4.8 Article

Cybersecurity of Plug-In Electric Vehicles: Cyberattack Detection During Charging

Journal

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
Volume 68, Issue 1, Pages 478-487

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIE.2020.2965497

Keywords

Battery pack; cyberattack; plug-in electric vehicles (PEVs); vehicle security

Ask authors/readers for more resources

This article addresses the cybersecurity challenges associated with the large scale deployment of plug-in electric vehicles (PEVs) by exploring control-oriented approaches. Two algorithms for detecting cyberattacks on PEV battery packs during charging are discussed, including a static detector and a dynamic detector. A filter-based design approach for the dynamic detector is proposed to consider stability, robustness, and attack sensitivity as multiobjective criteria. Theoretical analysis and simulation studies show the effectiveness of the algorithms in detecting denial-of-charging (DoC) and overcharging attacks, indicating the superiority of the dynamic detector.
While large scale deployment of plug-in electric vehicles (PEVs) offers promising advantages, such as environmental benefits, energy security, and economic stability, it also poses certain cybersecurity related challenges. Unlike power grid security, PEV cybersecurity is significantly underexplored. However, cyberattacks on PEVs may lead to disastrous situations such as out-of-service EVs via denial-of-charging (DoC) or battery pack damage via overcharging. In this article, we attempt to address this issue by exploring control-oriented approaches for PEV cybersecurity. Specifically, we focus on designing algorithms for detecting cyberattacks that can potentially affect PEV battery packs during charging. We discuss two algorithms: first, static detector that utilizes only measured variables, and, second, dynamic detector that utilizes the knowledge of system dynamics along with the measurements. Furthermore, we propose a filter-based design approach for the dynamic detector that considers a multiobjective criterion including stability, robustness, and attack sensitivity. We perform theoretical analysis and simulation studies to evaluate the effectiveness of the algorithms under DoC and overcharging attacks that indicate the superiority of dynamic detector in terms of attack detectability.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available