Security of EV-Charging Protocols

02/09/2022
by   Pol Van Aubel, et al.
0

The field of electric vehicle charging involves a complex combination of actors, devices, networks, and protocols. These protocols are being developed without a clear focus on security. In this paper, we give an overview of the main roles and protocols in use in the Netherlands. We describe a clear attacker model and security requirements, show that in light of this many of the protocols have security issues, and provide suggestions on how to address these issues. The most important conclusion is the need for end-to-end security for data in transit and long-term authenticity for data at rest. In addition, we highlight the need for improved authentication of the EV driver, e.g. by using banking cards. For the communication links we advise mandatory use of TLS, standardization of TLS options and configurations, and improved authentication using TLS client certificates.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/02/2022

Authentication of quantum key distribution with post-quantum cryptography and replay attacks

With the development of quantum computers, traditional cryptographic sys...
research
06/29/2021

How many FIDO protocols are needed? Surveying the design, security and market perspectives

Unequivocally, a single man in possession of a strong password is not en...
research
06/01/2022

Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things

The ongoing trend to move industrial appliances from previously isolated...
research
12/04/2018

An Idea to Increase the Security of EAP-MD5 Protocol Against Dictionary Attack

IEEE 802.1X is an international standard for Port-based Network Access C...
research
11/09/2020

Think Global, Act Local: Gossip and Client Audits in Verifiable Data Structures

In recent years, there has been increasing recognition of the benefits o...
research
04/06/2020

Security Analysis and Design for TAGA: a Touch and Go Assistant in the Aerospace Domain

There is currently a drive in the aerospace domain to introduce machine ...
research
10/20/2020

A Novel Demodulation Scheme for Secure and Reliable UWB Distance Bounding

Relay attacks pose an important threat in wireless ranging and authentic...

Please sign up or login with your details

Forgot password? Click here to reset