Kaur, Amanjot, Valizadeh, Nima, Nandan, Devki, Szydlo, Tomasz, Rajasekaran, James R.K., Kumar, Vijay, Barika, Mutaz, Liang, Jun ![]() ![]() |
Abstract
The growing adoption of intelligent Electric Vehicles (EVs) has also created an opportunity for malicious actors to initiate attacks on the EV infrastructure, which can include a number of data exchange protocols across the various entities that are part of the EV charging ecosystem. These protocols possess a range of underlying vulnerabilities that attackers can exploit to disrupt the regular flow of information and energy. While researchers have considered vulnerabilities of particular components within an EV charging ecosystem, there is still a notable gap in vulnerability analysis of charging protocols and the potential threats to these. We investigate threat vectors within the most widely adopted protocols used in EV infrastructure, explore the potential impact of cyberattacks and suggest various mitigation techniques investigated in literature. Potential future research directions are also identified.
Item Type: | Article |
---|---|
Date Type: | Published Online |
Status: | In Press |
Schools: | Schools > Engineering Schools > Computer Science & Informatics |
Publisher: | Association for Computing Machinery (ACM) |
ISSN: | 0360-0300 |
Funders: | EPSRC |
Date of First Compliant Deposit: | 19 May 2025 |
Date of Acceptance: | 18 April 2025 |
Last Modified: | 29 May 2025 20:15 |
URI: | https://orca.cardiff.ac.uk/id/eprint/178360 |
Actions (repository staff only)
![]() |
Edit Item |