{"title":"电动汽车网络攻击综合调查:研究领域、攻击、防御机制和验证方法","authors":"Tawfiq Aljohani , Abdulaziz Almutairi","doi":"10.1016/j.dt.2024.06.009","DOIUrl":null,"url":null,"abstract":"<div><div>With the continuous development of transportation electrification, the cybersecurity of energy infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that establish two-way communications with several players in the grid. This taxonomy aims to provide a comprehensive overview of cyberattacks against EVs from four distinct perspectives. The first is the research domains of EVs application, which investigates the different fields of research related to the development and application of EVs and how they are susceptible to cyber threats. The second is the CIA-based attacks, which examines the threats to the confidentiality, integrity, and availability of EVs' sensitive information and critical systems. The third taxonomy discusses the countermeasures and defensive mechanisms to secure the EVs against cyberattacks, including preventive measures, detection algorithms, response strategy, and recovery techniques. The fourth taxonomy is the verification and validation methodologies, which explores the software tools and hardware testbeds used to test and evaluate the security of EVs against cyber threats. Finally, this taxonomy presents an understanding of the current state of cyberattacks against EVs and serves as a valuable resource for researchers and practitioners in the fields of cybersecurity and electric mobility.</div></div>","PeriodicalId":58209,"journal":{"name":"Defence Technology(防务技术)","volume":"42 ","pages":"Pages 31-58"},"PeriodicalIF":5.0000,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods\",\"authors\":\"Tawfiq Aljohani , Abdulaziz Almutairi\",\"doi\":\"10.1016/j.dt.2024.06.009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>With the continuous development of transportation electrification, the cybersecurity of energy infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that establish two-way communications with several players in the grid. This taxonomy aims to provide a comprehensive overview of cyberattacks against EVs from four distinct perspectives. The first is the research domains of EVs application, which investigates the different fields of research related to the development and application of EVs and how they are susceptible to cyber threats. The second is the CIA-based attacks, which examines the threats to the confidentiality, integrity, and availability of EVs' sensitive information and critical systems. The third taxonomy discusses the countermeasures and defensive mechanisms to secure the EVs against cyberattacks, including preventive measures, detection algorithms, response strategy, and recovery techniques. The fourth taxonomy is the verification and validation methodologies, which explores the software tools and hardware testbeds used to test and evaluate the security of EVs against cyber threats. Finally, this taxonomy presents an understanding of the current state of cyberattacks against EVs and serves as a valuable resource for researchers and practitioners in the fields of cybersecurity and electric mobility.</div></div>\",\"PeriodicalId\":58209,\"journal\":{\"name\":\"Defence Technology(防务技术)\",\"volume\":\"42 \",\"pages\":\"Pages 31-58\"},\"PeriodicalIF\":5.0000,\"publicationDate\":\"2024-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Defence Technology(防务技术)\",\"FirstCategoryId\":\"1087\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S221491472400151X\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Defence Technology(防务技术)","FirstCategoryId":"1087","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S221491472400151X","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0
摘要
随着交通电气化的不断发展,能源基础设施的网络安全问题日益突出。明确地说,电动汽车是实施网络攻击的重要工具,因为电动汽车不仅被视为动态负载,还是与电网中多个参与者建立双向通信的移动能源。本分类法旨在从四个不同角度全面概述针对电动汽车的网络攻击。首先是电动汽车应用的研究领域,调查与电动汽车开发和应用相关的不同研究领域,以及它们如何容易受到网络威胁。第二类是基于 CIA 的攻击,研究对电动汽车敏感信息和关键系统的保密性、完整性和可用性的威胁。第三个分类法讨论确保电动汽车免受网络攻击的对策和防御机制,包括预防措施、检测算法、响应策略和恢复技术。第四个分类法是验证和确认方法,探讨用于测试和评估电动汽车应对网络威胁的安全性的软件工具和硬件测试平台。最后,本分类法介绍了针对电动汽车的网络攻击的现状,为网络安全和电动汽车领域的研究人员和从业人员提供了宝贵的资源。
A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods
With the continuous development of transportation electrification, the cybersecurity of energy infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that establish two-way communications with several players in the grid. This taxonomy aims to provide a comprehensive overview of cyberattacks against EVs from four distinct perspectives. The first is the research domains of EVs application, which investigates the different fields of research related to the development and application of EVs and how they are susceptible to cyber threats. The second is the CIA-based attacks, which examines the threats to the confidentiality, integrity, and availability of EVs' sensitive information and critical systems. The third taxonomy discusses the countermeasures and defensive mechanisms to secure the EVs against cyberattacks, including preventive measures, detection algorithms, response strategy, and recovery techniques. The fourth taxonomy is the verification and validation methodologies, which explores the software tools and hardware testbeds used to test and evaluate the security of EVs against cyber threats. Finally, this taxonomy presents an understanding of the current state of cyberattacks against EVs and serves as a valuable resource for researchers and practitioners in the fields of cybersecurity and electric mobility.
Defence Technology(防务技术)Mechanical Engineering, Control and Systems Engineering, Industrial and Manufacturing Engineering
CiteScore
8.70
自引率
0.00%
发文量
728
审稿时长
25 days
期刊介绍:
Defence Technology, a peer reviewed journal, is published monthly and aims to become the best international academic exchange platform for the research related to defence technology. It publishes original research papers having direct bearing on defence, with a balanced coverage on analytical, experimental, numerical simulation and applied investigations. It covers various disciplines of science, technology and engineering.