Section 3: Electromobility

Edited by Jordi Guijarro Olivares, i2CAT, Spain, | Peter Hofmann, Deutsche Telekom Security, Germany | Petros Kapsalas, Panasonic Automotive Systems Europe, Greece | Jordi Casademont, Universitat Politècnica de Catalunya, Spain | Saber Mhiri, i2CAT, Spain | Nikos Piperigkos, University of Patras, Greece | Rodrigo Diaz, ATOS, Spain | Bruno Cordero, i2CAT, Spain | Jordi Marias, i2CAT, Spain | Adrián Pino, i2CAT, Spain | Theocharis Saoulidis, SIDROCO, Cyprus | Josep Escrig, i2CAT, Spain | Choi You Jun, KATECH, South Korea | Taesang Choi, ETRI, South Korea

Downloaded: 1286 times

Published: 29 Dec 2022

© 2022 Jordi Guijarro Olivares | Peter Hofmann | Petros Kapsalas | Jordi Casademont | Saber Mhiri | Nikos Piperigkos | Rodrigo Diaz | Bruno Cordero | Jordi Marias | Adrián Pino | Theocharis Saoulidis | Josep Escrig | Choi You Jun | Taesang Choi


In recent years, there has been an increase in demand for electric vehicles. Plugin Electrical Vehicles (PEVs) are starting to appear on European roads, where the smart-grid capable Electric Vehicle Supply Equipment (EVSE) stations are used for charging. Cyberattacks at EVSEs can affect energy metering data and leak private information, or they can cause more dangerous situations like overcharging the large lithium batteries found in PEVs (since the Plug-in Electric Vehicle is negotiating with the charger) or disturb the operational flow of the electrical grid. It is abundantly clear that for the sector to experience sustained growth, the creation of a dependable and secure EV charging ecosystem (EVCS) is crucial. The usage of EVCS management systems (EVCSMS) can allow enhanced capabilities that could result in improvements to the EVCS. Although the implementation of EVCSMS can be advantageous for the adoption of EVs, security and management issues have become a top worry for users and network operators due to the system’s vulnerability and the vast variety of associated risks. Even though EVCSMS are created and offered by internationally renowned suppliers, it is unclear how a zero-day vulnerability could compromise a station’s overall security.