Emerging Cybersecurity and Privacy Threats to Electric Vehicles and Their Impact on Human and Environmental Sustainability

被引:23
作者
Muhammad, Zia [1 ]
Anwar, Zahid [1 ]
Saleem, Bilal [2 ]
Shahid, Jahanzeb [3 ]
机构
[1] North Dakota State Univ NDSU, Sheila & Robert Challey Inst Global Innovat & Grow, Dept Comp Sci, Fargo, ND 58108 USA
[2] Air Univ, Dept Cybersecur, Islamabad 44000, Pakistan
[3] Natl Univ Sci & Technol, Dept Informat Secur, Islamabad 44000, Pakistan
关键词
cybersecurity; sustainability; smart cities; EVs; automotive cybersecurity; demand response; optimization; cyber threats; EV security; vehicle safety; AUTONOMOUS VEHICLES; SYSTEM; ATTACKS; SAFETY;
D O I
10.3390/en16031113
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
With the global energy crisis, increasing demand, and a national-level emphasis on electric vehicles (EVs), numerous innovations are being witnessed throughout the EV industry. EVs are equipped with sensors that maintain a sustainable environment for the betterment of society and enhance human sustainability. However, at the same time, as is the case for any new digital technology, they are susceptible to threats to security and privacy. Recent incidents demonstrate that these sensors have been misused for car and energy theft, financial fraud, data compromise, and have caused severe health and safety problems, amongst other things. To the best of our knowledge, this paper provides a first systematic analysis of EV sustainability, digital technologies that enhance sustainability, their potential cybersecurity threats, and corresponding defense. Firstly, three robust taxonomies have been presented to identify the dangers that can affect long-term sustainability domains, including (1) life and well-being, (2) safe environment, and (3) innovation and development. Second, this research measures the impact of cybersecurity threats on EVs and correspondingly to their sustainability goals. Third, it details the extent to which specific security controls can mitigate these threats, thereby allowing for a smooth transition toward secure and sustainable future smart cities.
引用
收藏
页数:30
相关论文
共 160 条
  • [31] BROOKS G, 1992, SIGPLAN NOTICES, V27, P1, DOI [10.1145/143103.143108, 10.13334/j.0258-8013.pcsee.213043]
  • [32] Buennemeyer TK, 2007, 2007 IEEE INTERNATIONAL CONFERENCE ON PORTABLE INFORMATION DEVICES, P27
  • [33] Cano Juan Carlos, 2018, IEEE Internet of Things Magazine, V1, P12, DOI 10.1109/IOTM.2019.1900002
  • [34] Casino M, 2019, 2019 4TH INTERNATIONAL CONFERENCE ON SYSTEM RELIABILITY AND SAFETY (ICSRS 2019), P136, DOI [10.1109/icsrs48664.2019.8987605, 10.1109/ICSRS48664.2019.8987605]
  • [35] A Multi-Tier Security Analysis of Official Car Management Apps for Android
    Chatzoglou, Efstratios
    Kambourakis, Georgios
    Kouliaridis, Vasileios
    [J]. FUTURE INTERNET, 2021, 13 (03): : 1 - 35
  • [36] Process Automation in an IoT-Fog-Cloud Ecosystem: A Survey and Taxonomy
    Chegini, Hossein
    Naha, Ranesh Kumar
    Mahanti, Aniket
    Thulasiraman, Parimala
    [J]. IOT, 2021, 2 (01): : 92 - 118
  • [37] Chen Shanzhi, 2023, Cellular Vehicle -to -Everything (C-V2X)
  • [38] Automatic and Secure Wi-Fi Connection Mechanisms for IoT End-Devices and Gateways
    Cheng, Fu-Chiung
    [J]. EMERGING TECHNOLOGIES IN COMPUTING, ICETIC 2018, 2018, 200 : 98 - 106
  • [39] A Majority Voting Scheme in Wireless Sensor Networks for Detecting Suspicious Node
    Chou, Fan
    Tan, Jin
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL II, 2009, : 495 - 498
  • [40] Cimpanu C, 2016, THIEVES USING R