A Tale of Two Entities

Author:

ElHussini Hossam1,Assi Chadi1,Moussa Bassam2,Atallah Ribal3,Ghrayeb Ali4

Affiliation:

1. Concordia University, Montreal, Canada

2. Thales Research and Technology, Saint-Laurent, QC, Canada

3. Hydro-Quebec Research Institute, Varennes, Canada

4. Texas A&M University at Qatar, Doha, Qatar

Abstract

With the growing market of Electric Vehicles (EV), the procurement of their charging infrastructure plays a crucial role in their adoption. Within the revolution of Internet of Things, the EV charging infrastructure is getting on board with the introduction of smart Electric Vehicle Charging Stations (EVCS), a myriad set of communication protocols, and different entities. We provide in this article an overview of this infrastructure detailing the participating entities and the communication protocols. Further, we contextualize the current deployment of EVCSs through the use of available public data. In the light of such a survey, we identify two key concerns, the lack of standardization and multiple points of failures, which renders the current deployment of EV charging infrastructure vulnerable to an array of different attacks. Moreover, we propose a novel attack scenario that exploits the unique characteristics of the EVCSs and their protocol (such as high power wattage and support for reverse power flow) to cause disturbances to the power grid. We investigate three different attack variations; sudden surge in power demand, sudden surge in power supply, and a switching attack. To support our claims, we showcase using a real-world example how an adversary can compromise an EVCS and create a traffic bottleneck by tampering with the charging schedules of EVs. Further, we perform a simulation-based study of the impact of our proposed attack variations on the WSCC 9 bus system. Our simulations show that an adversary can cause devastating effects on the power grid, which might result in blackout and cascading failure by comprising a small number of EVCSs.

Funder

NSERC

Publisher

Association for Computing Machinery (ACM)

Reference57 articles.

1. Samrat Acharya Yury Dvorkin and Ramesh Karri. 2019. Public plug-in electric vehicles+ grid data: Is a new cyberattack vector viable? Retrieved from https://arXiv:1907.08283. Samrat Acharya Yury Dvorkin and Ramesh Karri. 2019. Public plug-in electric vehicles+ grid data: Is a new cyberattack vector viable? Retrieved from https://arXiv:1907.08283.

2. OCPP Protocol: Security Threats and Challenges

3. Characteristics of CHAdeMO quick charging system;Anegawa Takafumi;World Electric Vehicle J.,2010

Cited by 25 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3