Abstract | ||
---|---|---|
This work performs a security analysis of the vehicle-to-grid charging protocol ISO 15118 and presents various scenarios of how to compromise the availability of the charging service or the integrity, authenticity, or confidentiality of the communication on a protocol level. Furthermore, it analyzes processes related to the authentication, transfer of information, and the certification hierarchy for vulnerabilities, which could be used by an adversary to gain unfair advantage over the charging process and use it for his own self-interest, mostly harming legitimate users or other participants. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1007/s00450-017-0342-y | Computer Science - R&D |
Keywords | Field | DocType |
Electric vehicle, ISO 15118, Vehicle-to-grid, Charging protocol, Thread analysis | Authentication,Confidentiality,Computer security,Computer science,Computer network,Security analysis,Adversary,Online charging system,Certification,Hierarchy,Vehicle-to-grid | Journal |
Volume | Issue | ISSN |
33 | 1-2 | 1865-2034 |
Citations | PageRank | References |
2 | 0.36 | 4 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Kaibin Bao | 1 | 19 | 3.90 |
Hristo Valev | 2 | 2 | 0.36 |
Manuela Wagner | 3 | 2 | 0.70 |
Hartmut Schmeck | 4 | 1034 | 120.58 |