2017
DOI: 10.1109/tsg.2017.2669647
|View full text |Cite
|
Sign up to set email alerts
|

OCPP Protocol: Security Threats and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 105 publications
(51 citation statements)
references
References 9 publications
0
47
0
1
Order By: Relevance
“…• An efficient privacy-preserving authentication protocol, which provides several key security properties including Authentication Key Exchange (AKE) security, privacy of the user, protection against eavesdropping or interception attacks, protection against man-in-the middle attacks, and location privacy, which are all requirements for secure EIbased V2G communication [32][33]. There are some existing schemes which can ensure most of the security requirements for EI-based V2G communication.…”
Section: B Our Contributionmentioning
confidence: 99%
See 1 more Smart Citation
“…• An efficient privacy-preserving authentication protocol, which provides several key security properties including Authentication Key Exchange (AKE) security, privacy of the user, protection against eavesdropping or interception attacks, protection against man-in-the middle attacks, and location privacy, which are all requirements for secure EIbased V2G communication [32][33]. There are some existing schemes which can ensure most of the security requirements for EI-based V2G communication.…”
Section: B Our Contributionmentioning
confidence: 99%
“…Next, if we consider the existing standards such as IEC 15118 and OCPP protocol for V2G communications, then we find that like [4], [5], and [6], their authentication and key-establishment schemes are based on the computationally expensive ECDSA crypto-system, where each signature generation takes 23.81 ms (at the user's device) and each signature verification (at the USP) takes 17.56 ms. Besides, according to [32] and [33], these protocols also suffer from several security issues (such as insecure against manin-the middle attacks, network impersonation attacks, DoS attacks, etc.) and challenges.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…This concentrator has the ability to recollect evidence flows of several home premises and send this information to the billing entities to manage the final charging and the real demand [2,3]. Although the metering management process implies a significant evolution for the human being and its welfare within a society [2], numerous security and privacy breaches might arise, some of them mainly caused by the inherent vulnerabilities of the communication protocols [3][4][5].…”
Section: A Practical Use Case: Smart City Applications In Engineeringmentioning
confidence: 99%
“…In this sense, the University of Malaga (UMA) has recently led a Master's end project in order to analyze the different security weaknesses of the ModbusTCP protocol [6] in a scenario composed of eight smart meters-as illustrated in the picture to the left side of Figure 1. In this work, a man in the middle (MITM) was planned and located (as represented in the picture to the right side of Figure 1) in order to show the multiple types of cyberattacks on the path and against the confidentiality, integrity and availability of the data in the channel, among others [5]: eavesdropping, replay, data modification, false data injection, or flooding (e.g., ARP flooding, smurf or fraggle). For the scenario construction, SDN together with Mininet [7] and OpenFlow were determinant due to the specificity of the communication protocol and the complexity of the work environment.…”
Section: A Practical Use Case: Smart City Applications In Engineeringmentioning
confidence: 99%
“…After the financial crisis, the world's major countries regard the development of electric vehicle industry as their national strategy, and the development of new industries becomes an important way to alleviate the energy crisis [1] . China surpasses the United States and become the world's largest electric car country in production and sales in 2015.…”
Section: Introductionmentioning
confidence: 99%