您的位置: 首页 > 外文期刊论文 > 详情页

EV Charging Infrastructure Discovery to Contextualize Its Deployment Security

作   者:
Khaled SarieddineMohammad Ali SayedRibal AtallahSadegh TorabiJoseph KhouryMorteza Safaei PourElias Bou-HarbChadi Assi
作者机构:
R&D Department San Diego State University VA USA Hydro-Quebec Research Institute System Resilience Concordia University San Diego TX Fairfax CanadaCenter for Secure Information SystemsSecurity Research CentreDepartment of Management Information Systems Montreal San AntonioCyber Center for Security and Analytics George Mason University Concordia Institute for Information Systems Engineering CA The University of Texas at San Antonio
关键词:
ProtocolsEcosystemsCharging stationsMalwarePower gridsSecurityMicroprogramming
期刊名称:
IEEE transactions on network and service management
i s s n:
1932-4537
年卷期:
2024 年 21 卷 1 期
页   码:
1287-1301
页   码:
摘   要:
Electric Vehicle Charging Stations (EVCSs) have been shown to be susceptible to remote exploitation due to manufacturer-induced vulnerabilities, demonstrated by recent attacks on this ecosystem. What is more alarming is that compromising these high-wattage IoT systems can be leveraged to perform coordinated oscillatory load attacks against the power grid which could lead to the instability of this critical infrastructure. In this paper, we investigate a previously sidelined aspect of EVCS security. We analyze the deployment security of EVCSs and highlight operator-induced vulnerabilities rendering the ecosystem exposed to remote intrusions. We create an advanced discovery technique that leverages Web interface artifacts to dynamically discover new charging station vendors. As a result, we uncover 33,320 charging station management systems in the wild. Consequently, we study the deployment security of the charging stations and identify that 28,046 EVCSs were found to be vulnerable to eavesdropping, and around 24% of the studied EVCSs are deployed with default configurations exposing the ecosystem to a Mirai-like attack vector. Aligned with this finding, we discover that the EVCS ecosystem has been targeted by nefarious IoT malware such as Mirai and its variants. This demonstrates that further security measures should be implemented by vendors and operators to ensure the security of this vital ecosystem. Consequently, we provide a comprehensive recommendation for securing the deployment of EVCSs.
相关作者
载入中,请稍后...
相关机构
    载入中,请稍后...
应用推荐

意 见 箱

匿名:登录

个人用户登录

找回密码

第三方账号登录

忘记密码

个人用户注册

必须为有效邮箱
6~16位数字与字母组合
6~16位数字与字母组合
请输入正确的手机号码

信息补充