{"title":"电动汽车网络攻击综合调查:研究领域、攻击、防御机制和验证方法","authors":"Tawfiq Aljohani, Abdulaziz Almutairi","doi":"10.1016/j.dt.2024.06.009","DOIUrl":null,"url":null,"abstract":"With the continuous development of transportation electrification, the cybersecurity of energy infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that establish two-way communications with several players in the grid. This taxonomy aims to provide a comprehensive overview of cyberattacks against EVs from four distinct perspectives. The first is the research domains of EVs application, which investigates the different fields of research related to the development and application of EVs and how they are susceptible to cyber threats. The second is the CIA-based attacks, which examines the threats to the confidentiality, integrity, and availability of EVs' sensitive information and critical systems. The third taxonomy discusses the countermeasures and defensive mechanisms to secure the EVs against cyberattacks, including preventive measures, detection algorithms, response strategy, and recovery techniques. The fourth taxonomy is the verification and validation methodologies, which explores the software tools and hardware testbeds used to test and evaluate the security of EVs against cyber threats. Finally, this taxonomy presents an understanding of the current state of cyberattacks against EVs and serves as a valuable resource for researchers and practitioners in the fields of cybersecurity and electric mobility.","PeriodicalId":10986,"journal":{"name":"Defence Technology","volume":"32 1","pages":""},"PeriodicalIF":5.1000,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods\",\"authors\":\"Tawfiq Aljohani, Abdulaziz Almutairi\",\"doi\":\"10.1016/j.dt.2024.06.009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the continuous development of transportation electrification, the cybersecurity of energy infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that establish two-way communications with several players in the grid. This taxonomy aims to provide a comprehensive overview of cyberattacks against EVs from four distinct perspectives. The first is the research domains of EVs application, which investigates the different fields of research related to the development and application of EVs and how they are susceptible to cyber threats. The second is the CIA-based attacks, which examines the threats to the confidentiality, integrity, and availability of EVs' sensitive information and critical systems. The third taxonomy discusses the countermeasures and defensive mechanisms to secure the EVs against cyberattacks, including preventive measures, detection algorithms, response strategy, and recovery techniques. The fourth taxonomy is the verification and validation methodologies, which explores the software tools and hardware testbeds used to test and evaluate the security of EVs against cyber threats. Finally, this taxonomy presents an understanding of the current state of cyberattacks against EVs and serves as a valuable resource for researchers and practitioners in the fields of cybersecurity and electric mobility.\",\"PeriodicalId\":10986,\"journal\":{\"name\":\"Defence Technology\",\"volume\":\"32 1\",\"pages\":\"\"},\"PeriodicalIF\":5.1000,\"publicationDate\":\"2024-06-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Defence Technology\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://doi.org/10.1016/j.dt.2024.06.009\",\"RegionNum\":2,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Defence Technology","FirstCategoryId":"5","ListUrlMain":"https://doi.org/10.1016/j.dt.2024.06.009","RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0
摘要
随着交通电气化的不断发展,能源基础设施的网络安全问题日益突出。明确地说,电动汽车是实施网络攻击的重要工具,因为电动汽车不仅被视为动态负载,还是与电网中多个参与者建立双向通信的移动能源。本分类法旨在从四个不同角度全面概述针对电动汽车的网络攻击。首先是电动汽车应用的研究领域,调查与电动汽车开发和应用相关的不同研究领域,以及它们如何容易受到网络威胁。第二类是基于 CIA 的攻击,研究对电动汽车敏感信息和关键系统的保密性、完整性和可用性的威胁。第三个分类法讨论确保电动汽车免受网络攻击的对策和防御机制,包括预防措施、检测算法、响应策略和恢复技术。第四个分类法是验证和确认方法,探讨用于测试和评估电动汽车应对网络威胁的安全性的软件工具和硬件测试平台。最后,本分类法介绍了针对电动汽车的网络攻击的现状,为网络安全和电动汽车领域的研究人员和从业人员提供了宝贵的资源。
A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods
With the continuous development of transportation electrification, the cybersecurity of energy infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that establish two-way communications with several players in the grid. This taxonomy aims to provide a comprehensive overview of cyberattacks against EVs from four distinct perspectives. The first is the research domains of EVs application, which investigates the different fields of research related to the development and application of EVs and how they are susceptible to cyber threats. The second is the CIA-based attacks, which examines the threats to the confidentiality, integrity, and availability of EVs' sensitive information and critical systems. The third taxonomy discusses the countermeasures and defensive mechanisms to secure the EVs against cyberattacks, including preventive measures, detection algorithms, response strategy, and recovery techniques. The fourth taxonomy is the verification and validation methodologies, which explores the software tools and hardware testbeds used to test and evaluate the security of EVs against cyber threats. Finally, this taxonomy presents an understanding of the current state of cyberattacks against EVs and serves as a valuable resource for researchers and practitioners in the fields of cybersecurity and electric mobility.
期刊介绍:
Defence Technology, sponsored by China Ordnance Society, is published quarterly and aims to become one of the well-known comprehensive journals in the world, which reports on the breakthroughs in defence technology by building up an international academic exchange platform for the defence technology related research. It publishes original research papers having direct bearing on defence, with a balanced coverage on analytical, experimental, numerical simulation and applied investigations. It covers various disciplines of science, technology and engineering.