1. A Tale of Two Entities
- Author
-
Chadi Assi, Ali Ghrayeb, Ribal Atallah, Hossam ElHussini, and Bassam Moussa
- Subjects
business.product_category ,Exploit ,Computer Networks and Communications ,Computer science ,020209 energy ,Blackout ,020206 networking & telecommunications ,02 engineering and technology ,Adversary ,Computer security ,computer.software_genre ,Cascading failure ,Computer Science Applications ,Procurement ,Hardware and Architecture ,Electric vehicle ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,medicine.symptom ,Communications protocol ,business ,Traffic bottleneck ,computer ,Software ,Information Systems - Abstract
With the growing market of Electric Vehicles (EV), the procurement of their charging infrastructure plays a crucial role in their adoption. Within the revolution of Internet of Things, the EV charging infrastructure is getting on board with the introduction of smart Electric Vehicle Charging Stations (EVCS), a myriad set of communication protocols, and different entities. We provide in this article an overview of this infrastructure detailing the participating entities and the communication protocols. Further, we contextualize the current deployment of EVCSs through the use of available public data. In the light of such a survey, we identify two key concerns, the lack of standardization and multiple points of failures, which renders the current deployment of EV charging infrastructure vulnerable to an array of different attacks. Moreover, we propose a novel attack scenario that exploits the unique characteristics of the EVCSs and their protocol (such as high power wattage and support for reverse power flow) to cause disturbances to the power grid. We investigate three different attack variations; sudden surge in power demand, sudden surge in power supply, and a switching attack. To support our claims, we showcase using a real-world example how an adversary can compromise an EVCS and create a traffic bottleneck by tampering with the charging schedules of EVs. Further, we perform a simulation-based study of the impact of our proposed attack variations on the WSCC 9 bus system. Our simulations show that an adversary can cause devastating effects on the power grid, which might result in blackout and cascading failure by comprising a small number of EVCSs.
- Published
- 2021