2022 4th Global Power, Energy and Communication Conference (GPECOM) 2022
DOI: 10.1109/gpecom55404.2022.9815727
|View full text |Cite
|
Sign up to set email alerts
|

Impact of Cyber-attacks on EV Charging Coordination: The Case of Single Point of Failure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Additional work by other authors can be reviewed in [32][33][34][35][36][37][38][39][40][41][42][43][44][45][46][47][48]. As can be seen from the review, the use of Kali Linux [49] in the process of studying the network security level of PEDs has not been proposed.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Additional work by other authors can be reviewed in [32][33][34][35][36][37][38][39][40][41][42][43][44][45][46][47][48]. As can be seen from the review, the use of Kali Linux [49] in the process of studying the network security level of PEDs has not been proposed.…”
Section: Related Workmentioning
confidence: 99%
“…The mobile workstation is connected to this port and, with the installed monitoring tools, it monitors the traffic exchanged between the PED and the monitoring center. Additional work by other authors can be reviewed in [32][33][34][35][36][37][38][39][40][41][42][43][44][45][46][47][48]. As can be seen from the review, the use of Kali Linux [49] in the process of studying the network security level of PEDs has not been proposed.…”
Section: Experiemtnal Setupmentioning
confidence: 99%
“…Cyberattacks could also have serious negative effects on users, the distribution network operator, and the charging coordinator by exchanging sensitive information, which could have unavoidable technical and financial repercussions [16]. Researchers have also found flaws that might cause regional or nationwide disruptions in EVSE devices, communications to EVs, and cloud services provided by EVSE vendors, third-party systems, and grid operators [4].…”
Section: Evcharging Apps and Their Vulnerabilitiesmentioning
confidence: 99%
“…For instance, Kaspersky Lab reported a security breach in an EV charging application, which would let a remote attacker intrude into the charging system and tamper the system through the Wi-Fi connection [32]. A security breach was also reported in the EVlink chargers produced by Schneider Electric [33]. The breach would allow an attacker to bypass the authentication credentials, send malware, and deactivate the charging system.…”
Section: Cybersecurity Of Bmsmentioning
confidence: 99%