Cybersecurity of Electric Vehicle Smart Charging Management Systems

被引:14
作者
Bhusal, Narayan [1 ]
Gautam, Mukesh [1 ]
Benidris, Mohammed [1 ]
机构
[1] Univ Nevada, Dept Elect & Biomed Engn, Reno, NV 89557 USA
来源
2020 52ND NORTH AMERICAN POWER SYMPOSIUM (NAPS) | 2021年
基金
美国国家科学基金会;
关键词
Cybersecurity; cyber-physical threats; PEV and grid service; smart charging management systems; DATA INJECTION ATTACKS; OPERATION; NETWORKS; SECURITY; GRIDS;
D O I
10.1109/NAPS50074.2021.9449758
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
In concept, a smart charging management system (SCMS) optimizes the charging of plug-in vehicles (PEVs) and provides various grid services including voltage control, frequency regulation, peak shaving, renewable energy integration support, spinning reserve, and emergency demand response. These functionalities largely depend upon data collected from various entities such as PEVs, electric vehicle supply equipment (EVSE), service providers, and utilities. SCMS can be susceptible to both cyber and physical threats (e.g. man-in-the-middle attack, data intrigued attack, denial of charging, physical-attack) due to interactions of and interdependencies between cyber and physical components. Cyber-physical threats through highly connected malware vectors raise various concerns including public safety hazards to vehicle operators and those in the immediate vicinity as well as disruptions to electric grid operations. This paper describes the concept of SCMS and provides a comprehensive review of cybersecurity aspects of EVSEs and SCMSs with their possible impacts on the power grid and society. It also contributes to the development of cybersecurity measures to the SCMSs. Various functions of SCMS are reviewed in detail including peak shaving, demand charge reduction, frequency regulation, spinning reserve, renewable integration support, distribution congestion management, reactive power compensation, and emergency demand response with unidirectional PEVs charging. Also, a critical literature survey on current practices of SCMS cybersecurity is provided to explore major impacts and challenges of cyber-physical attacks and to identify research gaps and vulneraibilities in currently available SCMSs technologies.
引用
收藏
页数:6
相关论文
共 52 条
  • [1] Abedi Sajjad., 2015, Plug, P129
  • [2] [Anonymous], 2012, INLEXT1226853
  • [3] [Anonymous], 2012, 2012 3 IEEE PES INN
  • [4] [Anonymous], 2017, P 3 INT C ADV COMPUT
  • [5] Man-in-the-Middle Attack to the HTTPS Protocol
    Callegati, Franco
    Cerroni, Walter
    Ramilli, Marco
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (01) : 78 - 81
  • [6] Management of Electric Vehicle Charging to Mitigate Renewable Generation Intermittency and Distribution Network Congestion
    Caramanis, Michael
    Foster, Justin M.
    [J]. PROCEEDINGS OF THE 48TH IEEE CONFERENCE ON DECISION AND CONTROL, 2009 HELD JOINTLY WITH THE 2009 28TH CHINESE CONTROL CONFERENCE (CDC/CCC 2009), 2009, : 4717 - 4722
  • [7] Carter C, 2017, IEEE PHOT SPEC CONF, P2135, DOI 10.1109/PVSC.2017.8366503
  • [8] Cyber Security Research and Development, 2018, INLMIS1845521 CYB SE
  • [9] Deign J., 2018, WHY IS VEHICLE TO GR
  • [10] Cybersecurity of Plug-In Electric Vehicles: Cyberattack Detection During Charging
    Dey, Satadru
    Khanra, Munmun
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2021, 68 (01) : 478 - 487