Saturday, September 7, 2024

Cybersecurity Risks Found In EV Fast-Charging Systems

- Advertisement -

Discovering cybersecurity risks in EV fast-charging systems allows hackers to access network keys and data. Future work aims to enhance security measures.

SwRI developed an adversary-in-the-middle device with a modified combined charging system to test the cyber resiliency of ISO 15118-compliant vehicle-to-grid, direct current fast charging systems. The high-voltage technology relies on power line communications (PLC) to transmit smart-grid data between vehicles and charging equipment. SwRI researchers exploited. Credit: Southwest Research Institute
SwRI developed an adversary-in-the-middle device with a modified combined charging system to test the cyber resiliency of ISO 15118-compliant vehicle-to-grid, direct current fast charging systems. The high-voltage technology relies on power line communications (PLC) to transmit smart-grid data between vehicles and charging equipment. SwRI researchers exploited. Credit: Southwest Research Institute

Engineers at Southwest Research Institute have identified cybersecurity vulnerabilities in electric vehicles (EVs) using direct current fast-charging systems, the fastest common charging method. This high-voltage technology uses power line communication (PLC) to transmit smart-grid data between vehicles and charging equipment.

In a laboratory, the SwRI team exploited vulnerabilities in the PLC layer, gaining access to network keys and digital addresses on the charger and the vehicle.

- Advertisement -

In the latest project, SwRI explored vehicle-to-grid (V2G) charging technologies, following ISO 15118 specifications for communication between EVs and electric vehicle supply equipment (EVSE) to support electric power transfer.

The team have developed an adversary-in-the-middle (AitM) device with specialized software and a modified combined charging system interface. This AitM device enabled testers to eavesdrop on communication between EVs and EVSE for data collection, analysis, and potential attack. By identifying the media access control addresses of the EV and EVSE, the team discovered the network membership key that allows devices to join the network and monitor traffic.

The researchers noted that adding encryption to the network membership key would be an important first step in securing the V2G charging process. They explained that with network access granted by unsecured direct access keys, the nonvolatile memory regions on PLC-enabled devices could be easily retrieved and reprogrammed. This vulnerability opens the door to destructive attacks, such as firmware corruption.

However, encrypting embedded systems on vehicles presents several challenges. Added layers of encryption and authentication could potentially become safety hazards. If authentication or decryption fails, it could disrupt a vehicle’s functionality or performance.

SwRI has developed a zero-trust architecture to address these challenges by connecting several embedded systems through a single cybersecurity protocol. Future EV cybersecurity research at SwRI will test zero-trust systems for PLC and other network layers.

Nidhi Agarwal
Nidhi Agarwal
Nidhi Agarwal is a journalist at EFY. She is an Electronics and Communication Engineer with over five years of academic experience. Her expertise lies in working with development boards and IoT cloud. She enjoys writing as it enables her to share her knowledge and insights related to electronics, with like-minded techies.

SHARE YOUR THOUGHTS & COMMENTS

EFY Prime

Unique DIY Projects

Electronics News

Truly Innovative Electronics

Latest DIY Videos

Electronics Components

Electronics Jobs

Calculators For Electronics