4.8 Article

Cybersecurity of Plug-In Electric Vehicles: Cyberattack Detection During Charging

期刊

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
卷 68, 期 1, 页码 478-487

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIE.2020.2965497

关键词

Battery pack; cyberattack; plug-in electric vehicles (PEVs); vehicle security

向作者/读者索取更多资源

This article addresses the cybersecurity challenges associated with the large scale deployment of plug-in electric vehicles (PEVs) by exploring control-oriented approaches. Two algorithms for detecting cyberattacks on PEV battery packs during charging are discussed, including a static detector and a dynamic detector. A filter-based design approach for the dynamic detector is proposed to consider stability, robustness, and attack sensitivity as multiobjective criteria. Theoretical analysis and simulation studies show the effectiveness of the algorithms in detecting denial-of-charging (DoC) and overcharging attacks, indicating the superiority of the dynamic detector.
While large scale deployment of plug-in electric vehicles (PEVs) offers promising advantages, such as environmental benefits, energy security, and economic stability, it also poses certain cybersecurity related challenges. Unlike power grid security, PEV cybersecurity is significantly underexplored. However, cyberattacks on PEVs may lead to disastrous situations such as out-of-service EVs via denial-of-charging (DoC) or battery pack damage via overcharging. In this article, we attempt to address this issue by exploring control-oriented approaches for PEV cybersecurity. Specifically, we focus on designing algorithms for detecting cyberattacks that can potentially affect PEV battery packs during charging. We discuss two algorithms: first, static detector that utilizes only measured variables, and, second, dynamic detector that utilizes the knowledge of system dynamics along with the measurements. Furthermore, we propose a filter-based design approach for the dynamic detector that considers a multiobjective criterion including stability, robustness, and attack sensitivity. We perform theoretical analysis and simulation studies to evaluate the effectiveness of the algorithms under DoC and overcharging attacks that indicate the superiority of dynamic detector in terms of attack detectability.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据