IDEAS home Printed from https://ideas.repec.org/a/eee/ijocip/v46y2024ics1874548224000349.html
   My bibliography  Save this article

Demonstration of denial of charging attack on electric vehicle charging infrastructure and its consequences

Author

Listed:
  • Gupta, Kirti
  • Panigrahi, Bijaya Ketan
  • Joshi, Anupam
  • Paul, Kolin

Abstract

The recent upsurge in electric vehicle (EV) adoption has led to greener mobility but has also broadened the attack surface due to the increased interconnection between the entities like EV, EV charger, grid etc. We show in this paper that among these entities, the EV charger provides a possible attack surface through the available communication network. Adversaries at a minimum can disrupt the vehicular charging process known as denial of charging (DoC) attack. This attack is demonstrated on the real hardware setup of an EV charging, where we have considered the Bharat EV DC charging standard (BEVC-DC001) adopted by India which uses the controller area network (CAN) bus to communicate between EV charger and EV. The DoC attack can have significant consequences both on the electrical grid as well as individuals. The EV chargers (with connected EV) collectively serve as a large load demand, whose sudden inaccessibility would disrupt the supply–demand balance, triggering over frequency relays to either cause local or national blackout. Such a scenario is presented in this work on a microgrid (MG), in a real-time OPAL-RT environment. Not only can this attack lead to major transportation related problems but would also disrupt medical and emergency services.

Suggested Citation

  • Gupta, Kirti & Panigrahi, Bijaya Ketan & Joshi, Anupam & Paul, Kolin, 2024. "Demonstration of denial of charging attack on electric vehicle charging infrastructure and its consequences," International Journal of Critical Infrastructure Protection, Elsevier, vol. 46(C).
  • Handle: RePEc:eee:ijocip:v:46:y:2024:i:c:s1874548224000349
    DOI: 10.1016/j.ijcip.2024.100693
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1874548224000349
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijcip.2024.100693?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:46:y:2024:i:c:s1874548224000349. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.