Power System Impacts
Researchers | Attack Scenario | Impact | Citation |
---|---|---|---|
INL | Disable chargers with malicious firmware update | EV operators cannot charge which impacts emergency and medical services, food and agriculture, manufacturing, defense, etc. | [115] |
Rohde | Falsify the SOC at EVSE either directly or via the EV | Delay driving or prevent driver from reaching destinations; localized power maloperation. | [134] |
Sagstetter et al. | Inject malicious CANbus messages to vehicle via CHAdeMO connection | Damage vehicle batteries by manipulating Battery Management System (BMS) functions. | [137] |
Dalheimer; Portela et al. | Unauthorized access to EVSE devices or backend management systems | PII data theft, billing falsification (e.g., free charging), or compromise of payment data. | [87,106] |
Pen Test Partners | Exposed private or corporate networks | Corporate espionage, or theft of sensitive software, information, or data. | [116] |
Carlson | Malicious firmware update, privilege escalation, and other attacks | Disable thermal management, WPT safety systems, or other safety-critical protections. | [141] |
Alcaraz et al.; Ahmed & Dow | OCPP MITM attack; backend system compromise; malicious firmware update | Power market disruptions affecting generator scheduling and economic dispatch. | [90,147] |
Khan et al. | EV botnet manipulated the load of multiple 50 kW DCFCs | Distribution undervoltage violations with 2.5 MW of load; outage with 10% load increase. | [151] |
Johnson et al. | Transmission load drop and load modulation attack | Minimal loss of generation and load. Bulk system stability was maintained. | [154] |
Johnson et al. | EVSE V2G control miscoordination that produced active and reactive power flows | Minimal. Distribution voltage outside of ANSI Range A at end of feeder. | [154] |
Morrison | Simultaneous charging of ~600,000 EVSE in California | Under-frequency load shedding event. | [155] |
Acharya et al. | Attacker could control EVSE load controller gains | Grid frequency above 62 Hz for 0.16 s, tripping distributed generation. | [157] |
5. Cybersecurity Defenses and Hardening Recommendations
5.1. EV-to-EVSE Interface Hardening Recommendations
5.2. EV Operator Interface Hardening Recommendations
5.3. EVSE Internet Hardening Recommendations
5.4. EVSE Maintenance Interface and Hardware/Software Hardening Recommendations
Organization/Researchers | Cybersecurity Hardening Suggestions, Technologies, or Topics | Citation |
---|---|---|
Höfer et al., 2013 | Add protocol extensions to provide greater privacy to ISO 15118. | [111] |
Chan and Zhou, 2014 | Cyber–physical challenge-response charging authentication. | [174] |
Lee et al., 2014 | Harden ISO 15118 with additional authentication mechanisms, confirming message validity, and using a third-party auditor to thwart EV-EVSE collusion. | [107] |
Chan & Zhou, 2014 | Add cyber–physical challenge-response mechanism for J1772 authentication. | [174] |
Eekelen et al., 2014 | Recommendations for design, implementation, infrastructure, and incident issues; stronger authentication of customer identity; end-to-end encryption; add data-centric security and publish/subscribe middleware to OSCP. | [173] |
ElaadNL, 2016 | Design, cryptography, communications, system hardening, resilience, access control, logging, product lifecycle, governance, assurance. | [35] |
Moroson & Pop, 2017 | Neural network trained to detect malicious OCPP traffic. | [190] |
INL, 2017 and 2018 | Deploy intrusion detection systems to allow/deny charging based on EV security fingerprints. | [103,177] |
Bao et al., 2018 | Add clock synchronization, EV OCSP checks within the EVSE, and mandatory TLS encryption to ISO 15118. | [108] |
Mültin, 2018 | Move to PnC identification mechanisms to avoid the insecurity of RFID and other nearfield authorization technologies. | [185] |
Rubio et al., 2018 | Adding IEC 62351 TLS profiles, endpoint security, and role-based access control (RBAC) security mechanisms to OCPP. | [128] |
Vaidya & Mouftah, 2018 | Use a role-based access control system on the OCPP Control Center server. | [188] |
INL, 2018 | Use TLS, code signing, unique username/password combinations, improve mobile APIs, and securing sessions with a signed certificate. | [115] |
NREL, 2019 | Encrypt data-at-rest and data-in-flight, remove external ports, add tamper alarms, and certify cloud services with FedRAMP. | [12] |
ElaadNL, 2019 | Access control, cryptography, communications, physical/information, operational (backup, logging, vulnerability management) security. | [170,171] |
U.S. DOT Volpe Center, 2019 | Collection of XFC requirements: design, logging, cryptography, communication, assurance, hardening, resiliency, secure operation, etc. | [30] |
Van Aubel et al., 2019 | Use extensions to ISO 15118, OCPP, and OCPI to provide secrecy and nonrepudiation at the individual data field level. | [187] |
Baker & Martinovic, 2019 | Prevent remote sideband CCS data extraction via electromagnetic shielding; improve HPGP key distribution; add new SLAC initialization steps. | [101] |
DigiCert, ChargePoint, and Eonti, 2019 | Create certificate policy for all V2G root hierarchies, improve certificate revocation policies, create key management requirements, etc. | [129] |
Gottumukkala et al., 2019 | Use secure-by-design principals, software security, hardware security, and tamper monitoring and resistance. | [191] |
Fuchs et al., 2019; Fuchs et al., 2020 | Use Security Module (SecMod) Protection Profile to support the security functions in the ISO 15118 communication protocol. | [183,184] |
Vaidya & Mouftah, 2020 | Employ ISO 15118 Multimodal and Multi-pass Authentication mechanisms. | [175] |
Zhou et al., 2020 | V2G blockchain energy trading framework for secure transactions. | [189] |
Carlson, 2021 | Monitor EV charger operations with intrusion detection framework. | [141] |
Sandia, 2021 | Broad cyber recommendations for business and EVSE network and operations, EVSE physical and logical interfaces, and EVSE ecosystem. | [154] |
Ghatikar, 2021 | Secure Network Interface Card (S-NIC) with secure boot and tamper resistant technologies. | [192] |
Yang et al., 2011; Liu et al., 2014; He et al., 2014; Chen et al., 2021 | Privacy-preserving technologies for V2G applications. | [193,194,195,196] |
Köhler et al., 2022 | Reduce the risk and impact of aborting CCS charging sessions with RF shielding and enabling re-authentication. | [102] |
6. Discussion
7. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Strauss, M. Deployment of EU Electric Vehicle Charging Stations Too Slow, Auditors Say. Available online: https://www.reuters.com/article/us-eu-autos-electric-charging/deployment-of-eu-electric-vehicle-charging-stations-too-slow-auditors-say-idUSKBN2C023C (accessed on 23 May 2022).
- Brown, A.; Lommele, S.; Schayowitz, A.; Klotz, E. Electric Vehicle Charging Infrastructure Trends from the Alternative Fueling Station Locator: Fourth Quarter 2020; National Renewable Energy Laboratory: Golden, CO, USA, 2020.
- The White House FACT SHEET: Biden Administration Advances Electric Vehicle Charging Infrastructure. Available online: https://www.whitehouse.gov/briefing-room/statements-releases/2021/04/22/fact-sheet-biden-administration-advances-electric-vehicle-charging-infrastructure/ (accessed on 23 May 2022).
- Halvorson, B. Infrastructure Bill: $7.5B toward Nationwide Network of 500,000 EV Chargers. Available online: https://www.greencarreports.com/news/1134092_infrastructure-bill-7-5b-toward-nationwide-network-of-500-000-ev-chargers (accessed on 15 November 2021).
- Geotab. Electric Vehicle Trends in 2020: Top 6 Factors Impacting Fleet Electrification; Geotab: Oakville, ON, Canada, 2020. [Google Scholar]
- Chehab, N. Pump up the Charge with Extreme Fast Charging. Available online: https://www.energy.gov/eere/articles/pump-charge-extreme-fast-charging (accessed on 17 October 2021).
- NMFTA. Medium and Heavy Duty Electric Vehicle and Charging Infrastructure Cyber Security Baseline Reference Document; NMFTA: Alexandria, VA, USA, 2018. [Google Scholar]
- CharIN Starts Development of Fast Charging Beyond 1 MW. Available online: https://insideevs.com/news/343058/charin-starts-development-of-fast-charging-beyond-1-mw/ (accessed on 4 October 2021).
- CHARIN Megawatt Charging System (MCS). Available online: https://www.charin.global/technology/mcs/ (accessed on 17 October 2021).
- Hoover, Z.; Nägele, F.; Polymeneas, E.; Sahdev, S. How Charging in Buildings Can Power up the Electric-Vehicle Industry; McKinsey: Chicago, IL, USA, 2021. [Google Scholar]
- Pless, S.; Allen, A.; Myers, L.; Goldwasser, D.; Meintz, A.; Polly, B.; Frank, S. Integrating Electric Vehicle Charging Infrastructure into Commercial Buildings and Mixed-Use Communities: Design, Modeling, and Control Optimization Opportunities; National Renewable Energy Laboratory: Golden, CO, USA, 2020.
- Hodge, C.; Hauck, K.; Gupta, S.; Bennett, J.; Hodge, C.; Hauck, K.; Gupta, S.; Bennett, J. Vehicle Cybersecurity Threats and Mitigation Approaches; National Renewable Energy Laboratory: Golden, CO, USA, 2019; pp. 1–41.
- Burkacky, O.; Deichmann, J.; Klein, B.; Pototzky, K.; Scherf, G. Cybersecurity in Automotive-Mastering the Challenge; McKinsey: Chicago, IL, USA, 2020. [Google Scholar]
- Kim, K.; Kim, J.S.; Jeong, S.; Park, J.H.; Kim, H.K. Cybersecurity for Autonomous Vehicles: Review of Attacks and Defense. Comput. Secur. 2021, 103, 102150. [Google Scholar] [CrossRef]
- About—AVCC—The Autonomous Vehicle Computing Consortium, Inc. Available online: https://www.avcconsortium.org/about/ (accessed on 14 October 2021).
- Beer, I. An IOS Zero-Click Radio Proximity Exploit Odyssey. Available online: https://googleprojectzero.blogspot.com/2020/12/an-ios-zero-click-radio-proximity.html (accessed on 23 May 2022).
- Warminsky, J. An IOS Exploit That Enables IPhone Takeover Is Cybersecurity Researcher’s “Work of Art”; CyberScoop: Washington, DC, USA, 2020. [Google Scholar]
- Upstream Security. Global Automotive Cybersecurity Report 2021; Upstream Security: Herzliya, Israel, 2021. [Google Scholar]
- Francillon, A.; Danev, B.; Capkun, S. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 24–28 April 2022. [Google Scholar]
- Indesteege, S.; Keller, N.; Dunkelman, O.; Biham, E.; Preneel, B. A Practical Attack on KeeLoq. In Advances in Cryptology—EUROCRYPT 2008, Proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, 13–17 April 2008; LNCS; Springer: Berlin/Heidelberg, Germany, 2008; Volume 4965, pp. 1–18. [Google Scholar] [CrossRef] [Green Version]
- Eisenbarth, T.; Kasper, T.; Moradi, A.; Paar, C.; Salmasizadeh, M.; Shalmani, M.T.M. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In Advances in Cryptology—CRYPTO 2008, Proceedings of the 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, 17–21 August 2008; LNCS; Springer: Berlin/Heidelberg, Germany, 2008; Volume 5157, pp. 203–220. [Google Scholar] [CrossRef]
- Koscher, K.; Czeskis, A.; Roesner, F.; Patel, S.; Kohno, T.; Checkoway, S.; McCoy, D.; Kantor, B.; Anderson, D.; Snachám, H.; et al. Experimental Security Analysis of a Modern Automobile. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 16–19 May 2010; pp. 447–462. [Google Scholar] [CrossRef] [Green Version]
- Kawanishi, Y.; Nishihara, H.; Souma, D.; Yoshida, H. Detailed Analysis of Security Evaluation of Automotive Systems Based on JASO TP15002. In Computer Safety, Reliability, and Security, Proceedings of the SAFECOMP 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, 12 September 2017; LNCS; Springer: Berlin/Heidelberg, Germany, 2017; Volume 10489, pp. 211–224. [Google Scholar] [CrossRef]
- Jo, H.J.; Choi, W.; Na, S.Y.; Woo, S.; Lee, D.H. Vulnerabilities of Android OS-Based Telematics System. Wirel. Pers. Commun. 2017, 92, 1511–1530. [Google Scholar] [CrossRef]
- Brooks, R.R.; Sander, S.; Deng, J.; Taiber, J. Automobile Security Concerns: Challenges and State of the Art of Automotive System Security. IEEE Veh. Technol. Mag. 2009, 4, 53–64. [Google Scholar] [CrossRef]
- Crane, C. 15 Auto Dealership Cybersecurity Statistics That Will Drive You to Action. Available online: https://cybersecurityventures.com/15-auto-dealership-cybersecurity-statistics-that-will-drive-you-to-action/ (accessed on 14 October 2021).
- Pagliery, J. Cars Can Be Hacked by Their Tiny, Plug-in Insurance Discount Trackers. Available online: https://money.cnn.com/2015/08/11/technology/car-hacking-tracker/index.html (accessed on 14 October 2021).
- Basmadjian, R. Communication Vulnerabilities in Electric Mobility HCP Systems: A Semi-Quantitative Analysis. Smart Cities 2 2021, 4, 405–428. [Google Scholar] [CrossRef]
- Mustafa, M.A.; Zhang, N.; Kalogridis, G.; Fan, Z. Smart Electric Vehicle Charging: Security Analysis. In Proceedings of the 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 24–27 February 2013. [Google Scholar] [CrossRef] [Green Version]
- NMFTA. Extreme Fast Charging (XFC) Cybersecurity Threats, Use Cases and Requirements For Medium and Heavy Duty Electric Vehicles; NMFTA: Alexandria, VA, USA, 2019. [Google Scholar]
- Harnett, K.; Watson, G.; Brown, G. Government Fleet and Public Sector Electric Vehicle Supply Equipment (EVSE) Cybersecurity Best Practices and Procurement Language Report; Volpe National Transportation Systems Center: Cambridge, MA, USA, 2019.
- Harnett, K.; Harris, B.; Chin, D.; Watson, G. DOE/DHS/DOT Volpe Technical Meeting on Electric Vehicle and Charging Station Cybersecurity Report; Volpe National Transportation Systems Center: Cambridge, MA, USA, 2018.
- D’Anna, G. Cybersecurity for Commercial Vehicles; SAE International: Warrendale, PA, USA, 2018; ISBN 978-0-7680-9258-5. [Google Scholar]
- Islam, M.; Chowdhury, M.; Li, H.; Hu, H. Cybersecurity Attacks in Vehicle-to-Infrastructure Applications and Their Prevention. Transp. Res. Rec. 2018, 2672, 66–78. [Google Scholar] [CrossRef]
- European Network for Cybersecurity. EV Charging Systems Security Requirements; European Network for Cyber Security: Den Haag, The Netherlands, 2016. [Google Scholar]
- Metere, R.; Neaimeh, M.; Morisset, C.; Maple, C.; Bellekens, X.; Czekster, R.M. Securing the Electric Vehicle Charging Infrastructure. arXiv 2021, arXiv:2105.02905. [Google Scholar]
- Johnson, J. Securing Vehicle Charging Infrastructure; Sandia National Laboratory: Albuquerque, NM, USA, 2020.
- Advice Letter (AL) Suspension Notice: Southern California Edison Company’s Workplan and Work Schedule for a Cybersecurity Gap Analysis of Electric Vehicle Charging Equipment Products Used in Transportation Electrification Programs. Available online: https://docs.cpuc.ca.gov/PublishedDocs/Published/G000/M388/K664/388664705.docx (accessed on 15 November 2021).
- Publications: CC Portal. Available online: https://www.commoncriteriaportal.org/cc/ (accessed on 22 November 2021).
- Barrett, M.P. Framework for Improving Critical Infrastructure Cybersecurity, version 1.1; NIST: Gaithersburg, MD, USA, 2018.
- The STRIDE Threat Model. Available online: https://docs.microsoft.com/en-us/previous-versions/commerce-server/ee823878(v=cs.20)?redirectedfrom=MSDN (accessed on 22 November 2021).
- Understanding IEC 62443. Available online: https://www.iec.ch/blog/understanding-iec-62443 (accessed on 4 November 2021).
- NIST SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations. Available online: https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final (accessed on 22 November 2021).
- ISO/IEC 15408-1:2009. Information Technology—Security Techniques—Evaluation Criteria for IT Security—Part 1: Introduction and General Model. Available online: https://www.iso.org/standard/50341.html (accessed on 22 November 2021).
- MITRE ATT&CK®. Available online: https://attack.mitre.org/ (accessed on 22 November 2021).
- Macher, G.; Armengaud, E.; Brenner, E.; Kreiner, C. Threat and Risk Assessment Methodologies in the Automotive Domain. Procedia Comput. Sci. 2016, 83, 1288–1294. [Google Scholar] [CrossRef] [Green Version]
- ISO 26262-1; Road Vehicles—Functional Safety—Part 1: Vocabulary. ISO: Geneva, Switzerland, 2018.
- Olsson, M.; Lautenbach, A.; Islam, M.; Sandberg, C.; Bokesand, A.; Olovsson, T.; Kleberger, P.; Söderberg-Rivkin, A.; Kadhirvelan, S.P.; Hansson, A.; et al. HEAVENS-HEAling Vulnerabilities to ENhance Software Security and Safety, version 2.0; The HEAVENS Consortium (Borås SE): Vinnova, Sweden, 2016. [Google Scholar]
- National Highway Traffic Safety Administration. Cybersecurity Best Practices for the Safety of Modern Vehicles; National Highway Traffic Safety Administration: Washington, DC, USA, 2020. [Google Scholar]
- Uptane—Securing Software Updates for Automobiles. Available online: https://uptane.github.io/ (accessed on 22 November 2021).
- ISO/SAE 21434; Road Vehicles—Cybersecurity Engineering. ISO: Geneva, Switzerland, 2021.
- Auto-ISAC Best Practices Guides. Available online: https://automotiveisac.com/best-practices/ (accessed on 22 November 2021).
- UN Regulation No. 155—Uniform Provisions Concerning the Approval of Vehicles with Regards to Cyber Security and Cyber Security Management System; Rev.3 Add. 154; UNECE: Geneva, Switzerland, 2021.
- AUTOSAR—The Standardized Software Framework for Intelligent Mobility. Available online: https://www.autosar.org/ (accessed on 22 November 2021).
- JASO TP-15002; Guideline for Automotive Information Security Analysis, 2016 Edition. Society of Automotive Engineers of Japan (JSAE): Yokohama, Japan, 2016.
- UL Smart Buildings Cybersecurity. Available online: https://www.ul.com/services/solutions/cybersecurity/smart-buildings-cybersecurity (accessed on 22 November 2021).
- IEEE 2030–2011. IEEE Guide for Smart Grid Interoperability of Energy Technology and Information Technology Operation with the Electric Power System (EPS), End-Use Applications, and Loads. Available online: https://standards.ieee.org/standard/2030-2011.html (accessed on 22 November 2021).
- FERC/NERC. Cyber and Grid Security. Available online: https://www.ferc.gov/industries-data/electric/industry-activities/cyber-and-grid-security (accessed on 22 November 2021).
- Ronanki, D.; Kelkar, A.; Williamson, S.S. Extreme Fast Charging Technology—Prospects to Enhance Sustainable Electric Transportation. Energies 2019, 12, 3721. [Google Scholar] [CrossRef] [Green Version]
- Howell, D.; Boyd, S.; Cunningham, B.; Gillard, S.; Slezak, L.; Ahmed, S.; Bloom, I.; Burnham, A.; Hardy, K.; Jansen, A.N.; et al. Enabling Fast Charging: A Technology Gap Assessment; Idaho National Laboratory: Idaho Falls, ID, USA, 2017.
- IEC 62196-1; Ed. 3.0. Plugs, Socket-Outlets, Vehicle Connectors and Vehicle Inlets—Conductive Charging of Electric Vehicles—Part 1: General Requirements. IEC: Geneva, Switzerland, 2014.
- IEC 62196-2; Ed. 2.0. Plugs, Socket-Outlets, Vehicle Connectors and Vehicle Inlets—Conductive Charging of Electric Vehicles—Part 2: Dimensional Compatibility and Interchangeability Requirements for a.c. Pin and Contact-Tube Accessories. IEC: Geneva, Switzerland, 2016.
- IEC 62196-3; Ed 1.0. Plugs, Socket-Outlets, Vehicle Connectors and Vehicle Inlets—Conductive Charging of Electric Vehicles—Part 3: Dimensional Compatibility and Interchangeability Requirements for d.c. and a.c./d.c. Pin and Contact-Tube Vehicle Couplers. IEC: Geneva, Switzerland, 2014.
- SAE J1772; SAE Electric Vehicle and Plug in Hybrid Electric Vehicle Conductive Charge Coupler. SAE International: Warrendale, PA, USA, 2017.
- IEC 61851-1; Ed. 3.0. Electric Vehicle Conductive Charging System—Part 1: General Requirements. IEC: Geneva, Switzerland, 2017.
- SAE J3068; Electric Vehicle Power Transfer System Using a Three-Phase Capable Coupler. SAE International: Warrendale, PA, USA, 2018.
- JEVS G105; Japan Electric Vehicle Standard (JEVS) Connector for Eco Station Rapid EV Charging System. Japan Automobile Research Institute (JARI): Tsukuba, Japan, 1993.
- CHAdeMO 1.0.1; Technical Specifications of Quick Charger for the Electric Vehicle. CHAdeMO Association: Tokyo, Japan, 2013.
- Technology Overview—CHAdeMO Association. Available online: https://www.chademo.com/technology/technology-overview/ (accessed on 4 November 2021).
- IEEE 2030.1.1; Standard Technical Specifications of a DC Quick Charger for Use with Electric Vehicles. IEEE: New York, NY, USA, 2016.
- ISO 11898-1; Road Vehicles—Controller Area Network (CAN)—Part 1: Data Link Layer and Physical Signalling Technical Corrigendum. ISO: Geneva, Switzerland, 2015.
- ISO 15118-1:2019; Road Vehicles—Vehicle to Grid Communication Interface—Part 1: General Information and Use-Case Definition. ISO: Geneva, Switzerland, 2019.
- HomePlug Green PHY; The Standard For In-Home Smart Grid Powerline Communications. HomePlug Powerline Alliance: Portland, OR, USA, 2010.
- SAE J2411_200002; Ground Vehicle Standard—Single Wire CAN Network for Vehicle Applications. SAE International: Warrendale, PA, USA, 2000.
- The National Standard of The People’s Republic of China Connection Set of Conductive Charging for Electric Vehicles—Part I: General Requirements. European Electrical and Electronics Industry: Beijing, China, 2011.
- SAE J1939; Standards Collection—Hybrid and Electric Vehicle Communications. SAE International: Warrendale, PA, USA, 2021.
- Wyglinski, A.M.; Huang, X.; Padir, T.; Lai, L.; Eisenbarth, T.R.; Venkatasubramanian, K. Security of Autonomous Systems Employing Embedded Computing and Sensors. IEEE Micro 2013, 33, 80–86. [Google Scholar] [CrossRef]
- Argyropoulos, N.; Khodashenas, P.S.; Mavropoulos, O.; Karapistoli, E.; Lytos, A.; Karypidis, P.A.; Hofmann, K.P. Addressing Cybersecurity in the Next Generation Mobility Ecosystem with CARAMEL. Transp. Res. Procedia 2021, 52, 307–314. [Google Scholar] [CrossRef]
- Vassallo, E.W.; Manaugh, K. Spatially Clustered Autonomous Vehicle Malware: Producing New Urban Geographies of Inequity. Transp. Res. Rec. 2018, 2672, 66–75. [Google Scholar] [CrossRef] [Green Version]
- Amoozadeh, M.; Raghuramu, A.; Chuah, C.N.; Ghosal, D.; Michael Zhang, H.; Rowe, J.; Levitt, K. Security Vulnerabilities of Connected Vehicle Streams and Their Impact on Cooperative Driving. IEEE Commun. Mag. 2015, 53, 126–132. [Google Scholar] [CrossRef] [Green Version]
- ISO/FDIS 15118-20; Road Vehicles—Vehicle to Grid Communication Interface—Part 20: 2nd Generation Network Layer and Application Layer Requirements Ed1 (under Development). ISO: Geneva, Switzerland, 2020.
- Open Charge Point Protocol (OCPP) 2.0.1. Available online: https://www.openchargealliance.org/protocols/ocpp-201/ (accessed on 4 November 2021).
- Open Charge Alliance. Open Smart Charging Protocol (OSCP) 2.0. Available online: https://www.openchargealliance.org/protocols/oscp-20/ (accessed on 23 May 2022).
- IEEE 2030.5; IEEE Standard for Smart Energy Profile Application Protocol. IEEE: New York, NY, USA, 2018.
- OpenADR 2.0; Profile Specification B Profile. Openadr Alliance: Morgan Hill, CA, USA, 2015.
- MQTT Version 5.0; OASIS Standard—Message Queuing Telemetry Transport. OASIS: Burlington, MA, USA, 2019.
- ASHRAE 135-2020 (ANSI Approved) Standard—BACnet—A Data Communication Protocol for Bulding Automation and Control Networks. Available online: https://www.techstreet.com/ashrae/standards/ashrae-135-2020?product_id=2191852 (accessed on 4 November 2021).
- Varriale, R.; Crawford, R.; Jaynes, M. Risks of Electric Vehicle Supply Equipment Integration Within Building Energy Management System Environments: A Look at Remote Attack Surface and Implications. In Proceedings of the National Cyber Summit (NCS) Research Track 2021, Huntsville, AL, USA, 28–30 September 2021; pp. 163–173. [Google Scholar] [CrossRef]
- Myers, E.H. A Comprehensive Guide to Electric Vehicle Managed Charging; Smart Electric Power Alliance: Washington, DC, USA, 2019. [Google Scholar]
- Alcaraz, C.; Lopez, J.; Wolthusen, S. OCPP Protocol: Security Threats and Challenges. IEEE Trans. Smart Grid 2017, 8, 2452–2459. [Google Scholar] [CrossRef]
- Anderson, B.R.; Johnson, J.T. Securing Vehicle Charging Infrastructure Against Cybersecurity Threats. In Proceedings of the SAE Hybrid and Electric Vehicle Technologies Symposium, Pasadena, CA, USA, 28–30 January 2020. [Google Scholar]
- Anderson, B.; Johnson, J. Securing Vehicle Charging Infrastructure. In Proceedings of the 2021 DOE Vehicle Technologies Office Annual Merit Review, Washington, DC, USA, 21–25 June 2021. [Google Scholar]
- Reeh, D.; Cruz Tapia, F.; Chung, Y.W.; Khaki, B.; Chu, C.; Gadh, R. Vulnerability Analysis and Risk Assessment of EV Charging System under Cyber-Physical Threats. In Proceedings of the 2019 IEEE Transportation Electrification Conference and Expo (ITEC), Detroit, MI, USA, 19–21 June 2019. [Google Scholar] [CrossRef]
- Acharya, S.; Dvorkin, Y.; Pandzic, H.; Karri, R. Cybersecurity of Smart Electric Vehicle Charging: A Power Grid Perspective. IEEE Access 2020, 8, 214434–214453. [Google Scholar] [CrossRef]
- Fries, S.; Falk, R. Securely Connecting Electric Vehicles to the Smart Grid. Int. J. Adv. Internet Technol. 2013, 6, 57–67. [Google Scholar]
- Shezaf, O. Who Can Hack a Plug? The Infosec Risks of Charging Electric Cars. In Proceedings of the Hack in the Box, Amsterdam, The Netherlands, 10–11 April 2013. [Google Scholar]
- Van Keulen, J. Smart Charging: A Privacy and Security Analysis, Radboud Universiteit. Bachelor’s Thesis, Radboud Universiteit, Nijmegen, The Netherlands, 2014. [Google Scholar]
- ElaadNL. EV Charging Systems Security Threats; European Network for Cyber Security: Den Haag, The Netherlands, 2016. [Google Scholar]
- Basnet, M.; Ali, M.H. Exploring Cybersecurity Issues in 5G Enabled Electric Vehicle Charging Station with Deep Learning. IET Gener. Transm. Distrib. 2021, 15, 3435–3449. [Google Scholar] [CrossRef]
- DIN SPEC 70121; Electromobility—Digital Communication between a d.c. EV Charging Station and an Electric Vehicle for Control of d.c. Charging in the Combined Charging System. German Institute for Standardisation: Berlin, Germany, 2014.
- Baker, R.; Martinovic, I. Losing the Car Keys: Wireless PHY-Layer Insecurity in EV Charging. In Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, CA, USA, 14–16 August 2019; pp. 407–424. [Google Scholar]
- Köhler, S.; Baker, R.; Strohmeier, M.; Martinovic, I. Brokenwire: Wireless Disruption of CCS Electric Vehicle Charging. arXiv 2022, arXiv:2202.02104. [Google Scholar]
- Rohde, K. Electric Vehicle Cyber Research. In Proceedings of the DOE FEMP Energy Exchange, Tampa, FL, USA, 16 August 2017. [Google Scholar]
- Rohde, K. A Distributed Auto Charger Attack On The Grid. In Proceedings of the S4, Miami, FL, USA, 9 April 2019. [Google Scholar]
- Dudek, S.; Delaunay, J.-C.; Fargues, V. V2G Injector: Whispering to Cars and Charging Units through the Power-Line. In Proceedings of the SSTIC (Symposium sur la sécurité des technologies de l’information et des communications), Rennes, France, 5–7 June 2019. [Google Scholar]
- Dudek, S. Examining Log4j Vulnerabilities in Connected Cars and Charging Stations. Available online: https://www.trendmicro.com/en_us/research/21/l/examining-log4j-vulnerabilities-in-connected-cars.html (accessed on 20 January 2022).
- Lee, S.; Park, Y.; Lim, H.; Shon, T. Study on Analysis of Security Vulnerabilities and Countermeasures in Iso/Iec 15118 Based Electric Vehicle Charging Technology. In Proceedings of the 2014 International Conference on IT Convergence and Security (ICITCS), Beijing, China, 28–30 October 2014. [Google Scholar] [CrossRef]
- Bao, K.; Valev, H.; Wagner, M.; Schmeck, H. A Threat Analysis of the Vehicle-to-Grid Charging Protocol ISO 15118. Comput. Sci.-Res. Dev. 2018, 33, 3–12. [Google Scholar] [CrossRef]
- Falk, R.; Fries, S. Electric Vehicle Charging Infrastructure—Security Considerations and Approaches. In Proceedings of the The Fourth International Conference on Evolving Internet—INTERNET, Venice, Italy, 24–29 June 2012; Volume 2131. [Google Scholar]
- Klapwijk, P.; Driessen-Mutters, L. Exploring the Public Key Infrastructure for ISO 15118 in the EV Charging Ecosystem; ElaadNL: Arnhem, The Netherlands, 2018. [Google Scholar]
- Höfer, C.; Petit, J.; Schmidt, R.; Kargl, F. POPCORN: Privacy-Preserving Charging for Emobility. In Proceedings of the 2013 ACM Workshop on Security, Privacy & Dependability for Cyber Vehicles, Berlin, Germany, 4 November 2013; pp. 37–48. [Google Scholar] [CrossRef]
- Dalheimer, M. Ladeinfrastruktur Für Elektroautos: Ausbau Statt Sicherheit (Charging Infrastructure for Electric Cars: Expansion Instead of Security). In Proceedings of the 34th Chaos Communication Congress, Leipzig, Germany, 27–30 December 2017. [Google Scholar]
- Friedland, A. Security and Privacy in the Current E-Mobility Charging Infrastructure. In Proceedings of the DeepSec, Vienna, Austria, 31 July 2016. [Google Scholar]
- Wright, A.C.; Street, J.E. Charging in the Crosshairs: How EV Drivers Could Become Cyber Criminals’ New Target. 2019. Available online: https://www.digitalcitizensalliance.org/clientuploads/pdf/Charging_in_the_Crosshairs.pdf (accessed on 23 May 2022).
- Cyber Security Research and Development: Cyber Assessment Report of Level 2 AC Powered Electric Vehicle Supply Equipment; INL Technical Report INL/MIS-18-45521; INL: Hong Kong, China, 2018.
- Smart Car Chargers. Plug-n-Play for Hackers?|Pen Test Partners. Available online: https://www.pentestpartners.com/security-blog/smart-car-chargers-plug-n-play-for-hackers/ (accessed on 4 August 2021).
- CISOMAG Schneider Electric Patches 13 Vulnerabilities Affecting Its EVlink Charging Stations. Available online: https://cisomag.eccouncil.org/schneider-electric-vulnerabilities-fixed/ (accessed on 27 July 2021).
- Schneider Electric Security Notification: EVlink City/Parking/Smart Wallbox Charging Stations. 2021. Available online: https://www.se.com/au/en/download/document/SEVD-2021-194-06/ (accessed on 23 May 2022).
- Bannister, A. Schneider Electric Fixes Critical Vulnerabilities in EVlink Electric Vehicle Charging Stations. Available online: https://portswigger.net/daily-swig/schneider-electric-fixes-critical-vulnerabilities-in-evlink-electric-vehicle-charging-stations (accessed on 27 July 2021).
- Nasr, T.; Torabi, S.; Bou-Harb, E.; Fachkha, C.; Assi, C. Power Jacking Your Station: In-Depth Security Analysis of Electric Vehicle Charging Station Management Systems. Comput. Secur. 2022, 112, 102511. [Google Scholar] [CrossRef]
- Sklyar, D. ChargePoint Home Security Research. 2018. Available online: https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/12/13084354/ChargePoint-Home-security-research_final.pdf (accessed on 23 May 2022).
- Remotely Controlled EV Home Chargers—The Threats and Vulnerabilities. Available online: https://securelist.com/remotely-controlled-ev-home-chargers-the-threats-and-vulnerabilities/89251/ (accessed on 29 September 2021).
- CIRCONTROL CirCarLife 2018 Vulnerabilities Are Not Fixed Yet. Available online: https://www.aegislab.com/news/2019/11/18/circarlife-vulnerability/ (accessed on 29 September 2021).
- CirCarLife SCADA 4.3.0. Credential Disclosure—Hardware Webapps Exploit. Available online: https://www.exploit-db.com/exploits/45384 (accessed on 29 September 2021).
- Christinan, H.; Manuel, A. EV Charging: Mapping out the Cyber Security Threats and Solutions for Grids and Charging Infrastructure. In Proceedings of the 4th Annual UtiliNet Europe Event, Brussels, Belgium, 15–17 May 2018. [Google Scholar]
- Open Charge Point Interface. Available online: https://evroaming.org/ (accessed on 29 September 2021).
- Expert from Fraunhofer ITWM Uncovers Security Vulnerabilities of Charging Stations. Available online: https://www.fraunhofer.de/en/press/research-news/2018/January/security-vulnerabilities-of-charching-stations.html (accessed on 29 September 2021).
- Rubio, J.E.; Alcaraz, C.; Lopez, J. Addressing Security in OCPP: Protection Against Man-in-The-Middle Attacks. In Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 26–28 February 2018. [Google Scholar] [CrossRef]
- Practical Considerations for Implementation and Scaling ISO 15118 into a Secure EV Charging Ecosystem. 2019. Available online: https://www.chargepoint.com/files/15118whitepaper.pdf (accessed on 23 May 2022).
- Jewers, C. Russian Motorway’s Electric Vehicle Chargers Are Hacked to Display Message Supporting Ukraine|Daily Mail Online. Available online: https://www.dailymail.co.uk/news/article-10565697/Russian-electric-vehicle-chargers-hacked-display-message-supporting-Ukraine.html (accessed on 14 April 2022).
- Gordon, A. Russian Electric Vehicle Chargers Hacked, Tell Users ‘PUTIN IS A DICKHEAD’. Available online: https://www.vice.com/en/article/akvya5/russian-electric-vehicle-chargers-hacked-tell-users-putin-is-a-dickhead (accessed on 14 April 2022).
- Security Flaws Found in Popular EV Chargers—TechCrunch. Available online: https://techcrunch.com/2021/08/03/security-flaws-found-in-popular-ev-chargers/amp/ (accessed on 4 August 2021).
- Pen Test Partners Pwning a Smart Car Charger, Building a Botnet. Available online: https://www.pentestpartners.com/security-blog/pwning-a-smart-car-charger-building-a-botnet/ (accessed on 1 April 2022).
- Rohde, K. Cyber Security of DC Fast Charging: Potential Impacts to the Electric Grid. In Proceedings of the S4x19, Miami, FL, USA, 14–17 January 2019. [Google Scholar]
- Dey, S.; Khanra, M. Cybersecurity of Plug-In Electric Vehicles: Cyberattack Detection during Charging. IEEE Trans. Ind. Electron. 2021, 68, 478–487. [Google Scholar] [CrossRef]
- Portela, C.M.; Geldtmeijer, D.; Slootweg, H.; Van Eekelen, M. A Flexible and Privacy Friendly ICT Architecture for Smart Charging of EVS. In Proceedings of the 22nd International Conference and Exhibition on Electricity Distribution (CIRED 2013), Stockholm, Sweden, 10–13 June 2013. [Google Scholar] [CrossRef] [Green Version]
- Sagstetter, F.; Lukasiewycz, M.; Steinhors, S.; Wolf, M.; Bouard, A.; Harris, W.R.; Jha, S.; Peyrin, T.; Poschmann, A.; Chakraborty, S. Security Challenges in Automotive Hardware/Software Architecture Design. In Proceedings of the 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France, 18–22 March 2013; pp. 458–463. [Google Scholar] [CrossRef]
- Tesla Patents New Liquid-Cooled Charging Connector—Electrek. Available online: https://electrek.co/2019/09/30/tesla-patents-liquid-cooled-charging-connector/ (accessed on 28 October 2021).
- Yoshida, M.D. CHAdeMO for the Future; CHAdeMO Association: Tokyo, Japan, 2018. [Google Scholar]
- Brecher, A.; Arthur, D. Review and Evaluation of Wireless Power Transfer (WPT) for Electric Transit Applications; John A. Volpe National Transportation Systems Center (U.S.): Cambridge, MA, USA, 2014.
- Carlson, R. Consequence-Driven Cybersecurity for High-Power EV Charging Infrastructure DOE Vehicle Technologies Program Annual Merit Review. In Proceedings of the DOE Vehicle Technologies Program Annual Merit Review, Washington, DC, USA, 24 June 2021. [Google Scholar]
- Jiang, Z.; Shalalfeh, L.; Beshir, M.J. Impact of Electric Vehicle Infrastructure on the City of Chatsworth Distribution System. In Proceedings of the 2014 IEEE International Electric Vehicle Conference (IEVC), Florence, Italy, 17–19 December 2014. [Google Scholar] [CrossRef]
- Jiang, Z.; Shalalfel, L.; Beshir, M.J. Impact of Electric Vehicles on the IEEE 34 Node Distribution Infrastructure. Int. J. Smart Grid Clean Energy 2014, 3, 417–424. [Google Scholar] [CrossRef] [Green Version]
- Scoffield, D.; Smart, J.; Pennington, T.; Jones, C.; Lave, M.; Medam, A.; Mitra, B. Strategies to Maintain Voltage on Long, Lightly Loaded Feeders with Widespread Residential Level 2 Plug-in Electric Vehicle Charging. In Proceedings of the IEEE Transportation Electrification Conference & Expo 2021, Chicago, IL, USA, 23–25 June 2021. [Google Scholar]
- Jones, C.B.; Lave, M.; Vining, W.; Garcia, B.M. Uncontrolled Electric Vehicle Charging Impacts on Distribution Electric Power Systems with Primarily Residential, Commercial or Industrial Loads. Energies 2021, 14, 1688. [Google Scholar] [CrossRef]
- Mousavian, S.; Erol-Kantarci, M.; Wu, L.; Ortmeyer, T. A Risk-Based Optimization Model for Electric Vehicle Infrastructure Response to Cyber Attacks. IEEE Trans. Smart Grid 2018, 9, 6160–6169. [Google Scholar] [CrossRef]
- Ahmed, S.; Dow, F.M. Electric Vehicle Technology as an Exploit for Cyber Attacks on the next Generation of Electric Power Systems. In Proceedings of the 2016 4th International Conference on Control Engineering & Information Technology (CEIT), Hammamet, Tunisia, 16–18 December 2016. [Google Scholar] [CrossRef]
- Dvorkin, Y.; Garg, S. IoT-Enabled Distributed Cyber-Attacks on Transmission and Distribution Grids. In Proceedings of the 2017 North American Power Symposium (NAPS), Morgantown, WV, USA, 17–19 September 2017. [Google Scholar] [CrossRef] [Green Version]
- Pratt, R.M.; Carroll, T.E. Vehicle Charging Infrastructure Security. In Proceedings of the 2019 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 11–13 January 2019. [Google Scholar] [CrossRef]
- Soltan, S.; Mittal, P.; Poor, H.V. BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid. In Proceedings of the 27th USENIX Security Symposium (USENIX Security 18), Baltimore, MD, USA, 15–17 August 2018; pp. 15–32. [Google Scholar]
- Khan, O.G.M.; El-Saadany, E.; Youssef, A.; Shaaban, M. Impact of Electric Vehicles Botnets on the Power Grid. In Proceedings of the 2019 IEEE Electrical Power and Energy Conference (EPEC), Montreal, QC, Canada, 16–18 October 2019. [Google Scholar] [CrossRef]
- Deb, S.; Tammi, K.; Kalita, K.; Mahanta, P. Impact of Electric Vehicle Charging Station Load on Distribution Network. Energies 2018, 11, 178. [Google Scholar] [CrossRef] [Green Version]
- ANSI C84.1-2016; American National Standard for Electric Power Systems and Equipment—Voltage Ratings (60 Hertz). ANSI: Rosslyn, VA, USA, 2016.
- Johnson, J.; Anderson, B.; Wright, B.; Graves, R.; Daley, J.; Quiroz, J.; Pratt, R.; Carroll, T.; O’Neil, L.R.; Dindlebeck, B.; et al. Securing Electric Vehicle Charging Infrastructure—Final Report; Sandia National Laboratory: Albuquerque, NM, USA, 2021.
- Morrison, G. Threats and Mitigation of DDoS Cyberattacks Against the U.S. Power Grid via EV Charging. Ph.D. Thesis, Wright State University, Dayton, OH, USA, 2018. [Google Scholar]
- Amini, S.; Pasqualetti, F.; Mohsenian-Rad, H. Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes. IEEE Trans. Smart Grid 2018, 9, 2862–2872. [Google Scholar] [CrossRef]
- Acharya, S.; Dvorkin, Y.; Karri, R. Public Plug-in Electric Vehicles + Grid Data: Is a New Cyberattack Vector Viable? IEEE Trans. Smart Grid 2020, 11, 5099–5113. [Google Scholar] [CrossRef]
- Sajid, A.; Abbas, H.; Saleem, K. Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges. IEEE Access 2016, 4, 1375–1384. [Google Scholar] [CrossRef]
- Zhou, M.; Zhang, R.; Xie, W.; Qian, W.; Zhou, A. Security and Privacy in Cloud Computing: A Survey. In Proceedings of the 2010 Sixth International Conference on Semantics, Knowledge and Grids, Beijing, China, 1–3 November 2010; pp. 105–112. [Google Scholar] [CrossRef]
- Lombardi, F.; Di Pietro, R. Secure Virtualization for Cloud Computing. J. Netw. Comput. Appl. 2011, 34, 1113–1122. [Google Scholar] [CrossRef]
- Bhamare, D.; Zolanvari, M.; Erbad, A.; Jain, R.; Khan, K.; Meskin, N. Cybersecurity for Industrial Control Systems: A Survey. Comput. Secur. 2020, 89, 101677. [Google Scholar] [CrossRef] [Green Version]
- Maglaras, L.A.; Jiang, J. Intrusion Detection in SCADA Systems Using Machine Learning Techniques. In Proceedings of the 2014 Science and Information Conference, London, UK, 27–29 August 2014; pp. 626–631. [Google Scholar] [CrossRef]
- Nicholson, A.; Webber, S.; Dyer, S.; Patel, T.; Janicke, H. SCADA Security in the Light of Cyber-Warfare. Comput. Secur. 2012, 31, 418–436. [Google Scholar] [CrossRef]
- Chandia, R.; Gonzalez, J.; Kilpatrick, T.; Papa, M.; Shenoi, S. Security Strategies for SCADA Networks. IFIP Int. Fed. Inf. Process. 2007, 253, 117–131. [Google Scholar] [CrossRef] [Green Version]
- Wang, W.; Lu, Z. Cyber Security in the Smart Grid: Survey and Challenges. Comput. Netw. 2013, 57, 1344–1371. [Google Scholar] [CrossRef]
- Chen, B.; Yim, S., II; Kim, H.; Kondabathini, A.; Nuqui, R. Cybersecurity of Wide Area Monitoring, Protection, and Control Systems for HVDC Applications. IEEE Trans. Power Syst. 2021, 36, 592–602. [Google Scholar] [CrossRef]
- Duan, N.; Yee, N.; Salazar, B.; Joo, J.Y.; Stewart, E.; Cortez, E. Cybersecurity Analysis of Distribution Grid Operation with Distributed Energy Resources via Co-Simulation. In Proceedings of the 2020 IEEE Power & Energy Society General Meeting (PESGM), Montreal, QC, Canada, 2–6 August 2020. [Google Scholar] [CrossRef]
- Smith, C. The Car Hacker’s Handbook: A Guide for the Penetration Tester; No Starch Press: San Francisco, CA, USA, 2016. [Google Scholar] [CrossRef]
- Sharma, S.; Kaul, A. A Survey on Intrusion Detection Systems and Honeypot Based Proactive Security Mechanisms in VANETs and VANET Cloud. Veh. Commun. 2018, 12, 138–164. [Google Scholar] [CrossRef]
- ElaadNL. Security Architecture for Electric Vehicle Charging Infrastructure, version 1.0; European Network for Cyber Security: Den Haag, The Netherlands, 2019.
- ElaadNL. Security Requirements for Procuring EV Charging Stations, version 2.0; European Network for Cyber Security: Den Haag, The Netherlands, 2019.
- ElaadNL. Security Test Plan for EV Charging Stations, version 1.0; European Network for Cyber Security: Den Haag, The Netherlands, 2019.
- van Eekelen, M.; Poll, E.; Hubbers, E.; Vieira, B.; van den Broek, F. An End-to-End Security Design for Smart EV-Charging for Enexis and ElaadNL; ElaadNL: Arnhem, The Netherlands, 2014. [Google Scholar]
- Chan, A.C.F.; Zhou, J. Cyber-Physical Device Authentication for the Smart Grid Electric Vehicle Ecosystem. IEEE J. Sel. Areas Commun. 2014, 32, 1509–1517. [Google Scholar] [CrossRef]
- Vaidya, B.; Mouftah, H.T. Multimodal and Multi-Pass Authentication Mechanisms for Electric Vehicle Charging Networks. In Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June 2020; pp. 371–376. [Google Scholar] [CrossRef]
- Zhang, X.; Van Doorn, L.; Jaeger, T.; Perez, R.; Sailer, R. Secure Coprocessor-Based Intrusion Detection. In Proceedings of the 10th Workshop on ACM SIGOPS European Workshop, Saint-Emilion, France, 1 July 2002; pp. 239–242. [Google Scholar] [CrossRef] [Green Version]
- Rohde, K. Grid Modernization Laboratory Consortium: Diagnostic Security Modules for Electric Vehicle-to-Building Integration (163). In Proceedings of the DOE Peer Review, Arlington, VA, USA, 21 June 2018. [Google Scholar]
- VDE-AR-E 2802-100-1; Handling of Certificates for Electric Vehicles, Charging Infrastructure and Backend Systems within the Framework of ISO 15118. VDE: Frankfurt am Main, Germany, 2019.
- Hubject Plug&Charge Certificate Policy for the Hubject ISO 15118 V2G PKI; Hubject GmbH: Berlin, Germany, 2019.
- Brooke, L. SAE Kicks off Project to Develop Cyber-Secure EV Charging. Available online: https://www.sae.org/news/2020/09/sae-pki-secure-ev-charging-project (accessed on 6 October 2021).
- SAE International to Launch Industry-Driven SAE EV Charging Public Key Infrastructure Project. Available online: https://www.sae.org/news/press-room/2020/05/sae-international-to-launch-industry-driven-sae-ev-charging-public-key-infrastructure-project (accessed on 6 October 2021).
- SAE International Hires World-Class Contractor Team for EV Charging Public Key Infrastructure Cooperative Research Project. Available online: https://www.sae.org/news/press-room/2021/02/sae-international-hires-world-class-contractor-team-for-ev-charging-public-key-infrastructure-cooperative-research-project (accessed on 6 October 2021).
- Fuchs, A.; Krauss, C.; Lahr, N.; Petri, R. Security Module for the Electric Vehicle Charging System Proposal for a Protection Profile; Fraunhofer SIT: Darmstadt, Germany, 2019. [Google Scholar]
- Fuchs, A.; Kern, D.; Krauß, C.; Zhdanova, M. TrustEV: Trustworthy Electric Vehicle Charging and Billing. In Proceedings of the the 35th Annual ACM Symposium on Applied Computing, Brno, Czech, 30 March–3 April 2020. [Google Scholar]
- Mültin, M. The Case for ISO 15118 and OCPP 2.0: Preventative Solutions to Hacking Charging Infrastructure. Available online: https://www.switch-ev.com/news-and-events/iso15118-mitigates-hacking-charging-infrastructure (accessed on 29 October 2021).
- The Smart Grid Interoperability Panel-Smart Grid Cybersecurity Committee. NISTIR 7628 Revision 1: Guidelines for Smart Grid Cybersecurity, Volume 1-Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements; NIST: Gaithersburg, MD, USA, 2014.
- Van Aubel, P.; Poll, E.; Rijneveld, J. Non-Repudiation and End-to-End Security for Electric-Vehicle Charging. In Proceedings of the 2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), Bucharest, Romania, 29 September–2 October 2019. [Google Scholar] [CrossRef]
- Vaidya, B.; Mouftah, H.T. Deployment of Secure EV Charging System Using Open Charge Point Protocol. In Proceedings of the 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, Cyprus, 25–29 June 2018; pp. 922–927. [Google Scholar] [CrossRef]
- Zhou, Z.; Wang, B.; Dong, M.; Ota, K. Secure and Efficient Vehicle-to-Grid Energy Trading in Cyber Physical Systems: Integration of Blockchain and Edge Computing. IEEE Trans. Syst. Man, Cybern. Syst. 2020, 50, 43–57. [Google Scholar] [CrossRef]
- Morosan, A.G.; Pop, F. OCPP Security—Neural Network for Detecting Malicious Traffic. In Proceedings of the International Conference on Research in Adaptive and Convergent Systems, Krakow, Poland, 20–23 September 2017; pp. 190–195. [Google Scholar] [CrossRef]
- Gottumukkala, R.; Merchant, R.; Tauzin, A.; Leon, K.; Roche, A.; Darby, P. Cyber-Physical System Security of Vehicle Charging Stations. In Proceedings of the 2019 IEEE Green Technologies Conference(GreenTech), Lafayette, LA, USA, 3–6 April 2019. [Google Scholar] [CrossRef]
- Chhaya, S.; Ghatikar, R. Cybersecurity Platform and Certification Framework Development for EXtreme Fast Charging (XFC) Infrastructure Ecosystem DoE Vehicle Technologies Office Annual Merit Review Presentation, ELT206. In Proceedings of the DOE Vehicle Technologies Office Annual Merit Review, Washington, DC, USA, 24 June 2021. [Google Scholar]
- Yang, Z.; Yu, S.; Lou, W.; Liu, C. P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid. IEEE Trans. Smart Grid 2011, 2, 697–706. [Google Scholar] [CrossRef]
- Liu, H.; Ning, H.; Zhang, Y.; Xiong, Q.; Yang, L.T. Role-Dependent Privacy Preservation for Secure V2g Networks in the Smart Grid. IEEE Trans. Inf. Forensics Secur. 2014, 9, 208–220. [Google Scholar] [CrossRef]
- He, M.; Zhang, K.; Shen, X.S. PMQC: A Privacy-Preserving Multi-Quality Charging Scheme in V2G Network. In Proceedings of the 2014 IEEE Global Communications Conference, Austin, TX, USA, 8–12 December 2014; pp. 675–680. [Google Scholar] [CrossRef]
- Chen, L.; Zhou, J.; Chen, Y.; Cao, Z.; Dong, X.; Choo, K.K.R. PADP: Efficient Privacy-Preserving Data Aggregation and Dynamic Pricing for Vehicle-to-Grid Networks. IEEE Internet Things J. 2021, 8, 7863–7873. [Google Scholar] [CrossRef]
Interface | Research Areas |
EV-to-EVSE |
|
EV Operator |
|
EVSE Internet |
|
EVSE Maintenance |
|
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Johnson, J.; Berg, T.; Anderson, B.; Wright, B. Review of Electric Vehicle Charger Cybersecurity Vulnerabilities, Potential Impacts, and Defenses. Energies 2022, 15, 3931. https://doi.org/10.3390/en15113931
Johnson J, Berg T, Anderson B, Wright B. Review of Electric Vehicle Charger Cybersecurity Vulnerabilities, Potential Impacts, and Defenses. Energies. 2022; 15(11):3931. https://doi.org/10.3390/en15113931
Chicago/Turabian StyleJohnson, Jay, Timothy Berg, Benjamin Anderson, and Brian Wright. 2022. "Review of Electric Vehicle Charger Cybersecurity Vulnerabilities, Potential Impacts, and Defenses" Energies 15, no. 11: 3931. https://doi.org/10.3390/en15113931
APA StyleJohnson, J., Berg, T., Anderson, B., & Wright, B. (2022). Review of Electric Vehicle Charger Cybersecurity Vulnerabilities, Potential Impacts, and Defenses. Energies, 15(11), 3931. https://doi.org/10.3390/en15113931