电动汽车网络攻击综合调查:研究领域、攻击、防御机制和验证方法

IF 5.1 2区 工程技术 Q1 Engineering
Tawfiq Aljohani, Abdulaziz Almutairi
{"title":"电动汽车网络攻击综合调查:研究领域、攻击、防御机制和验证方法","authors":"Tawfiq Aljohani, Abdulaziz Almutairi","doi":"10.1016/j.dt.2024.06.009","DOIUrl":null,"url":null,"abstract":"With the continuous development of transportation electrification, the cybersecurity of energy infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that establish two-way communications with several players in the grid. This taxonomy aims to provide a comprehensive overview of cyberattacks against EVs from four distinct perspectives. The first is the research domains of EVs application, which investigates the different fields of research related to the development and application of EVs and how they are susceptible to cyber threats. The second is the CIA-based attacks, which examines the threats to the confidentiality, integrity, and availability of EVs' sensitive information and critical systems. The third taxonomy discusses the countermeasures and defensive mechanisms to secure the EVs against cyberattacks, including preventive measures, detection algorithms, response strategy, and recovery techniques. The fourth taxonomy is the verification and validation methodologies, which explores the software tools and hardware testbeds used to test and evaluate the security of EVs against cyber threats. Finally, this taxonomy presents an understanding of the current state of cyberattacks against EVs and serves as a valuable resource for researchers and practitioners in the fields of cybersecurity and electric mobility.","PeriodicalId":10986,"journal":{"name":"Defence Technology","volume":"32 1","pages":""},"PeriodicalIF":5.1000,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods\",\"authors\":\"Tawfiq Aljohani, Abdulaziz Almutairi\",\"doi\":\"10.1016/j.dt.2024.06.009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the continuous development of transportation electrification, the cybersecurity of energy infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that establish two-way communications with several players in the grid. This taxonomy aims to provide a comprehensive overview of cyberattacks against EVs from four distinct perspectives. The first is the research domains of EVs application, which investigates the different fields of research related to the development and application of EVs and how they are susceptible to cyber threats. The second is the CIA-based attacks, which examines the threats to the confidentiality, integrity, and availability of EVs' sensitive information and critical systems. The third taxonomy discusses the countermeasures and defensive mechanisms to secure the EVs against cyberattacks, including preventive measures, detection algorithms, response strategy, and recovery techniques. The fourth taxonomy is the verification and validation methodologies, which explores the software tools and hardware testbeds used to test and evaluate the security of EVs against cyber threats. Finally, this taxonomy presents an understanding of the current state of cyberattacks against EVs and serves as a valuable resource for researchers and practitioners in the fields of cybersecurity and electric mobility.\",\"PeriodicalId\":10986,\"journal\":{\"name\":\"Defence Technology\",\"volume\":\"32 1\",\"pages\":\"\"},\"PeriodicalIF\":5.1000,\"publicationDate\":\"2024-06-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Defence Technology\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://doi.org/10.1016/j.dt.2024.06.009\",\"RegionNum\":2,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Defence Technology","FirstCategoryId":"5","ListUrlMain":"https://doi.org/10.1016/j.dt.2024.06.009","RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0

摘要

随着交通电气化的不断发展,能源基础设施的网络安全问题日益突出。明确地说,电动汽车是实施网络攻击的重要工具,因为电动汽车不仅被视为动态负载,还是与电网中多个参与者建立双向通信的移动能源。本分类法旨在从四个不同角度全面概述针对电动汽车的网络攻击。首先是电动汽车应用的研究领域,调查与电动汽车开发和应用相关的不同研究领域,以及它们如何容易受到网络威胁。第二类是基于 CIA 的攻击,研究对电动汽车敏感信息和关键系统的保密性、完整性和可用性的威胁。第三个分类法讨论确保电动汽车免受网络攻击的对策和防御机制,包括预防措施、检测算法、响应策略和恢复技术。第四个分类法是验证和确认方法,探讨用于测试和评估电动汽车应对网络威胁的安全性的软件工具和硬件测试平台。最后,本分类法介绍了针对电动汽车的网络攻击的现状,为网络安全和电动汽车领域的研究人员和从业人员提供了宝贵的资源。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods
With the continuous development of transportation electrification, the cybersecurity of energy infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that establish two-way communications with several players in the grid. This taxonomy aims to provide a comprehensive overview of cyberattacks against EVs from four distinct perspectives. The first is the research domains of EVs application, which investigates the different fields of research related to the development and application of EVs and how they are susceptible to cyber threats. The second is the CIA-based attacks, which examines the threats to the confidentiality, integrity, and availability of EVs' sensitive information and critical systems. The third taxonomy discusses the countermeasures and defensive mechanisms to secure the EVs against cyberattacks, including preventive measures, detection algorithms, response strategy, and recovery techniques. The fourth taxonomy is the verification and validation methodologies, which explores the software tools and hardware testbeds used to test and evaluate the security of EVs against cyber threats. Finally, this taxonomy presents an understanding of the current state of cyberattacks against EVs and serves as a valuable resource for researchers and practitioners in the fields of cybersecurity and electric mobility.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Defence Technology
Defence Technology Engineering-Computational Mechanics
CiteScore
7.50
自引率
7.80%
发文量
1248
审稿时长
22 weeks
期刊介绍: Defence Technology, sponsored by China Ordnance Society, is published quarterly and aims to become one of the well-known comprehensive journals in the world, which reports on the breakthroughs in defence technology by building up an international academic exchange platform for the defence technology related research. It publishes original research papers having direct bearing on defence, with a balanced coverage on analytical, experimental, numerical simulation and applied investigations. It covers various disciplines of science, technology and engineering.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信