2020 IEEE 23rd International Conference on Intelligent Transportation Systems (ITSC) 2020
DOI: 10.1109/itsc45102.2020.9294416
|View full text |Cite
|
Sign up to set email alerts
|

Novel Strategies for Security-hardened BMS for Extremely Fast Charging of BEVs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Additional work by other authors can be reviewed in [32][33][34][35][36][37][38][39][40][41][42][43][44][45][46][47][48]. As can be seen from the review, the use of Kali Linux [49] in the process of studying the network security level of PEDs has not been proposed.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Additional work by other authors can be reviewed in [32][33][34][35][36][37][38][39][40][41][42][43][44][45][46][47][48]. As can be seen from the review, the use of Kali Linux [49] in the process of studying the network security level of PEDs has not been proposed.…”
Section: Related Workmentioning
confidence: 99%
“…The mobile workstation is connected to this port and, with the installed monitoring tools, it monitors the traffic exchanged between the PED and the monitoring center. Additional work by other authors can be reviewed in [32][33][34][35][36][37][38][39][40][41][42][43][44][45][46][47][48]. As can be seen from the review, the use of Kali Linux [49] in the process of studying the network security level of PEDs has not been proposed.…”
Section: Experiemtnal Setupmentioning
confidence: 99%
“…In [8], the authors consider the possibility of "infecting" an EV charging network by using an infected EV plugged in to charge. Due to the possibility of "infecting" an EV while it is charging, the authors propose a method that they developed to secure the battery management systems (BMS) of the EV by using Moving Target Defense (MTD) technology.…”
Section: Related Workmentioning
confidence: 99%
“…Mainly, individual networks are isolated from the global system. Sandworm APT's attack on Ukraine [74] would not have been possible in a local network of DC power. A local DC network should be able to stop cascading failures.…”
Section: Cyber Security For Xfcmentioning
confidence: 99%