A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods

被引:17
作者
Aljohani, Tawfiq [1 ]
Almutairi, Abdulaziz [2 ]
机构
[1] Taibah Univ, Coll Engn Yanbu, Dept Elect Engn, Yanbu 41911, Saudi Arabia
[2] Majmaah Univ, Coll Engn, Dept Elect Engn, AlMajmaah 11952, Saudi Arabia
来源
DEFENCE TECHNOLOGY | 2024年 / 42卷
关键词
Cybersecurity; Electric vehicles; Charging stations; Cybersecurity of energy systems; Cyberattacks; CYBER SECURITY CHALLENGES; CHARGE POINT PROTOCOL; ELECTRIC VEHICLE; CYBERSECURITY; AUTHENTICATION; BLOCKCHAIN; FRAMEWORK; SYSTEMS; VULNERABILITIES; MICROGRIDS;
D O I
10.1016/j.dt.2024.06.009
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the continuous development of transportation electrification, the cybersecurity of energy infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that establish two-way communications with several players in the grid. This taxonomy aims to provide a comprehensive overview of cyberattacks against EVs from four distinct perspectives. The first is the research domains of EVs application, which investigates the different fields of research related to the development and application of EVs and how they are susceptible to cyber threats. The second is the CIAbased attacks, which examines the threats to the confidentiality, integrity, and availability of EVs' sensitive information and critical systems. The third taxonomy discusses the countermeasures and defensive mechanisms to secure the EVs against cyberattacks, including preventive measures, detection algorithms, response strategy, and recovery techniques. The fourth taxonomy is the verification and validation methodologies, which explores the software tools and hardware testbeds used to test and evaluate the security of EVs against cyber threats. Finally, this taxonomy presents an understanding of the current state of cyberattacks against EVs and serves as a valuable resource for researchers and practitioners in the fields of cybersecurity and electric mobility. (c) 2024 China Ordnance Society. Publishing services by Elsevier B.V. on behalf of KeAi Communications Co. Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/).
引用
收藏
页码:31 / 58
页数:28
相关论文
共 201 条
[1]  
Abd El-Gleel M, 2021, 2021 INT C COMM CONT, V1, P1
[2]  
Abedi Sajjad., 2015, Plug, P129, DOI DOI 10.1007/978-981-287-299-9
[3]   Cybersecurity of Smart Electric Vehicle Charging: A Power Grid Perspective [J].
Acharya, Samrat ;
Dvorkin, Yury ;
Pandzic, Hrvoje ;
Karri, Ramesh .
IEEE ACCESS, 2020, 8 :214434-214453
[4]   Public Plug-in Electric Vehicles plus Grid Data: Is a New Cyberattack Vector Viable? [J].
Acharya, Samrat ;
Dvorkin, Yury ;
Karri, Ramesh .
IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (06) :5099-5113
[5]  
Aftab MA, 2020, 2020 IEEE INT C POW, P1
[6]   IEC 61850-Based Communication Layer Modeling for Electric Vehicles: Electric Vehicle Charging and Discharging Processes Based on the International Electrotechnical Commission 61850 Standard and Its Extensions [J].
Aftab, Mohd Asim ;
Hussain, S. M. Suhail ;
Ali, Ikbal ;
Ustun, Taha Selim .
IEEE INDUSTRIAL ELECTRONICS MAGAZINE, 2020, 14 (02) :4-14
[7]  
Aghapour R, 2022, Electric Vehicle Integration via Smart Charging: Technology, Standards, Implementation, and Applications, P85, DOI DOI 10.1007/978-3-031-05909-4
[8]  
Ahmed S, 2016, 2016 4TH INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING & INFORMATION TECHNOLOGY (CEIT)
[9]   OCPP Protocol: Security Threats and Challenges [J].
Alcaraz, Cristina ;
Lopez, Javier ;
Wolthusen, Stephen .
IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) :2452-2459
[10]   Modeling time-varying wide-scale distributed denial of service attacks on electric vehicle charging Stations [J].
Aljohani, Tawfiq ;
Almutairi, Abdulaziz .
AIN SHAMS ENGINEERING JOURNAL, 2024, 15 (07)