论文标题

evexchange:对电动汽车充电系统的中继攻击

EVExchange: A Relay Attack on Electric Vehicle Charging System

论文作者

Conti, Mauro, Donadel, Denis, Poovendran, Radha, Turrin, Federico

论文摘要

为了支持电动汽车(EV)不断增长的扩展,全球正在安装充电站(CSS)。新一代CSS通过实施新标准(例如ISO 15118)采用车辆到网格(V2G)范式。此标准使车辆和充电柱之间的高级通信能够巧妙地管理充电,并简化了支付阶段。这个新颖的充电范式将智能网格连接到外部网络(例如EVS和CSS),尚未得到彻底检查。因此,它可能导致危险的脆弱性表面和新的研究挑战。 在本文中,我们介绍了evexchange,这是在V2G通讯中的一次充电课程中窃取能量的第一次攻击:即,在让受害人付费的同时向袭击者的汽车收取费用。此外,如果启用了反向充电流,攻击者甚至可以出售受害者汽车上的能量!因此,获得了这种销售的经济利润,并使受害者拥有完全放电的电池。我们开发了一个虚拟和物理测试,在该床位上我们验证了攻击并证明其在窃取能量方面的有效性。为了防止攻击,我们建议对ISO 15118协议进行轻巧的修改,以包括距离界限算法。最后,我们验证了测试床上的对策。我们的结果表明,提出的对策可以在透明与用户透明的同时识别所有中继攻击尝试。

To support the increasing spread of Electric Vehicles (EVs), Charging Stations (CSs) are being installed worldwide. The new generation of CSs employs the Vehicle-To-Grid (V2G) paradigm by implementing novel standards such as the ISO 15118. This standard enables high-level communication between the vehicle and the charging column, helps manage the charge smartly, and simplifies the payment phase. This novel charging paradigm, which connects the Smart Grid to external networks (e.g., EVs and CSs), has not been thoroughly examined yet. Therefore, it may lead to dangerous vulnerability surfaces and new research challenges. In this paper, we present EVExchange, the first attack to steal energy during a charging session in a V2G communication: i.e., charging the attacker's car while letting the victim pay for it. Furthermore, if reverse charging flow is enabled, the attacker can even sell the energy available on the victim's car! Thus, getting the economic profit of this selling, and leaving the victim with a completely discharged battery. We developed a virtual and a physical testbed in which we validate the attack and prove its effectiveness in stealing the energy. To prevent the attack, we propose a lightweight modification of the ISO 15118 protocol to include a distance bounding algorithm. Finally, we validated the countermeasure on our testbeds. Our results show that the proposed countermeasure can identify all the relay attack attempts while being transparent to the user.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源