Cybersecurity enabled electric vehicle charging and battery management system
Electric vehicles (EVs), which are become easier to get, are displacing conventional gasoline-powered cars. Because of this, there is a great demand for electric vehicle charging systems (EVCS), which has led to a major expansion of the public and private EVCS infrastructure. The threats related to...
Saved in:
Published in | Journal of discrete mathematical sciences & cryptography Vol. 27; no. 7; pp. 2111 - 2122 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
2024
|
Online Access | Get full text |
ISSN | 0972-0529 2169-0065 |
DOI | 10.47974/JDMSC-2084 |
Cover
Loading…
Abstract | Electric vehicles (EVs), which are become easier to get, are displacing conventional gasoline-powered cars. Because of this, there is a great demand for electric vehicle charging systems (EVCS), which has led to a major expansion of the public and private EVCS infrastructure. The threats related to cybersecurity have significantly increased as a result of the EVCS’s growing network. In this light, this article offers an examination of the cybersecurity threats associated with the network of EVCS. First, recent trends in EV adoption, charging use cases, and the most recent advancements in the EVCS network give context for the research subject. Second, while describing cybersecurity features of EVCS, possible cyberattack scenarios as well as vulnerabilities centered on infrastructure and protocols have been taken into account. Thirdly, risks in EVCS have been confirmed through real-time data-centric analysis of EVs. |
---|---|
AbstractList | Electric vehicles (EVs), which are become easier to get, are displacing conventional gasoline-powered cars. Because of this, there is a great demand for electric vehicle charging systems (EVCS), which has led to a major expansion of the public and private EVCS infrastructure. The threats related to cybersecurity have significantly increased as a result of the EVCS’s growing network. In this light, this article offers an examination of the cybersecurity threats associated with the network of EVCS. First, recent trends in EV adoption, charging use cases, and the most recent advancements in the EVCS network give context for the research subject. Second, while describing cybersecurity features of EVCS, possible cyberattack scenarios as well as vulnerabilities centered on infrastructure and protocols have been taken into account. Thirdly, risks in EVCS have been confirmed through real-time data-centric analysis of EVs. |
Author | Rao, B. K. Karunakar Chinta, Anil Kumar Pandraju, Thandava Krishna Sai Kumar, Y. Anil Pragathi, B. Rao, L. Shanmukha |
Author_xml | – sequence: 1 givenname: B. K. Karunakar surname: Rao fullname: Rao, B. K. Karunakar – sequence: 2 givenname: L. Shanmukha surname: Rao fullname: Rao, L. Shanmukha – sequence: 3 givenname: Y. Anil surname: Kumar fullname: Kumar, Y. Anil – sequence: 4 givenname: Anil Kumar surname: Chinta fullname: Chinta, Anil Kumar – sequence: 5 givenname: B. surname: Pragathi fullname: Pragathi, B. – sequence: 6 givenname: Thandava Krishna Sai surname: Pandraju fullname: Pandraju, Thandava Krishna Sai |
BookMark | eNot0LtOwzAYQGELFYm2MPEC3lHA98QjClBArRiAOfLldxqUuMg2SHl7RGE62xm-FVrEQwSELim5FrWuxc3z3e61rRhpxAlaMqp0RYiSC7QkumYVkUyfoVXOH4RIzaheol07W0gZ3FcayowhGjuCxzCCK2lw-Bv2gxsBu71J_RB7bKLH1pQCacaTiaaHCWLBec4FpnN0GsyY4eK_a_T-cP_WPlbbl81Te7utHCWqVIYZVgchgctAmdSNd4F5xSTXlDoXiOAUdFCh8ULWwrBGBWu5ZeBFI8DyNbr6-7p0yDlB6D7TMJk0d5R0R4nuKNH9SvAf50RUSw |
ContentType | Journal Article |
DBID | AAYXX CITATION |
DOI | 10.47974/JDMSC-2084 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2169-0065 |
EndPage | 2122 |
ExternalDocumentID | 10_47974_JDMSC_2084 |
GroupedDBID | 30N 4.4 AAYXX ABCCY ABFIM ABPEM ABTAI ABXYU ACAGQ ACFPA ACGFS ACTIO ADCVX AEYOC AGDLA AGROQ AIJEM AKOOK ALCKM ALMA_UNASSIGNED_HOLDINGS ALQZU AQRUH AVBZW AWYRJ BLEHA CCCUG CITATION CRFIH DGEBU DKSSO DMQIW EBS EJD E~A E~B GTTXZ H13 HZ~ H~P IPNFZ J9A KYCEM LJTGL M4Z O9- P2P QCRFL RIG S-T SNACF TDBHL TFW TTHFI UT5 |
ID | FETCH-LOGICAL-c106t-a2a27f45e35f12598dcf2d6253911ccf0431e9f6f8d4574a286fbb3b2ed484eb3 |
ISSN | 0972-0529 |
IngestDate | Tue Jul 01 01:03:25 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 7 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c106t-a2a27f45e35f12598dcf2d6253911ccf0431e9f6f8d4574a286fbb3b2ed484eb3 |
PageCount | 12 |
ParticipantIDs | crossref_primary_10_47974_JDMSC_2084 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-00-00 |
PublicationDateYYYYMMDD | 2024-01-01 |
PublicationDate_xml | – year: 2024 text: 2024-00-00 |
PublicationDecade | 2020 |
PublicationTitle | Journal of discrete mathematical sciences & cryptography |
PublicationYear | 2024 |
SSID | ssj0059219 |
Score | 2.252402 |
Snippet | Electric vehicles (EVs), which are become easier to get, are displacing conventional gasoline-powered cars. Because of this, there is a great demand for... |
SourceID | crossref |
SourceType | Index Database |
StartPage | 2111 |
Title | Cybersecurity enabled electric vehicle charging and battery management system |
Volume | 27 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La9tAEF7c5NJLH2lK3-whNyHFWq1ex9RtCU2cSxJIT2afpISqwcgF98_0r3ZmH7ZsUkhzEfZKYyPNx87sar5vCDnIZWVya0wKqyuTcmFF2tgcZSuNbnQz5pohOXl6Vh1f8q9X5dVo9GdQtbToZaZ-38kreYhXYQz8iizZ__Ds6kdhAD6Df-EIHobjvXw8WUrI3kIHusQ4GpROfGeb7yr5Za7RInFqSJGMKJ2g5jKUrbpSAK_m_I80FWm7c8iswSAKvEYepXJbtlWi5svbfih97d4buT3Yj1lykiHjbNGJGzHfOnuaoWB092Nxc72KDqua729ZctStC0Cw0bfPdHE0cZcNtyw8RzruOtYsxZeLPvy4MZZXbYqp0HBS9oIBAXz1xgwbJmcTvnpa83Yk4DUslLDL9afp-QRA4_vQbeptb8XBVXUirIuc-cwZz9D4EdllsA7B3iDF-CyG-rJluRdzDHflCaDO-HD9z4OUZ5C7XDwjT4I36ZFH0HMyMt0eeRobetAwv78g0w1A0QAoGgFFA6BoBBQFQNEAKLoGFPWA2ieXXz5fTI7T0G8jVfm46lPBBKstL01RWsh720YryzQskAuIiEpZ1GEyra1so3lZc8GaykpZSGY0b7iRxUuy0_3szCtCc2G5MkKwttY4AbRWQtrTFoIXtsg1e00O4iOZ3XpZldkdj_3N_S57Sx4jzPzO2Duy088X5j3kir384Pz1F7GjbfQ |
linkProvider | Taylor & Francis |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cybersecurity+enabled+electric+vehicle+charging+and+battery+management+system&rft.jtitle=Journal+of+discrete+mathematical+sciences+%26+cryptography&rft.au=Rao%2C+B.+K.+Karunakar&rft.au=Rao%2C+L.+Shanmukha&rft.au=Kumar%2C+Y.+Anil&rft.au=Chinta%2C+Anil+Kumar&rft.date=2024&rft.issn=0972-0529&rft.eissn=2169-0065&rft.volume=27&rft.issue=7&rft.spage=2111&rft.epage=2122&rft_id=info:doi/10.47974%2FJDMSC-2084&rft.externalDBID=n%2Fa&rft.externalDocID=10_47974_JDMSC_2084 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0972-0529&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0972-0529&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0972-0529&client=summon |