Electric vehicle technology as an exploit for cyber attacks on the next generation of electric power systems

S. Ahmed, F. M. Dow
{"title":"Electric vehicle technology as an exploit for cyber attacks on the next generation of electric power systems","authors":"S. Ahmed, F. M. Dow","doi":"10.1109/CEIT.2016.7929019","DOIUrl":null,"url":null,"abstract":"In recent years, automakers focused on integrating technology into Electric vehicles (EVs) as well as linking intelligent transportation systems and their applications. This establishes a link between smart energy systems and smart mobility systems, along with their development and benefits. However, this has a negative impact on other systems, such as the smart grid. Therefore, the number of cyber attacks is increasing rapidly cyber terrorists are seeking a new component. These attacks on advanced power systems may be classified as an integrity, availability, or confidentiality attack on the network. In order to ensure our protection, it is necessary to detect vulnerabilities in critical systems before terrorists or other adversaries are able to exploit them destroying a country's physical electric power infrastructure, which is considered as the backbone of each activity, by attacking its control system through cyber means has become an important way to weaken a country. In this paper, we provide an EV as a bridge or platform to attack malicious programs on energy networks. We explain how EV technology equipped with all technical connections and software can be used as the point that exploits attacks on sensitive areas within the energy management system, the transport network, and the power distribution line by injecting data during part of the attack.","PeriodicalId":355001,"journal":{"name":"2016 4th International Conference on Control Engineering & Information Technology (CEIT)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 4th International Conference on Control Engineering & Information Technology (CEIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CEIT.2016.7929019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

In recent years, automakers focused on integrating technology into Electric vehicles (EVs) as well as linking intelligent transportation systems and their applications. This establishes a link between smart energy systems and smart mobility systems, along with their development and benefits. However, this has a negative impact on other systems, such as the smart grid. Therefore, the number of cyber attacks is increasing rapidly cyber terrorists are seeking a new component. These attacks on advanced power systems may be classified as an integrity, availability, or confidentiality attack on the network. In order to ensure our protection, it is necessary to detect vulnerabilities in critical systems before terrorists or other adversaries are able to exploit them destroying a country's physical electric power infrastructure, which is considered as the backbone of each activity, by attacking its control system through cyber means has become an important way to weaken a country. In this paper, we provide an EV as a bridge or platform to attack malicious programs on energy networks. We explain how EV technology equipped with all technical connections and software can be used as the point that exploits attacks on sensitive areas within the energy management system, the transport network, and the power distribution line by injecting data during part of the attack.
电动汽车技术是对下一代电力系统进行网络攻击的一个漏洞
近年来,汽车制造商专注于将技术集成到电动汽车(ev)中,并将智能交通系统及其应用连接起来。这建立了智能能源系统和智能移动系统之间的联系,以及它们的发展和效益。然而,这对其他系统有负面影响,比如智能电网。因此,网络攻击的数量正在迅速增加,网络恐怖分子正在寻求新的组成部分。这些针对高级电力系统的攻击可分为对网络的完整性、可用性或机密性攻击。为了确保我们的保护,有必要在恐怖分子或其他对手能够利用它们之前发现关键系统的漏洞,摧毁一个国家的物理电力基础设施,这被认为是每项活动的支柱,通过网络手段攻击其控制系统已成为削弱一个国家的重要途径。在本文中,我们提供了一个EV作为桥梁或平台来攻击能源网络上的恶意程序。我们解释了配备了所有技术连接和软件的EV技术如何被用作攻击点,通过在部分攻击期间注入数据来利用对能源管理系统、运输网络和配电线路内敏感区域的攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信