{"title":"Electric vehicle technology as an exploit for cyber attacks on the next generation of electric power systems","authors":"S. Ahmed, F. M. Dow","doi":"10.1109/CEIT.2016.7929019","DOIUrl":null,"url":null,"abstract":"In recent years, automakers focused on integrating technology into Electric vehicles (EVs) as well as linking intelligent transportation systems and their applications. This establishes a link between smart energy systems and smart mobility systems, along with their development and benefits. However, this has a negative impact on other systems, such as the smart grid. Therefore, the number of cyber attacks is increasing rapidly cyber terrorists are seeking a new component. These attacks on advanced power systems may be classified as an integrity, availability, or confidentiality attack on the network. In order to ensure our protection, it is necessary to detect vulnerabilities in critical systems before terrorists or other adversaries are able to exploit them destroying a country's physical electric power infrastructure, which is considered as the backbone of each activity, by attacking its control system through cyber means has become an important way to weaken a country. In this paper, we provide an EV as a bridge or platform to attack malicious programs on energy networks. We explain how EV technology equipped with all technical connections and software can be used as the point that exploits attacks on sensitive areas within the energy management system, the transport network, and the power distribution line by injecting data during part of the attack.","PeriodicalId":355001,"journal":{"name":"2016 4th International Conference on Control Engineering & Information Technology (CEIT)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 4th International Conference on Control Engineering & Information Technology (CEIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CEIT.2016.7929019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
In recent years, automakers focused on integrating technology into Electric vehicles (EVs) as well as linking intelligent transportation systems and their applications. This establishes a link between smart energy systems and smart mobility systems, along with their development and benefits. However, this has a negative impact on other systems, such as the smart grid. Therefore, the number of cyber attacks is increasing rapidly cyber terrorists are seeking a new component. These attacks on advanced power systems may be classified as an integrity, availability, or confidentiality attack on the network. In order to ensure our protection, it is necessary to detect vulnerabilities in critical systems before terrorists or other adversaries are able to exploit them destroying a country's physical electric power infrastructure, which is considered as the backbone of each activity, by attacking its control system through cyber means has become an important way to weaken a country. In this paper, we provide an EV as a bridge or platform to attack malicious programs on energy networks. We explain how EV technology equipped with all technical connections and software can be used as the point that exploits attacks on sensitive areas within the energy management system, the transport network, and the power distribution line by injecting data during part of the attack.