Electric vehicle charging: A survey on the security issues and challenges of the open charge point protocol (OCPP)

Z Garofalaki, D Kosmanos… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
The increased use of smart Electric Vehicles (EVs) and Plug-in Electric Vehicles (PEV)
opened a new area of research and development. The number of EV charging sites has …

Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017 - Wiley Online Library
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …

Electric vehicle-to-grid (V2G) technologies: Impact on the power grid and battery

MRH Mojumder, F Ahmed Antara, M Hasanuzzaman… - Sustainability, 2022 - mdpi.com
The gradual shift towards cleaner and green energy sources requires the application of
electric vehicles (EVs) as the mainstream transportation platform. The application of vehicle …

Power jacking your station: In-depth security analysis of electric vehicle charging station management systems

T Nasr, S Torabi, E Bou-Harb, C Fachkha, C Assi - Computers & Security, 2022 - Elsevier
Abstract The demand for Electric Vehicles (EVs) has been exponentially increasing, and to
achieve sustainable growth, the industry dictated rapid development of the supporting …

Ultra super fast authentication protocol for electric vehicle charging using extended chaotic maps

W Wang, Z Han, M Alazab… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Due to the explosive increase of electric vehicles (EVs) and universal charging stations
(CS), achieving fast authentication is an important topic in the vehicle-to-grid (V2G) network …

Lightweight mutual authentication protocol for V2G using physical unclonable function

G Bansal, N Naren, V Chamola, B Sikdar… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Electric vehicles (EVs) have been slowly replacing conventional fuel based vehicles since
the last decade. EVs are not only environment-friendly but when used in conjunction with a …

Can we use arbitrary objects to attack lidar perception in autonomous driving?

Y Zhu, C Miao, T Zheng, F Hajiaghajani, L Su… - Proceedings of the 2021 …, 2021 - dl.acm.org
As an effective way to acquire accurate information about the driving environment, LiDAR
perception has been widely adopted in autonomous driving. The state-of-the-art LiDAR …

Smart grid security: Attacks and defence techniques

Y Kim, S Hakak, A Ghorbani - IET Smart Grid, 2023 - Wiley Online Library
The smart grid (SG) consists of three main components, that is, Information Technology (IT),
Operational Technology (OT), and Advanced Metring Infrastructure (AMI). Due to the …

An efficient privacy-preserving authentication scheme for energy internet-based vehicle-to-grid communication

P Gope, B Sikdar - IEEE Transactions on Smart Grid, 2019 - ieeexplore.ieee.org
The energy Internet (EI) represents a new electric grid infrastructure that uses computing
and communication to transform legacy power grids into systems that support open …

Towards cyber security for low-carbon transportation: Overview, challenges and future directions

Y Cao, S Li, C Lv, D Wang, H Sun, J Jiang… - … and Sustainable Energy …, 2023 - Elsevier
In recent years, low-carbon transportation has become an indispensable part as sustainable
development strategies of various countries, and plays a very important responsibility in …