4.7 Article

A Risk-Based Optimization Model for Electric Vehicle Infrastructure Response to Cyber Attacks

期刊

IEEE TRANSACTIONS ON SMART GRID
卷 9, 期 6, 页码 6160-6169

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TSG.2017.2705188

关键词

Electric vehicle; cyber attack; malware propagation; response model; smart grid

资金

  1. U.S. National Science Foundation [CNS-1647135]

向作者/读者索取更多资源

Security of the smart grid is at risk when the vulnerabilities of the electric vehicle (EV) infrastructure is not addressed properly. As vehicles are becoming smarter and connected, their risk of being compromised is increasing. On various occasions and venues, hacking into smart or autonomous vehicles have been shown to be possible. For most of the time, a compromised vehicle poses a threat to the driver and other vehicles. On the other hand, when the vehicle is electric, the attack may spread to the power grid infrastructure starting from the EV supply equipment (EVSE) all the way up to the utility systems. Traditional isolation-based protection schemes do not work well in smart grid since electricity services have availability constraints and few of the components have physical backups. In this paper, we propose a mixed integer linear programming model that jointly optimizes security risk and equipment availability in the interdependent power and EV infrastructure. We adopt an epidemic attack model to mimic malware propagation. We assume malware spreads during EV charging when an EV is charged from an infected EVSE and then travels and recharges at another EVSE. In addition, it spreads through the communication network of EVSEs. The proposed response model aims to isolate a subset of compromised and likely compromised EVSEs. The response model minimizes the risk of attack propagation while providing a satisfactory level of equipment availability to supply demand. Our analysis shows the theoretical and practical bounds for the proposed response model in smart grid in the face of attacks to the EV infrastructure.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据