4.7 Article

Detecting State of Charge False Reporting Attacks via Reinforcement Learning Approach

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TITS.2023.3281476

Keywords

~Cybersecurity; deep learning; reinforcement learning; EV charging

Ask authors/readers for more resources

The push for green transportation has increased to combat the alarming rise in atmospheric CO2 levels, leading carmakers to develop clean cars and countries to set aggressive EV adoption targets. However, electric vehicles are vulnerable to cyberattacks due to their sensors, communication channels, and decision-making components. This paper proposes a learning-based detection model that can identify deceptive electric vehicles, trained on real driving traces and malicious datasets generated by a reinforcement learning agent. The model shows greater robustness to intelligent and stealthy attacks compared to handcrafted attacks.
The increased push for green transportation has been apparent to address the alarming increase in atmospheric CO2 levels, especially in the last five years. The success and popularity of Electric Vehicles (EVs) have led many carmakers to shift to developing clean cars in the next decade. Moreover, many countries around the globe have set aggressive EV target adoption numbers, with some even aiming to ban gasoline cars by 2050. Unlike their gasoline-based counterparts, EVs comprise many sensors, communication channels, and decision-making components vulnerable to cyberattacks. Hence, the unprecedented demand for EVs requires developing robust defenses against these increasingly sophisticated attacks. In particular, recently proposed cyberattacks demonstrate how malicious owners may mislead EV charging networks by sending false data to unlawfully receive higher charging priorities, congest charging schedules, and steal power. This paper proposes a learning-based detection model that can identify deceptive electric vehicles. The model is trained on an original dataset using real driving traces and a malicious dataset generated from a reinforcement learning agent. The Reinforcement Learning (RL) agent is trained to create intelligent and stealthy attacks that can evade simple detection rules while also giving a malicious EV high charging priority. We evaluate the effectiveness of the generated attacks compared to handcrafted attacks. Moreover, our detection model trained with RL-generated attacks displays greater robustness to intelligent and stealthy attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available