2021
DOI: 10.48550/arxiv.2106.16016
| View full text |Cite
Preprint
|
Sign up to set email alerts
|

Abstract: EVs (Electric Vehicles) represent a green alternative to traditional fuel-powered vehicles. To enforce their widespread use, both the technical development and the security of users shall be guaranteed. Privacy of users represents one of the possible threats impairing EVs adoption. In particular, recent works showed the feasibility of identifying EVs based on the current exchanged during the charging phase. In fact, while the resource negotiation phase runs over secure communication protocols, the signal excha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 27 publications
(59 reference statements)
0
2
0
Order By: Relevance
“…It is subjected to fast degradation through usage, which is responsible for reducing the maximum capacity over time [35]. In [8] the authors demonstrate the possibility to profile a vehicle based on the battery charging profile. Some situations can speed up the degradation process, such as extreme operation temperatures, overcharging, and completely draining the battery [45].…”
Section: Variations Of the Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…It is subjected to fast degradation through usage, which is responsible for reducing the maximum capacity over time [35]. In [8] the authors demonstrate the possibility to profile a vehicle based on the battery charging profile. Some situations can speed up the degradation process, such as extreme operation temperatures, overcharging, and completely draining the battery [45].…”
Section: Variations Of the Attackmentioning
confidence: 99%
“…The charging column can be attacked as well, for instance, by a denial of service attack, avoiding some areas to offer charge services to the users. Other exploits which have been proved to be effective in the V2G scenario include the profilation of the battery profile [39] or the profilation of the vehicle [8] based on the electric traces generated from the charging process. Contribution.…”
Section: Introductionmentioning
confidence: 99%