A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods
With the continuous development of transportation electrification, the cybersecurity of energy infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that es...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
KeAi Communications Co., Ltd.
2024-12-01
|
Series: | Defence Technology |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S221491472400151X |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1846128219083767808 |
---|---|
author | Tawfiq Aljohani Abdulaziz Almutairi |
author_facet | Tawfiq Aljohani Abdulaziz Almutairi |
author_sort | Tawfiq Aljohani |
collection | DOAJ |
description | With the continuous development of transportation electrification, the cybersecurity of energy infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that establish two-way communications with several players in the grid. This taxonomy aims to provide a comprehensive overview of cyberattacks against EVs from four distinct perspectives. The first is the research domains of EVs application, which investigates the different fields of research related to the development and application of EVs and how they are susceptible to cyber threats. The second is the CIA-based attacks, which examines the threats to the confidentiality, integrity, and availability of EVs' sensitive information and critical systems. The third taxonomy discusses the countermeasures and defensive mechanisms to secure the EVs against cyberattacks, including preventive measures, detection algorithms, response strategy, and recovery techniques. The fourth taxonomy is the verification and validation methodologies, which explores the software tools and hardware testbeds used to test and evaluate the security of EVs against cyber threats. Finally, this taxonomy presents an understanding of the current state of cyberattacks against EVs and serves as a valuable resource for researchers and practitioners in the fields of cybersecurity and electric mobility. |
format | Article |
id | doaj-art-f79fa227713f4e7db1316392c6c10e7a |
institution | Kabale University |
issn | 2214-9147 |
language | English |
publishDate | 2024-12-01 |
publisher | KeAi Communications Co., Ltd. |
record_format | Article |
series | Defence Technology |
spelling | doaj-art-f79fa227713f4e7db1316392c6c10e7a2024-12-11T05:56:40ZengKeAi Communications Co., Ltd.Defence Technology2214-91472024-12-01423158A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methodsTawfiq Aljohani0Abdulaziz Almutairi1Department of Electrical Engineering, College of Engineering at Yanbu, Taibah University, Yanbu, 41911, Saudi ArabiaDepartment of Electrical Engineering, College of Engineering, Majmaah University, Almajmaah, 11952, Saudi Arabia; Corresponding AuthorWith the continuous development of transportation electrification, the cybersecurity of energy infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that establish two-way communications with several players in the grid. This taxonomy aims to provide a comprehensive overview of cyberattacks against EVs from four distinct perspectives. The first is the research domains of EVs application, which investigates the different fields of research related to the development and application of EVs and how they are susceptible to cyber threats. The second is the CIA-based attacks, which examines the threats to the confidentiality, integrity, and availability of EVs' sensitive information and critical systems. The third taxonomy discusses the countermeasures and defensive mechanisms to secure the EVs against cyberattacks, including preventive measures, detection algorithms, response strategy, and recovery techniques. The fourth taxonomy is the verification and validation methodologies, which explores the software tools and hardware testbeds used to test and evaluate the security of EVs against cyber threats. Finally, this taxonomy presents an understanding of the current state of cyberattacks against EVs and serves as a valuable resource for researchers and practitioners in the fields of cybersecurity and electric mobility.http://www.sciencedirect.com/science/article/pii/S221491472400151XCybersecurityElectric vehiclesCharging stationsCybersecurity of energy systemsCyberattacks |
spellingShingle | Tawfiq Aljohani Abdulaziz Almutairi A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods Defence Technology Cybersecurity Electric vehicles Charging stations Cybersecurity of energy systems Cyberattacks |
title | A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods |
title_full | A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods |
title_fullStr | A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods |
title_full_unstemmed | A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods |
title_short | A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods |
title_sort | comprehensive survey of cyberattacks on evs research domains attacks defensive mechanisms and verification methods |
topic | Cybersecurity Electric vehicles Charging stations Cybersecurity of energy systems Cyberattacks |
url | http://www.sciencedirect.com/science/article/pii/S221491472400151X |
work_keys_str_mv | AT tawfiqaljohani acomprehensivesurveyofcyberattacksonevsresearchdomainsattacksdefensivemechanismsandverificationmethods AT abdulazizalmutairi acomprehensivesurveyofcyberattacksonevsresearchdomainsattacksdefensivemechanismsandverificationmethods AT tawfiqaljohani comprehensivesurveyofcyberattacksonevsresearchdomainsattacksdefensivemechanismsandverificationmethods AT abdulazizalmutairi comprehensivesurveyofcyberattacksonevsresearchdomainsattacksdefensivemechanismsandverificationmethods |