A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods

With the continuous development of transportation electrification, the cybersecurity of energy infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that es...

Full description

Saved in:
Bibliographic Details
Main Authors: Tawfiq Aljohani, Abdulaziz Almutairi
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2024-12-01
Series:Defence Technology
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S221491472400151X
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1846128219083767808
author Tawfiq Aljohani
Abdulaziz Almutairi
author_facet Tawfiq Aljohani
Abdulaziz Almutairi
author_sort Tawfiq Aljohani
collection DOAJ
description With the continuous development of transportation electrification, the cybersecurity of energy infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that establish two-way communications with several players in the grid. This taxonomy aims to provide a comprehensive overview of cyberattacks against EVs from four distinct perspectives. The first is the research domains of EVs application, which investigates the different fields of research related to the development and application of EVs and how they are susceptible to cyber threats. The second is the CIA-based attacks, which examines the threats to the confidentiality, integrity, and availability of EVs' sensitive information and critical systems. The third taxonomy discusses the countermeasures and defensive mechanisms to secure the EVs against cyberattacks, including preventive measures, detection algorithms, response strategy, and recovery techniques. The fourth taxonomy is the verification and validation methodologies, which explores the software tools and hardware testbeds used to test and evaluate the security of EVs against cyber threats. Finally, this taxonomy presents an understanding of the current state of cyberattacks against EVs and serves as a valuable resource for researchers and practitioners in the fields of cybersecurity and electric mobility.
format Article
id doaj-art-f79fa227713f4e7db1316392c6c10e7a
institution Kabale University
issn 2214-9147
language English
publishDate 2024-12-01
publisher KeAi Communications Co., Ltd.
record_format Article
series Defence Technology
spelling doaj-art-f79fa227713f4e7db1316392c6c10e7a2024-12-11T05:56:40ZengKeAi Communications Co., Ltd.Defence Technology2214-91472024-12-01423158A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methodsTawfiq Aljohani0Abdulaziz Almutairi1Department of Electrical Engineering, College of Engineering at Yanbu, Taibah University, Yanbu, 41911, Saudi ArabiaDepartment of Electrical Engineering, College of Engineering, Majmaah University, Almajmaah, 11952, Saudi Arabia; Corresponding AuthorWith the continuous development of transportation electrification, the cybersecurity of energy infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that establish two-way communications with several players in the grid. This taxonomy aims to provide a comprehensive overview of cyberattacks against EVs from four distinct perspectives. The first is the research domains of EVs application, which investigates the different fields of research related to the development and application of EVs and how they are susceptible to cyber threats. The second is the CIA-based attacks, which examines the threats to the confidentiality, integrity, and availability of EVs' sensitive information and critical systems. The third taxonomy discusses the countermeasures and defensive mechanisms to secure the EVs against cyberattacks, including preventive measures, detection algorithms, response strategy, and recovery techniques. The fourth taxonomy is the verification and validation methodologies, which explores the software tools and hardware testbeds used to test and evaluate the security of EVs against cyber threats. Finally, this taxonomy presents an understanding of the current state of cyberattacks against EVs and serves as a valuable resource for researchers and practitioners in the fields of cybersecurity and electric mobility.http://www.sciencedirect.com/science/article/pii/S221491472400151XCybersecurityElectric vehiclesCharging stationsCybersecurity of energy systemsCyberattacks
spellingShingle Tawfiq Aljohani
Abdulaziz Almutairi
A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods
Defence Technology
Cybersecurity
Electric vehicles
Charging stations
Cybersecurity of energy systems
Cyberattacks
title A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods
title_full A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods
title_fullStr A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods
title_full_unstemmed A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods
title_short A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods
title_sort comprehensive survey of cyberattacks on evs research domains attacks defensive mechanisms and verification methods
topic Cybersecurity
Electric vehicles
Charging stations
Cybersecurity of energy systems
Cyberattacks
url http://www.sciencedirect.com/science/article/pii/S221491472400151X
work_keys_str_mv AT tawfiqaljohani acomprehensivesurveyofcyberattacksonevsresearchdomainsattacksdefensivemechanismsandverificationmethods
AT abdulazizalmutairi acomprehensivesurveyofcyberattacksonevsresearchdomainsattacksdefensivemechanismsandverificationmethods
AT tawfiqaljohani comprehensivesurveyofcyberattacksonevsresearchdomainsattacksdefensivemechanismsandverificationmethods
AT abdulazizalmutairi comprehensivesurveyofcyberattacksonevsresearchdomainsattacksdefensivemechanismsandverificationmethods