Securing the Electrified Future: A Systematic Review of Cyber Attacks, Intrusion and Anomaly Detection, and Authentication in Electric Vehicle Charging Infrastructure
Abstract
1. Introduction
2. Materials and Methods
- Which anomaly detection techniques are most effective in securing EV charging infrastructure?
- To what extent does blockchain enhance the resilience of EV systems against cyber attacks?
- Which authentication protocols dominate vehicle-to-grid communication, and how do they impact overall system security?
- Does the type of infrastructure (public vs. private) determine the level of cybersecurity protection implemented?
- What are the operational consequences of attacks on charging stations, such as tariff manipulation or grid destabilization?
- To what extent are real-world versus simulated data used in EV cybersecurity research?
- Which regions are leading EV cybersecurity research, and what are the driving factors behind this trend?
2.1. Document Retrieval and Selection
- (1)
- Cybersecurity, including authentication, cryptography, intrusion and anomaly detection, and blockchain technologies;
- (2)
- Technologies and infrastructure, focusing on charging systems, integration with the electrical grid (including V2G), and EV onboard systems.
2.2. Classification Criteria
- Authentication and cryptography (e.g., authentication, cryptography);
- Cyber attacks (cyber attacks, computer crime, denial of service);
- Intrusion and anomaly detection (intrusion detection systems, anomaly detection);
- Blockchain technologies (blockchain).
- Electric vehicle charging (electric vehicle charging, charging infrastructure);
- Grid integration (smart grids, V2G, energy transfer);
- Vehicle systems (battery management, embedded systems, vehicular networks, internet of things).
- Journal articles (48 studies);
- Conference papers (52 studies);
- Other (e.g., reviews, book chapters; 2 studies).
- Experimental studies, based on original measurements and testing procedures;
- Literature-based analyses, including systematic reviews and meta-analyses;
- Case studies, focusing on implementations and practical applications;
- Conceptual works, involving mathematical models and proposals for new system architectures.
2.3. Data Processing and Analysis
- Technology of infrastructure (cybersecurity, deep learning, neural networks, statistical methods);
- Application area (battery systems, charging infrastructure, power grids, predictive control);
- Research methodology (experimental study, literature review, case study, conceptual work);
- Country of author affiliation;
- Document type (journal article, conference paper, other).
2.4. Review Protocol and Publication Quality
- Identification: 196 records identified in the Scopus database.
- Screening: After removing duplicates (n = 0), the remaining 196 records were screened, with 94 being excluded by applying an additional keyword filter: “LIMIT-TO (EXACTKEYWORD, “Electric Vehicles”).” To ensure the robustness of the screening process, the Scopus query was extended to include a broader set of synonyms related to electric vehicles and charging infrastructure (EVSE, PEV, EVCS, charge point, CSMS), in addition to the term electric vehicles. The extended query took the following form:
- AND (LIMIT-TO (EXACTKEYWORD, “Electric Vehicles”) OR LIMIT-TO (EXACTKEYWORD, “EVSE”) OR LIMIT-TO (EXACTKEYWORD, “PEV”) OR LIMIT-TO (EXACTKEYWORD, “EVCS”) OR LIMIT-TO (EXACTKEYWORD, “charge point”) OR LIMIT-TO (EXACTKEYWORD, “CSMS”)).
- The extended search yielded the same number of publications (n = 102) as the original query. This outcome reflects the fact that Scopus does not rely solely on author-supplied keywords, but instead applies its own standardized indexing. As a result, articles in which authors provided alternative terms (e.g., EVSE, PEV, EVCS) were nevertheless indexed under the unified keyword Electric Vehicles. Accordingly, the synonym expansion did not alter the dataset but confirmed the completeness of the initial screening strategy.
- 3.
- Eligibility: The full texts of the remaining 102 publications were assessed for eligibility and no further exclusions were made at this stage.
- 4.
- Included: A final set of 102 publications was ultimately included in the review.
- Authentication and cryptography;
- Cyber attacks;
- Intrusion and anomaly detection;
- Blockchain.
- Vehicle charging;
- Grid integration;
- Vehicle systems, such as battery management systems (BMS), vehicle-to-vehicle (V2V) communication, and vehicular networks.
- Journal articles (published in peer-reviewed journals);
- Conference papers;
- Other formats.
- Experimental studies (involving measurements, prototypes, or implementations);
- Literature reviews (focused on surveying existing knowledge);
- Case studies (presenting specific real-world implementations);
- Conceptual papers (theoretical or model-based works proposing new approaches).
3. State of the Art
3.1. Cybersecurity
3.1.1. Authentication and Cryptography
3.1.2. Cyber Attacks
3.1.3. Intrusion and Anomaly Detection
3.1.4. Performance Comparisons and Methodological Limitations
3.1.5. Blockchain
3.2. Technologies and Infrastructure
3.2.1. Vehicle Charging
3.2.2. Grid Integration
3.2.3. Vehicle Systems
3.3. Summary
- The threat landscape encompasses DoS/DDoS, MITM/replay, data manipulation, and backend protocol vulnerabilities (e.g., OCPP). Coordinated load attacks may escalate from charging stations to the entire power system.
- Intrusion and anomaly detection systems increasingly rely on ML/DL approaches (LSTM, autoencoders), hybrid designs, and edge/federated solutions. These are used to monitor vehicle buses, EVSE, and 5G-EVCS with low latency and fewer false positives.
- Blockchain and smart contracts support settlements, access control, and energy traceability (including in V2G and dynamic charging). However, they require lightweight consensus mechanisms and careful balancing of scalability and costs.
- On the technological side, rapid and wireless charging, modular EVCS, and integration with RES and storage are advancing; integration with the grid (V2G, Smart Grid, advanced control) improves stability but expands the attack surface.
4. Statistical Overview
4.1. Research Trends and Dynamics
- Authentication and Cryptography: The number of publications increased from 21 to 27, indicating a stable yet moderate development in this area. It is noteworthy that this category was dominant during the earlier time period and maintained a high level of academic interest in subsequent years;
- Cyber Attacks: This category experienced a sharp increase in publication volume—from 6 to 35 articles—making it the fastest-growing research area among the four. This surge likely reflects the rising cybersecurity threats associated with the proliferation of networked charging systems and the integration of electric vehicles (EVs) into digital infrastructures.
- Intrusion and Anomaly Detection: The number of publications grew from 3 to 19, suggesting a growing relevance of behavioral detection techniques and increased interest in machine learning (ML)-based solutions for cybersecurity challenges in EV ecosystems.
- Blockchain: Publications in this category rose from 3 to 11, which may indicate expanding research opportunities in the application of blockchain technologies for transaction security, identity verification, and access management in electric vehicles.
- Experimental Studies: The number of publications increased from 15 to 46, representing a 207% growth. This trend indicates a transition from theoretical investigations toward practical implementation and hypothesis testing in real-world or simulated environments.
- Literature Analyses: A rise from 6 to 26 publications was observed, reflecting a growing interest among researchers in synthesizing existing knowledge and identifying prevailing trends within the field.
- Case Studies: No publications of this type were recorded between 2017 and 2020. However, since 2021, seven case studies have been published, suggesting an increasing demand for application-oriented research, particularly in commercial deployments or pilot implementations of charging infrastructure.
- Conceptual Research: Conceptual studies rose from 20 to 48 publications, highlighting continued efforts in design and development aimed at introducing new models for energy management and cybersecurity alongside empirical validation.
- Vehicle Charging: This was the most frequently investigated topic across both analyzed periods, with the number of publications increasing from 21 to 63. This trend likely reflects the growing need for optimization of charging strategies and flexible energy cycle management in electric vehicle (EV) systems.
- Grid Integration: The number of studies increased from 16 to 35, indicating a rising focus on Vehicle-to-Grid (V2G) interactions, dynamic pricing models, and energy balancing within power systems involving EVs.
- Vehicle Systems: Publications in this category grew from 7 to 29, suggesting increased research interest in onboard energy and safety management systems. This is particularly relevant to the deployment of embedded machine learning (ML) algorithms and edge computing within EV architectures.
- Authentication and Cryptography: 48 studies;
- Cyber Attacks: 41 studies;
- Intrusion and Anomaly Detection: 22 studies;
- Blockchain: 14 studies.
- Authentication and Cryptography appeared in 41 studies.
- Cyber Attacks in 32 studies.
- Intrusion and Anomaly Detection in 18 studies.
- Blockchain in 9 studies.
- Authentication and Cryptography: 25 occurrences.
- Cyber Attacks: 23 occurrences.
- Intrusion and Anomaly Detection: 9 occurrences.
- Blockchain: 6 occurrences.
- Authentication and Cryptography: 15 studies;
- Cyber Attacks: 16 studies;
- Intrusion and Anomaly Detection: 8 studies;
- Blockchain: 8 studies.
- Experiments dominated in each security category, especially in Authentication and Cryptography (30 studies) and Cyber Attacks (27 studies). In the case of Blockchain, 9 experimental studies were identified, indicating growing efforts to implement this technology in practical settings.
- Literature Analyses were primarily conducted for Authentication and Cryptography (14 studies) and Cyber Attacks (14 studies), suggesting a well-established theoretical foundation in these areas.
- Case Studies were limited to only 7 publications overall, with 4 in Cyber Attacks and 3 in Intrusion and Anomaly Detection, indicating a relatively low degree of real-world deployment or documented implementations.
- Conceptual Studies were dominant in Authentication and Cryptography (37 studies) and Cyber Attacks (23 studies), and notably present in Blockchain (12 studies), reflecting the ongoing development of theoretical models and architectures in these areas.
- 5.
- Authentication and Cryptography remains the most frequently studied security domain. However, there is a noticeable increase in research activity related to Cyber Attacks and Anomaly Detection, indicating an expanding focus on behavioral and adaptive security mechanisms.
- 6.
- Charging infrastructure has been identified as the most critical area in terms of cybersecurity concerns. This domain accounts for the highest number of studies and experimental implementations, underscoring its importance as a user-network interface vulnerable to various threats.
- 7.
- Blockchain, although currently less represented in the dataset, shows increasing potential and is beginning to be investigated not only in vehicle-level applications but also in infrastructure-level contexts. This suggests an emerging trend of exploring decentralized and transparent security frameworks.
- 8.
- The absence of statistically significant differences across categories may reflect the maturity of the field, where research is distributed evenly with respect to both methodology and technological context. This balanced distribution may indicate a well-established foundation for interdisciplinary and multi-domain research efforts in the area of electromobility cybersecurity.
4.2. Geographic Distribution and Statistical Analysis
- The United States, which increased its output from 11 publications in the initial period to 22 in the subsequent one. This accounted for 32.35% of the total body of work, thereby maintaining its dominant position as the leading research hub in the field.
- China, which recorded a substantial increase—from 2 to 17 publications—resulting in a total share of 18.63%, positioning it as the second-largest contributor. This growth may be interpreted as a consequence of national policies promoting research in advanced transportation and digitalization.
- Canada, whose contribution also grew significantly, from 5 to 13 publications, representing 17.65% of the total.
- Germany, the only European country with relatively stable output across both periods—5 publications prior to 2020 and 6 afterward—contributing 10.78% overall.
- India, Brazil, South Korea which was unrepresented in the first period, produced 10 publications between 2021 and 2024, thereby securing the fifth position globally.
- Australia, Italy, the United Kingdom, and Turkey all exhibited activity exclusively during the 2021–2024 period, each publishing between 4 and 5 studies.
- Brazil was the only country whose contributions were limited solely to the 2017–2020 period (4 publications), potentially indicating a decline in research initiatives or a shift in national priorities.
- South Korea expanded its research activity moderately, with 1 publication before 2020 and 2 after this time.
- Turkey expanded its research activity moderately, with 1 publication.
- The “Other” category, representing additional countries, included a total of 11 publications—3 from the first period and 8 from the second—indicating the internationalization of the topic and the growing involvement of emerging academic and industrial centers.
- Chi-square value (χ2): 26.1
- Degrees of freedom: 11
- p-value: 0.01
4.3. Methodological and Thematic Relationships
- Experiment;
- Literature Analysis;
- Case Study;
- Conceptual;
- Authentication and Cryptography;
- Cyber Attacks;
- Intrusion and Anomaly Detection;
- Blockchain.
- 37 conceptual works;
- 30 experimental studies;
- 14 literature reviews;
- 0 case studies.
- 27 experimental studies;
- 23 conceptual papers;
- 14 literature analyses;
- 4 case studies.
- 14 conceptual studies
- 13 experimental studies
- 5 literature analyses
- 3 case studies
- 12 conceptual studies
- 9 experimental studies
- 2 literature reviews
- 0 case studies
- 41 publications focused on Authentication and Cryptography;
- 32 related to Cyber Attacks;
- 18 addressed Intrusion and Anomaly Detection;
- 9 covered Blockchain.
- 25 focused on Authentication and Cryptography;
- 23 related to Cyber Attacks;
- 9 addressing Intrusion and Anomaly Detection;
- 6 concerning Blockchain.
- 15 publications addressed Authentication and Cryptography;
- 16 focused on Cyber Attacks;
- 8 were related to Intrusion and Anomaly Detection;
- 8 discussed Blockchain.
5. Discussion
5.1. What the Evidence Says About the Threat Surface
- Protocol and session layer (EV–EVSE–backend). Work dissecting ISO 15118 highlights weaknesses around certificate lifecycle, session take-over and availability of Plug & Charge when misconfigured; wireless access proposals (WAS) add new benefits but also new abuse paths if proximity and signaling are not robustly verified [11,13]. Schemes hardening mutual authentication with PUF and lightweight crypto reduce cost/latency and raise spoofing resistance in dynamic and wireless charging [36], while zero-knowledge proof (ZKP) approaches target privacy of use-patterns without involving a central authority [25,48].
- Operations and market layer. Work on tariff and billing integrity shows how manipulation of metering/price signals or free-riding during wireless charging can distort settlements or incentivize abusive behaviors; blockchain-backed contracts (and proof-of-behaviour (PoB)-type consensus) are explored to ensure auditability and deter misuse while preserving user confidentiality [16]. Architectural reviews of Electric vehicle supply equipment (EVSE) platforms point to gaps in security monitoring and incident response that keep recurring across brands and operators [26].
- Grid-coupling layer. Several studies model coordinated attacks that exploit the aggregate flexibility of EV fleets. Examples include distributed denial-of-service (DDoS) on EVSE control backbones or mobile apps, false data injection attacks (FDIA)on state estimation, and modal/oscillatory forcing against coordinated charging that propagates into frequency/voltage control; the literature reports material stability and latency impacts in simulation and co-simulation settings [14,33,34,41,43,45]. In vehicle-to-grid (V2G) scenarios, adversarial price manipulation can steer charging/discharging to harm feeders in IEEE test networks [19].
5.2. Defenses That Scale with Deployment
- Hardened authentication and crypto. Beyond ISO 15118’s Public Key Infrastructure (PKI), the trend is toward hardware-rooted identities, short-lived credentials and context-bound sessions (location, proximity, Radio Frequency (RF) traits). Lightweight, post-quantum-ready designs are called for at the edge where compute and energy are tight [11,15,36,42].
- Detection and response. Intrusion/anomaly detection blends physics-aware features with learned behaviors. Results favor deep models (autoencoders, LSTM/GRU) and edge/fog deployment to push latency down and resilience up; hybrid schemes combining signatures with behavior improve coverage against novel patterns [28,37,43,46].
- Architecture and zero-trust. The literature and our quantitative split both point to architectures that assume every interface can be hostile: verify each request end-to-end, segment control from metering and payments, and instrument runtime monitoring compliant with IEC 62351-7-style telemetry [25].
5.3. Methods, Data and Where the Evidence Is Thin
5.4. Practical Implications
6. Conclusions
- The most credible defense posture combines robust, hardware-anchored authentication with continuous, physics-aware anomaly detection, and with privacy-preserving settlement. This looks like a zero-trust stance applied to a cyber–physical grid: verify identities and intents at each hop; offer the least privilege; monitor continuously; and fail safely.
- Quantitatively, research attention has shifted from basic crypto to attacks and IDS, mirroring deployment realities, while case-based evidence remains limited and deserves priority in the next wave of studies.
Supplementary Materials
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Christoforidis, C.; Christakis, I.; Kotzasavva, F.; Fousekis, G.; Rimpas, D. Electric Vehicles Charging Stations and Their Influence on the Electricity Utility Grid. Arch. Automot. Eng. Arch. Motoryz. 2025, 107, 102–126. [Google Scholar] [CrossRef] [PubMed]
- Dhandapani, S.; Raja, T.; Murugan, V.; Selvaraj, J.; Rathinasamy, V. Comprehensive Review on Evolution, Progression, Design, and Exploration of Electric Bicycle. Arch. Automot. Eng. Arch. Motoryz. 2024, 105, 5–43. [Google Scholar] [CrossRef]
- Lučić, M.; Lukić, J.; Grujić, I. Statistical Analysis of Trends in Battery Electric Vehicles: Special Reference to Vehicle Weight Reduction, Electric Motor, Battery, and Interior Space Dimensions. Arch. Automot. Eng. Arch. Motoryz. 2024, 104, 63–96. [Google Scholar] [CrossRef]
- Małek, A.; Marciniak, A.; Bartnik, G. The Selection of an Electric Vehicle for the Existing Photovoltaic System—Case Study in Polish Climatic Conditions. Arch. Automot. Eng. Arch. Motoryz. 2024, 103, 38–56. [Google Scholar] [CrossRef]
- Małek, A.; Marciniak, A. Selection of the Photovoltaic System Power for the Electric Vehicle. Arch. Automot. Eng. Arch. Motoryz. 2023, 100, 44–61. [Google Scholar] [CrossRef]
- Szumska, E.; Skuza, A.; Jurecki, R. The Analysis of Energy Recovered by an Electric Vehicle during Selected Braking Manoeuvres. Arch. Automot. Eng. Arch. Motoryz. 2023, 99, 18–29. [Google Scholar] [CrossRef]
- Kieracińska, A.; Piórkowski, P. Analysis of the Reasonableness of Using Electric Drives in Motor Vehicles. Arch. Automot. Eng. Arch. Motoryz. 2016, 74, 47–58. [Google Scholar] [CrossRef]
- Lin, Q.; Li, T.; Zhao, Y.; Guan, J.; Zhang, W.; Wang, X. Research on Charging Infrastructure Related Detection Technology Based on GAN. In Proceedings of the 2023 2nd International Conference on Clean Energy Storage and Power Engineering (CESPE), Xi’an, China, 15–16 December 2023; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2023; pp. 57–62. [Google Scholar]
- Mousavian, S.; Erol-Kantarci, M.; Wu, L.; Ortmeyer, T. A Risk-Based Optimization Model for Electric Vehicle Infrastructure Response to Cyber Attacks. IEEE Trans. Smart Grid 2018, 9, 6160–6169. [Google Scholar] [CrossRef]
- Hamied, M.H.A. Authentication of the Electric Vehicle with the Charging Station Using AAA Framework. In Proceedings of the 2023 3rd International Conference on Computing and Information Technology (ICCIT), Tabuk, Saudi Arabia, 13–14 September 2023; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2023; pp. 186–191. [Google Scholar]
- Jakó, Z.; Knapp, Á.; Sayed, N.E. Wireless Authentication Solution and TTCN-3 Based Test Framework for ISO-15118 Wireless V2G Communication. Infocommunications J. 2019, 11, 39–47. [Google Scholar] [CrossRef]
- Basnet, M.; Ali, M.H. Deep Learning-Based Intrusion Detection System for Electric Vehicle Charging Station. In Proceedings of the 2020 2nd International Conference on Smart Power & Internet Energy Systems (SPIES), Bangkok, Thailand, 15–18 September 2020; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2020; pp. 408–413. [Google Scholar]
- Bao, K.; Valev, H.; Wagner, M.; Schmeck, H. A Threat Analysis of the Vehicle-to-Grid Charging Protocol ISO 15118. Comput. Sci. Res. Dev. 2018, 33, 3–12. [Google Scholar] [CrossRef]
- Aljohani, T.; Almutairi, A. Modeling Time-Varying Wide-Scale Distributed Denial of Service Attacks on Electric Vehicle Charging Stations. Ain Shams Eng. J. 2024, 15, 102860. [Google Scholar] [CrossRef]
- Li, Z.; Sun, Z. A Cross-Domain Authentication Scheme for Electric Vehicle Intelligent Charging for Multiple Power Service Providers. In Proceedings of the 2023 13th International Conference on Communication and Network Security, Fuzhou, China, 6–8 December 2023; Association for Computing Machinery: New York, NY, USA, 2023; pp. 26–31. [Google Scholar]
- Zhang, X.; Liu, C.; Chai, K.K.; Poslad, S. A Privacy-Preserving Consensus Mechanism for an Electric Vehicle Charging Scheme. J. Netw. Comput. Appl. 2021, 174, 102908. [Google Scholar] [CrossRef]
- Sharma, G.; Joshi, A.M.; Mohanty, S.P. sTrade: Blockchain Based Secure Energy Trading Using Vehicle-to-Grid Mutual Authentication in Smart Transportation. Sustain. Energy Technol. Assess. 2023, 57, 103296. [Google Scholar] [CrossRef]
- Cirimele, V.; Diana, M.; Bellotti, F.; Berta, R.; El Sayed, N.; Kobeissi, A.; Guglielmi, P.; Ruffo, R.; Khalilian, M.; La Ganga, A.; et al. The Fabric ICT Platform for Managing Wireless Dynamic Charging Road Lanes. IEEE Trans. Veh. Technol. 2020, 69, 2501–2512. [Google Scholar] [CrossRef]
- Yin, H.; Liu, D.; Weng, J. Risk Analysis of Cyber Physical Distribution System Considering Cyber Attacks on V2g System. In Proceedings of the 10th Renewable Power Generation Conference (RPG 2021), Online, 14–15 October 2021; Institution of Engineering and Technology: Stevenage, UK, 2021; Volume 2021, pp. 841–846. [Google Scholar]
- Basnet, M.; Ali, M.H. Exploring Cybersecurity Issues in 5G Enabled Electric Vehicle Charging Station with Deep Learning. IET Gener. Transm. Distrib. 2021, 15, 3435–3449. [Google Scholar] [CrossRef]
- van Eck, N.J.; Waltman, L. Software Survey: VOSviewer, a Computer Program for Bibliometric Mapping. Scientometrics 2010, 84, 523–538. [Google Scholar] [CrossRef]
- Kanz Abdillah, H.; Wildan Rizkia, N.A.H.; Sidharta, S. Exploring the Role of Artificial Intelligence in Enhancing Battery Performance and Mitigating Cybersecurity Threats in Electric Vehicles: A Systematic Literature Review. Procedia Comput. Sci. 2024, 245, 155–165. [Google Scholar] [CrossRef]
- Pazos-Revilla, M.; Alsharif, A.; Gunukula, S.; Guo, T.N.; Mahmoud, M.; Shen, X. Secure and Privacy-Preserving Physical-Layer-Assisted Scheme for EV Dynamic Charging System. IEEE Trans. Veh. Technol. 2018, 67, 3304–3318. [Google Scholar] [CrossRef]
- Gabay, D.; Akkaya, K.; Cebe, M. Privacy-Preserving Authentication Scheme for Connected Electric Vehicles Using Blockchain and Zero Knowledge Proofs. IEEE Trans. Veh. Technol. 2020, 69, 5760–5772. [Google Scholar] [CrossRef]
- Reghunath, R.; Sayed, M.A.; Sarieddine, K.; Atallah, R.; Jafarigiv, D.; Kassouf, M.; Assi, C.; Ghafouri, M. A Real-Time Monitoring Architecture for Enhanced Cybersecurity in the EV Ecosystem. In Proceedings of the IECON 2024—50th Annual Conference of the IEEE Industrial Electronics Society, Chicago, IL, USA, 3–6 November 2024; IEEE Computer Society: Washington, DC, USA, 2024. [Google Scholar]
- Ronanki, D.; Karneddi, H. Electric Vehicle Charging Infrastructure: Review, Cyber Security Considerations, Potential Impacts, Countermeasures, and Future Trends. IEEE J. Emerg. Sel. Top. Power Electron. 2024, 12, 242–256. [Google Scholar] [CrossRef]
- Sepehrzad, R.; Faraji, M.J.; Al-Durra, A.; Sadabadi, M.S. Enhancing Cyber-Resilience in Electric Vehicle Charging Stations: A Multi-Agent Deep Reinforcement Learning Approach. IEEE Trans. Intell. Transp. Syst. 2024, 25, 18049–18062. [Google Scholar] [CrossRef]
- Basnet, M.; Ali, M.H. Deep-Learning-Powered Cyber-Attacks Mitigation Strategy in the EV Charging Infrastructure. In Proceedings of the 2023 IEEE Power & Energy Society General Meeting (PESGM), Orlando, FL, USA, 16–20 July 2023; IEEE Computer Society: Washington, DC, USA, 2023. [Google Scholar]
- Fard, M.F.; Huo, X.; Liu, M. Exploration of For-Purpose Decentralized Algorithmic Cyber Attacks in EV Charging Control. In Proceedings of the 2023 IEEE 32nd International Symposium on Industrial Electronics (ISIE), Helsinki/Espoo, Finland, 19–21 June 2023; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2023. [Google Scholar]
- Sarkar, A.; Ray, S.K. Smart Contract-Based Electric Vehicle Charging: A Practice-Based Economy of Things Application. In Proceedings of the Pacific Asia Conference on Information Systems (PACIS 2020), Dubai, United Arab Emirates, 22–24 June 2020; Association for Information Systems: Atlanta, GA, USA, 2020. [Google Scholar]
- Yaqub, R. Architecture and Protocols for Toll-Free Electric Vehicle Charging. World Electr. Veh. J. 2019, 10, 10. [Google Scholar] [CrossRef]
- Guo, S.; Chen, H.; Rahman, M.; Qian, X. DCA: Delayed Charging Attack on the Electric Shared Mobility System. IEEE Trans. Intell. Transp. Syst. 2023, 24, 12793–12805. [Google Scholar] [CrossRef]
- Gumrukcu, E.; Arsalan, A.; Muriithi, G.; Joglekar, C.; Aboulebdeh, A.; Zehir, M.A.; Papari, B.; Monti, A. Impact of Cyber-Attacks on EV Charging Coordination: The Case of Single Point of Failure. In Proceedings of the 2022 4th Global Power, Energy and Communication Conference (GPECOM), Cappadocia, Turkey, 14–17 June 2022; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2022; pp. 506–511. [Google Scholar]
- Zhou, Y.; Xu, H.; Liu, W.; Li, Y. Malicious Mode Attack on Electric Vehicle Coordinated Charging and Its Defense Strategy. Sustain. Energy Grids Netw. 2024, 39, 101440. [Google Scholar] [CrossRef]
- Chen, C.-M.; Miao, Q.; Khan, F.; Srivastava, G.; Kumari, S. Sustainable Secure Communication in Consumer-Centric Electric Vehicle Charging in Industry 5.0 Environments. IEEE Trans. Consum. Electron. 2024, 70, 1544–1555. [Google Scholar] [CrossRef]
- Alshaeri, A.; Younis, M. Lightweight Authentication and Authorization Protocol for Dynamic Charging of Electric Vehicles. In Proceedings of the 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2022; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2022; pp. 550–556. [Google Scholar]
- Feng, Q.; Li, H.; Zhou, Y.; Feng, D.; Wang, Y.; Su, Y. Review of Electric Vehicles’ Charging Data Anomaly Detection Based on Deep Learning. In Proceedings of the 2022 Power System and Green Energy Conference (PSGEC), Shanghai, China, 25–27 August 2022; Li, G., Li, Z., Eds.; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2022; pp. 337–341. [Google Scholar]
- Wang, Y.; Zhao, Z.; Qi, B.; Cheng, Y.; Tang, K.; Li, B. Vulnerability Analysis of an Electric Vehicle Fleet for Car-Sharing Service under Cyber Attacks. Sustain. Energy Grids Netw. 2024, 37, 101207. [Google Scholar] [CrossRef]
- Fahim, S.R.; Atat, R.; Kececi, C.; Takiddin, A.; Ismail, M.; Davis, K.R.; Serpedin, E. Generalized FDIA Detection in Power Dependent Electrified Transportation Systems. In Proceedings of the 2024 32nd European Signal Processing Conference (EUSIPCO), Lyon, France, 26–30 August 2024; IEEE: Washington, DC, USA, 2024; pp. 1851–1855. [Google Scholar]
- Wadi, M.; Shobole, A.; Elmasry, W.; Kucuk, I. Load Frequency Control in Smart Grids: A Review of Recent Developments. Renew. Sustain. Energy Rev. 2024, 189, 114013. [Google Scholar] [CrossRef]
- Attia, M.; Senouci, S.M.; Aglzim, E.-H. New Optimization and Security Approaches to Enhance the Smart Grid Performance and Reliability. In Proceedings of the 2016 7th International Conference on the Network of the Future (NOF), Búzios, Brazil, 16–18 November 2016; Duarte, O.C.M.B., Secci, S., Rubinstein, M.G., de Amorim, M.D., Eds.; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2017. [Google Scholar]
- Li, H.; Dan, G.; Nahrstedt, K. Portunes+: Privacy-Preserving Fast Authentication for Dynamic Electric Vehicle Charging. IEEE Trans. Smart Grid 2017, 8, 2305–2313. [Google Scholar] [CrossRef]
- Sarieddine, K.; Sayed, M.A.; Torabi, S.; Atallah, R.; Assi, C. Edge-Based Detection and Localization of Adversarial Oscillatory Load Attacks Orchestrated by Compromised EV Charging Stations. Int. J. Electr. Power Energy Syst. 2024, 156, 109735. [Google Scholar] [CrossRef]
- Peng, X.; Duan, S.; Sankavaram, C.; Jin, X. Unsupervised Adaptive Fleet Battery Pack Fault Detection with Concept Drift under Evolving Environment. IEEE Trans. Autom. Sci. Eng. 2024, 21, 2276–2288. [Google Scholar] [CrossRef]
- Kern, D.; Krauß, C. Analysis of E-Mobility-Based Threats to Power Grid Resilience. In Proceedings of the 5th ACM Computer Science in Cars Symposium, Ingolstadt, Germany, 30 November 2021; Spencer, S.N., Ed.; Association for Computing Machinery Inc.: New York, NY, USA, 2021. [Google Scholar]
- Lin, Z.; Li, J. FedEVCP: Federated Learning-Based Anomalies Detection for Electric Vehicle Charging Pile. Comput. J. 2024, 67, 1521–1530. [Google Scholar] [CrossRef]
- Rinaldi, S.; Depari, A.; Ferrari, P.; Flammini, A.; Mondini, E.; Pasetti, M.; Sisinni, E. An Evaluation of UWB for Location-Based Hands-Free Authentication Charging of Electric Vehicles. In Proceedings of the 2022 IEEE 31st International Symposium on Industrial Electronics (ISIE), Anchorage, AK, USA, 1–3 June 2022; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2022; pp. 696–701. [Google Scholar]
- Gabay, D.; Cebe, M.; Akkaya, K. Poster: On the Overhead of Using Zero-Knowledge Proofs for Electric Vehicle Authentication. In Proceedings of the WiSec’19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Miami, FL, USA, 15–17 May 2019; Association for Computing Machinery, Inc.: New York, NY, USA, 2019; pp. 347–348. [Google Scholar]
- Wei, F.; Lin, X. Cyber-Physical Attack Launched from EVSE Botnet. IEEE Trans. Power Syst. 2024, 39, 3603–3614. [Google Scholar] [CrossRef]
- Sureshkumar, V.; Chinnaraj, P.; Saravanan, P.; Amin, R.; Rodrigues, J.J.P.C. Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment with FPGA Implementation. IEEE Trans. Veh. Technol. 2022, 71, 3470–3479. [Google Scholar] [CrossRef]
- Zhang, L.; Zhu, Y.; Ren, W.; Wang, Y.; Choo, K.-K.R.; Xiong, N.N. An Energy-Efficient Authentication Scheme Based on Chebyshev Chaotic Map for Smart Grid Environments. IEEE Internet Things J. 2021, 8, 17120–17130. [Google Scholar] [CrossRef]
- Mavikumbure, H.S.; Cobilean, V.; Wickramasinghe, C.S.; Phillips, T.; Varghese, B.J.; Carlson, B.; Rieger, C.; Pennington, T.; Manic, M. Physical Anomaly Detection in EV Charging Stations: Physics-Based vs. ResNet AE. In Proceedings of the 2023 IEEE 32nd International Symposium on Industrial Electronics (ISIE), Helsinki, Finland, 19–21 June 2023; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2023. [Google Scholar]
- Linnartz, P.; Winkens, A.; Ulbig, A. Analysis of Malicious Operation of Electric Vehicle CHARGING stations to Disrupt Stable Operation of Distribution Grids. In Proceedings of the CIRED Porto Workshop 2022: E-Mobility and Power Distribution Systems, Porto, Portugal, 2–3 June 2022; Institution of Engineering and Technology: Stevenage, UK, 2022; Volume 2022, pp. 990–994. [Google Scholar]
- Babu, P.R.; Amin, R.; Reddy, A.G.; Das, A.K.; Susilo, W.; Park, Y. Robust Authentication Protocol for Dynamic Charging System of Electric Vehicles. IEEE Trans. Veh. Technol. 2021, 70, 11338–11351. [Google Scholar] [CrossRef]
- Soares, A.A.Z.; Mattos, D.M.F.; Lopes, Y.; Medeiros, D.S.V.; Fernandes, N.C.; Muchaluat-Saade, D.C. An Efficient Authentication Mechanism Based on Software-Defined Networks for Electric Vehicles. In Proceedings of the 2019 IEEE 28th International Symposium on Industrial Electronics (ISIE), Vancouver, BC, Canada, 12–14 June 2019; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2019; pp. 2471–2476. [Google Scholar]
- Kern, D.; Krauß, C.; Hollick, M. Detection of Anomalies in Electric Vehicle Charging Sessions. In Proceedings of the 39th Annual Computer Security Applications Conference, Austin, TX, USA, 4–8 December 2023; Association for Computing Machinery: New York, NY, USA, 2023; pp. 298–309. [Google Scholar]
- Kilic, A. TLS-Handshake for Plug and Charge in Vehicular Communications. Comput. Networks 2024, 243, 110281. [Google Scholar] [CrossRef]
- Kilari, V.T.; Yu, R.; Misra, S.; Xue, G. Robust Revocable Anonymous Authentication for Vehicle to Grid Communications. IEEE Trans. Intell. Transp. Syst. 2020, 21, 4845–4857. [Google Scholar] [CrossRef]
- Khan, O.G.M.; Elghitani, F.; Youssef, A.; Salama, M.; El-Saadany, E.F. Real-Time Congestion-Aware Charging Station Assignment Model for EVs. IEEE Internet Things J. 2024, 11, 11723–11736. [Google Scholar] [CrossRef]
- Akbarian, A.; Bahrami, M.; Vakilian, M.; Lehtonen, M. Vulnerability of EV Charging Stations to Cyber Attacks Manipulating Prices. In Proceedings of the 2023 International Conference on Future Energy Solutions (FES), Vaasa, Finland, 12–14 June 2023; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2023. [Google Scholar]
- Nguyen, T.-V.; Sun, H.; Wang, H.; Hu, R.Q. Authentication and PHY-Security Schemes for Electric Vehicle Dynamic Wireless Charging. IEEE Trans. Veh. Technol. 2024, 73, 1698–1712. [Google Scholar] [CrossRef]
- Afrin, S.; Kwasinski, A. A Privacy-Preserving Method with Flexible Charging Schedules for Electric Vehicles in the Smart Grid. In Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Bhubaneswar, India, 17–20 December 2017; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2018; pp. 1–6. [Google Scholar]
- Yazdanipour, S.; Arani, M.F.M.; Jahromi, A.A. Investigating Cyberattacks Against Off-Grid Solar-Powered Electric Vehicle Charging Stations. In Proceedings of the 2024 IEEE/PES Transmission and Distribution Conference and Exposition (T&D), Anaheim, CA, USA, 6–9 May 2024; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2024. [Google Scholar]
- ISO 15118-20:2022(En); Road Vehicles—Vehicle to Grid Communication Interface—Part 20: 2nd Generation Network Layer and Application Layer Requirements. International Organization for Standardization. International Electrotechnical Commission: Geneva, Switzerland, 2022. Available online: https://www.iso.org/obp/ui/en/#iso:std:iso:15118:-20:ed-1:v1:en (accessed on 1 September 2025).
- Plappert, C.; Jäger, L.; Irrgang, A.; Potluri, C. Secure Multi-User Contract Certificate Management for ISO 15118-20 Using Hardware Identities. In Proceedings of the 18th International Conference on Availability, Reliability and Security, Benevento, Italy, 29 August–1 September 2023; Association for Computing Machinery: New York, NY, USA, 2023. [Google Scholar]
- Yang, Y.; Li, J. Electric Vehicle Charging Anomaly Detection Method Based on Multivariate Gaussian Distribution Model. In Proceedings of the 2022 Asia Conference on Electrical, Power and Computer Engineering, Shanghai, China, 22–24 April 2022; Association for Computing Machinery: New York, NY, USA, 2022. [Google Scholar]
- Fattahi, J. A Federated Byzantine Agreement Model to Operate Offline Electric Vehicle Supply Equipment. IEEE Trans. Smart Grid 2024, 15, 2004–2016. [Google Scholar] [CrossRef]
- Jahangir, H.; Lakshminarayana, S.; Poor, H.V. Charge Manipulation Attacks Against Smart Electric Vehicle Charging Stations and Deep Learning-Based Detection Mechanisms. IEEE Trans. Smart Grid 2024, 15, 5182–5194. [Google Scholar] [CrossRef]
- Kapassa, E.; Themistocleous, M.; Christodoulou, K.; Iosif, E. Blockchain Application in Internet of Vehicles: Challenges, Contributions and Current Limitations. Future Internet 2021, 13, 313. [Google Scholar] [CrossRef]
- Chen, C.-M.; Hao, Y.; Wu, T.-Y. Discussion of “Ultra Super Fast Authentication Protocol for Electric Vehicle Charging Using Extended Chaotic Maps” . IEEE Trans. Ind. Appl. 2023, 59, 2091–2092. [Google Scholar] [CrossRef]
- Eghtessad, S.; Hasanli, T.; Huynh, R.; Workneh, K.; Ibrahem, M.I.; Fouda, M.M. A Survey on Privacy Preservation Methods in Future Vehicular Networks. In Proceedings of the 2023 11th International Conference on Information and Communication Technology (ICoICT), Melaka, Malaysia, 23–24 August 2023; IEEE: Washington, DC, USA, 2023; pp. 319–325. [Google Scholar]
- Van Den Brink, H. The Need for Cybersecurity within the Electric Vehicle Infrastructure. In Proceedings of the EVS—International Electric Vehicle Symposium and Exhibition, Stuttgart, Germany, 9–11 October 2017; Landesmesse Stuttgart GmbH: Stuttgart, Germany, 2017. [Google Scholar]
- Albanese, E.; Terruggia, R. Secure and Resilient Iot and Cloud-Based Infrastructure for Electric Vehicles Recharge Systems. IET Conf. Proc. 2023, 2023, 2059–2063. [Google Scholar] [CrossRef]
- Bourass, A.; Cherkaoui, S.; Khoukhi, L. Secure Communication Scheme for Electric Vehicles in the Smart Grid. In Proceedings of the GLOBECOM 2017—2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; IEEE: Washington, DC, USA, 2017; pp. 1–5. [Google Scholar]
- Kern, D.; Krauß, C.; Hollick, M. Attack Analysis and Detection for the Combined Electric Vehicle Charging and Power Grid Domains. In Proceedings of the 19th International Conference on Availability, Reliability and Security, Vienna, Austria, 30 July–2 August 2024; Association for Computing Machinery: New York, NY, USA, 2024. [Google Scholar]
- Girdhar, M.; Hong, J.; Lee, H.; Song, T.-J. Hidden Markov Models-Based Anomaly Correlations for the Cyber-Physical Security of EV Charging Stations. IEEE Trans. Smart Grid 2022, 13, 3903–3914. [Google Scholar] [CrossRef]
- Patel, T.; Jhaveri, R.H.; Sidana, S.; Benedetto, F. Empowering Energy Transition: Detecting Cyber Threats in EV Charging Infrastructure through ML and XAI Analysis. In Proceedings of the 2024 International Conference on Sustainable Energy: Energy Transition and Net-Zero Climate Future (ICUE), Pattaya City, Thailand, 21–23 October 2024; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2024. [Google Scholar]
- Garg, S.; Kaur, K.; Kaddoum, G.; Gagnon, F.; Rodrigues, J.J.P.C. An Efficient Blockchain-Based Hierarchical Authentication Mechanism for Energy Trading in V2G Environment. In Proceedings of the 2019 IEEE International Conference on Communications Workshops (ICC Workshops), Shanghai, China, 20–24 May 2019; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2019. [Google Scholar]
- Streubel, T.; Kattmann, C.; Eisenmann, A.; Rudion, K. Detection and Monitoring of Supraharmonic Anomalies of an Electric Vehicle Charging Station. In Proceedings of the 2019 IEEE Milan PowerTech, Milan, Italy, 23–27 June 2019; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2019. [Google Scholar]
- Li, M.; Ni, M.; Tong, H.; Ru, Y.; Xu, J.; Wu, Y. Risk Analysis of Electric Vehicles Connected to the Cyber-Physical Power System. In Proceedings of the 2021 IEEE Sustainable Power and Energy Conference (iSPEC), Nanjing, China, 23–25 December 2021; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2021; pp. 4203–4208. [Google Scholar]
- Sarieddine, K.; Sayed, M.A.; Torabi, S.; Attallah, R.; Jafarigiv, D.; Assi, C.; Debbabi, M. Uncovering Covert Attacks on EV Charging Infrastructure: How OCPP Backend Vulnerabilities Could Compromise Your System. In Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, Singapore, 1–5 July 2024; Association for Computing Machinery, Inc.: New York, NY, USA, 2024; pp. 987–999. [Google Scholar]
- Li, P.; Ou, W.; Liang, H.; Han, W.; Zhang, Q.; Zeng, G. A Zero Trust and Blockchain-Based Defense Model for Smart Electric Vehicle Chargers. J. Netw. Comput. Appl. 2023, 213, 103599. [Google Scholar] [CrossRef]
- Sayed, M.A.; Atallah, R.; Assi, C.; Debbabi, M. Electric Vehicle Attack Impact on Power Grid Operation. Int. J. Electr. Power Energy Syst. 2022, 137, 107784. [Google Scholar] [CrossRef]
- Yang, F.; Yang, Y.; Wang, X.; Ouyang, X.; Shuai, C. Electric Bikes Charging Anomaly Detection from Alternating Current Side Based on Big Data. Eng. Appl. Artif. Intell. 2024, 136, 109042. [Google Scholar] [CrossRef]
- Nisar, F.; Ramachandran, G.; Vilathgamuva, M.; Jurdak, R. Manipulation of Actual Demand in Electric Vehicles (MaD EV): A Cyber-Security Perspective. In Proceedings of the 2022 IEEE 7th Southern Power Electronics Conference (SPEC), Nadi, Fiji, 5–8 December 2022; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2022. [Google Scholar]
- ElGhanam, E.; Ahmed, I.; Hassan, M.; Osman, A. Authentication and Billing for Dynamic Wireless EV Charging in an Internet of Electric Vehicles. Futur. Internet 2021, 13, 257. [Google Scholar] [CrossRef]
- Rahman, S.; Aburub, H.; Mekonnen, Y.; Sarwat, A.I. A Study of EV BMS Cyber Security Based on Neural Network SOC Prediction. In Proceedings of the 2018 IEEE/PES Transmission and Distribution Conference and Exposition (T&D), Denver, CO, USA, 16–19 April 2018; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2018. [Google Scholar]
- Bourass, A.; Cherkaoui, S.; Khoukhi, L. Secure Optimal Itinerary Planning for Electric Vehicles in the Smart Grid. IEEE Trans. Ind. Inf. 2017, 13, 3236–3245. [Google Scholar] [CrossRef]
- Girdhar, M.; Hong, J.; Yoo, Y.; Song, T.-J. Machine Learning-Enabled Cyber Attack Prediction and Mitigation for EV Charging Stations. In Proceedings of the 2022 IEEE Power & Energy Society General Meeting (PESGM), Denver, CO, USA, 17–21 July 2022; IEEE Computer Society: Washington, DC, USA, 2022. [Google Scholar]
- Kilic, A. Plug and Charge Solutions with Vehicle-to-Grid Communication. Electr. Power Comp. Syst. 2023, 51, 1786–1814. [Google Scholar] [CrossRef]
- Mookherji, S.; Odelu, V.; Prasath, R. Secure Ultra Fast Authentication Protocol for Electric Vehicle Charging. Comput. Electr Eng. 2024, 119, 109512. [Google Scholar] [CrossRef]
- Xu, J.; Yu, X.; Tian, L.; Wang, J.; Zhou, L.; Liu, C. A Lightweight Security Authentication Method for the Charging Protocol of Smart Charging Pile. In Proceedings of the 2020 International Conference on Aviation Safety and Information Technology, Weihai, China, 14–16 October 2020; Association for Computing Machinery: New York, NY, USA, 2020; pp. 376–382. [Google Scholar]
- Shao, H.; Ma, Y.; Shao, B. A Lightweight Privacy-Preserving Authentication Scheme for Vehicle-to-Grid. In Proceedings of the 2024 6th Asia Energy and Electrical Engineering Symposium (AEEES), Chengdu, China, 28–31 March 2024; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2024; pp. 278–282. [Google Scholar]
- Singh, N.; Agarwal, R. Intrusion Detection System for Smart Vehicles Using Machine Learning Algorithms. In Proceedings of the 2023 International Conference on Communication, Security and Artificial Intelligence (ICCSAI), Greater Noida, India, 23–25 November 2023; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2023; pp. 749–753. [Google Scholar]
- Kaur, K.; Kaddoum, G.; Zeadally, S. Blockchain-Based Cyber-Physical Security for Electrical Vehicle Aided Smart Grid Ecosystem. IEEE Trans. Intell. Transp. Syst. 2021, 22, 5178–5189. [Google Scholar] [CrossRef]
- Tiwari, P.; Ronanki, D. Cyber-Resilient Grid-Interactive Renewable Powered Wireless Charging of Electric Vehicles. In Proceedings of the 2022 IEEE International Conference on Power Electronics, Drives and Energy Systems (PEDES), Jaipur, India, 14–17 December 2022; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2022. [Google Scholar]
- Liu, Y.; Ardakanian, O.; Nikolaidis, I.; Liang, H. False Data Injection Attacks on Smart Grid Voltage Regulation with Stochastic Communication Model. IEEE Trans. Ind. Inf. 2023, 19, 7122–7132. [Google Scholar] [CrossRef]
- Gandhi, K.; Morsi, W.G. Impact of the Open Charge Point Protocol Between the Electric Vehicle and the Fast Charging Station on the Cybersecurity of the Smart Grid. In Proceedings of the 2022 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Halifax, NS, Canada, 18–20 September 2022; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2022; pp. 235–240. [Google Scholar]
- Sayed, N.E. A Prototypical Implementation of an ISO-15118-Based Wireless Vehicle to Grid Communication for Authentication over Decoupled Technologies. In Proceedings of the 2019 AEIT International Conference of Electrical and Electronic Technologies for Automotive (AEIT AUTOMOTIVE), Turin, Italy, 2–4 July 2019; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2019. [Google Scholar]
- Wang, W.; Han, Z.; Alazab, M.; Gadekallu, T.R.; Zhou, X.; Su, C. Ultra Super Fast Authentication Protocol for Electric Vehicle Charging Using Extended Chaotic Maps. IEEE Trans. Ind. Appl. 2022, 58, 5616–5623. [Google Scholar] [CrossRef]
- Alshaeri, A.; Younis, M. A Blockchain-Based Energy Trading Scheme for Dynamic Charging of Electric Vehicles. In Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM), Madrid, Spain, 7–11 December 2021. [Google Scholar]
- Roman, L.F.A.; Gondim, P.R.L.; Lloret, J. Pairing-Based Authentication Protocol for V2G Networks in Smart Grid. Ad Hoc Netw. 2019, 90, 101745. [Google Scholar] [CrossRef]
- Mohammadi, M.; Mohasefi, J.B. Availability-Based and Risk-Less Optimization Model for Electric Vehicles Optimal Itinerary Planning in Smart Grid. Sustain. Energy Grids Netw. 2022, 30, 100642. [Google Scholar] [CrossRef]
- Grgic, D.; Podobnik, V.; Capuder, T. EV Charging Station Monitoring Framework—A Case Study of Croatia: Performance Analysis and Anomaly Detection under Pandemic Situation. Int. J. Electr. Power Energy Syst. 2022, 141, 108095. [Google Scholar] [CrossRef]
- Yang, B.; Guo, L.; Ye, J. Physics-Based Attack Detection for Traction Motor Drives in Electric Vehicles Using Random Forest. In Proceedings of the 2021 IEEE Applied Power Electronics Conference and Exposition (APEC), Phoenix, AZ, USA, 14–17 June 2021; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2021; pp. 849–854. [Google Scholar]
- Sayed, M.A.; Ghafouri, M.; Debbabi, M.; Assi, C. Dynamic Load Altering EV Attacks Against Power Grid Frequency Control. In Proceedings of the 2022 IEEE Power & Energy Society General Meeting (PESGM), Denver, CO, USA, 17–21 July 2022; IEEE Computer Society: Washington, DC, USA, 2022. [Google Scholar]
- Yazdanipour, S.; Oruganti, V.S.R.V.; Son, J.; Arani, M.F.M.; Williamson, S.S. State-of-the-Art in Cyber-Physical Security for Dynamic Wireless Charging of Electric Vehicles. In Proceedings of the IECON 2024—50th Annual Conference of the IEEE Industrial Electronics Society, Chicago, IL, USA, 3–6 November 2024; IEEE Computer Society: Washington, DC, USA, 2024. [Google Scholar]
- Parameswarath, R.P.; Gope, P.; Sikdar, B. A Privacy-Preserving Authenticated Key Exchange Protocol for V2G Communications Using SSI. IEEE Trans. Veh. Technol. 2023, 72, 14771–14786. [Google Scholar] [CrossRef]
- Babu, P.R.; Reddy, A.G.; Palaniswamy, B.; Das, A.K. EV-PUF: Lightweight Security Protocol for Dynamic Charging System of Electric Vehicles Using Physical Unclonable Functions. IEEE Trans. Netw. Sci. Eng. 2022, 9, 3791–3807. [Google Scholar] [CrossRef]
- Zhao, X.; Lin, J.; Li, H. Privacy-Preserving Billing Scheme against Free-Riders for Wireless Charging Electric Vehicles. Mob. Inf. Syst. 2017, 2017, 1–9. [Google Scholar] [CrossRef]
- Hussain, R.; Son, J.; Kim, D.; Nogueira, M.; Oh, H.; Tokuta, A.O.; Seo, J. PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability. Wirel. Commun. Mob. Comput. 2017, 2017. [Google Scholar] [CrossRef]
- Małek, A.; Kośko, M.; Łusiak, T. Urban Logistics of Small Electric Vehicle Charged from a Photovoltaic Carport. Arch. Automot. Eng. Arch. Motoryz. 2018, 82, 63–75. [Google Scholar] [CrossRef]
- Małek, A.; Taccani, R. Long-Term Test of an Electric Vehicle Charged from a Photovoltaic Carport. Arch. Automot. Eng. Arch. Motoryz. 2019, 86, 55–63. [Google Scholar] [CrossRef]
- Li, M.; Xu, H.; Xu, J.; Ding, Z.; Liu, Q.; Yin, Z. Risk Assessment of Cyber Physical Power System Considering Attack Model. In Proceedings of the 2022 IEEE 5th International Electrical and Energy Conference (CIEEC), Nanjing, China, 27–29 May 2022. [Google Scholar]
- Team, P.M. EV Cybersecurity & ISO 15118 for Secure Charging Infrastructure. PlaxidityX. 29 May 2025. Available online: https://plaxidityx.com/blog/blog-post/iso-15118-ev-cybersecurity-guide/ (accessed on 1 September 2025).
- Driivz. Glossary: ISO 15118. Available online: https://driivz.com/glossary/iso-15118/ (accessed on 1 September 2025).
- Zhou, M. Anomaly Detection in Smart Distribution Grids with Deep Neural Network. Master’s Thesis, University of Alberta, Edmonton, AB, Canada, 2022. [Google Scholar]
- Explainable Anomaly Detection for Electric Vehicles Charging Stations. Available online: https://arxiv.org/html/2507.15718v1 (accessed on 1 September 2025).
- Stress Testing by Large Financial Institutions: Current Practice and Aggregation Issues; BIS: Basel, Switzerland, 2000; ISBN 978-92-9131-601-4.
- European Central Bank. Stress Testing with Multiple Scenarios: A Tale on Tails and Reverse Stress Scenarios; Publications Office: Luxembourg, 2024. [Google Scholar]
- Grid Operators: TSO and DSO Explained—gridX. Available online: https://www.gridx.ai/knowledge/what-is-a-grid-operator (accessed on 1 September 2025).
- CORPORATIVA, I. DSO, ¿cómo Transformar La Gestión de Redes Hacia Un Modelo Más Inteligente? Available online: https://www.iberdrola.com/about-us/our-innovation-model/distribution-system-operation (accessed on 1 September 2025).
- Complete Guide to EV Charging Protocols (OCPP, OICP, OHCP). Available online: https://solidstudio.io/blog/ev-charging-protocols (accessed on 1 September 2025).
- Coppoletta, G.; Gjomemo, R.; Kaur, A.; Valizadeh, N.; Rana, O.; Venkatakrishnan, V. OCPPStorm: A Comprehensive Fuzzing Tool for OCPP Implementations. In Proceedings of the Symposium on Vehicle Security & Privacy, San Diego, CA, USA, 26 February 2024; Internet Society: San Diego, CA, USA, 2024. [Google Scholar]
- How to Increase Charging Session Money Collection and EV Driver Satisfaction with AMPECO Data Validation Feature. Available online: https://www.ampeco.com/blog/ampeco-session-data-validation-feature/ (accessed on 1 September 2025).
- Unlocking the Future: How UWB Is Reshaping Secure Access in the Connected World. Available online: https://www.qorvo.com/design-hub/blog/unlocking-the-future-how-uwb-is-reshaping-secure-access-in-the-connected-world (accessed on 1 September 2025).
- Stevens, B. Implementing Secure Boot with a Root of Trust; Semiconductor Engineering: Silicon Valley, CA, USA, 2021. [Google Scholar]
- Secure Boot—Silicon Labs. Available online: https://www.silabs.com/security/secure-boot (accessed on 1 September 2025).
- Position Papers & Regulation—CharIN. Available online: https://www.charin.global/technology/knowledge-base/ (accessed on 1 September 2025).
Interface | Protocols | Trust Anchors/Credentials | Common Threats | Recommended Controls |
---|---|---|---|---|
EV ↔ EVSE | ISO 15118-2/ISO 15118-20 (Plug & Charge, Smart Charging, V2G) | EV contract certificates, EVSE station certificates, PKI root CAs | Impersonation of EV/EVSE, MITM during handshake, expired certificates, renegotiation failures | PKI validation with OCSP checks, strict TLS, lifecycle management of certificates, ISO 15118-20 diagnostic/security extensions |
EVSE ↔ CSMS | OCPP 2.0.1 (JSON over WebSocket, Device Model, TransactionEvent) | TLS certificates (per OCPP security profiles), signed firmware keys | MITM on OCPP channels, malicious firmware, manipulation of transaction records, key compromise | OCPP Security Profiles, signed firmware validation, Security Event Log, certificate lifecycle management (15,118 workflows) |
CSMS ↔ Market/Grid/Roaming | Today: OCPP-based APIs; Emerging: IEC 63110 (charging management), IEC 63119 (roaming) | Operator-issued PKI credentials, roaming contracts, TLS channel certificates | Interoperability failures, weak inter-operator security, inconsistent telemetry, replay attacks | Strong TLS with mutual authentication, harmonization with IEC 63110/63119, monitoring aligned with IEC 62351-7 |
Algorithm Type | Example Applications | Selected Sources |
---|---|---|
Linear and polynomial regression | Forecasting energy consumption, optimizing charging schedules | [4,32] |
Neural networks (ANN, DNN) | Prediction of energy demand, adaptive control of charging power | [20,36,45] |
Decision Trees, Random Forest, Gradient Boosting | Identification of key features affecting energy consumption, detection of unusual charging patterns | [36,42] |
Support vector machines (SVM) | Classification of charging patterns, prediction of peak hours, assessment of overload risk | [37,43] |
Unsupervised learning (k-means, t-SNE, PCA) | Segmentation of charging station users, dimensionality reduction of telemetry data | [11,32] |
Federated learning | Privacy-preserving anomaly detection, distributed predictive models | [16,19] |
Generative Adversarial Networks (GANs) | Synthesizing energy data, detecting rare anomalies, testing model robustness | [2,32] |
Hybrid systems (SVM + fuzzy logic) | Complex demand modeling, network congestion prediction | [8,14] |
Application Area | Objective/Function | Applied ML Algorithms | Example Publications |
---|---|---|---|
Electric vehicle charging management | Charging optimization, demand forecasting, dynamic pricing | Artificial Neural Networks, Support Vector Machines, K-Nearest Neighbors | [3,8,112] |
In-vehicle energy management | Battery usage optimization, load prediction, BMS control | Decision Trees, Gradient Boosting, Recurrent Neural Networks | [3,6,9] |
User and data security | Anomaly detection, access control, privacy protection | Autoencoders, Isolation Forest, Federated Learning | [4,8,113] |
Grid integration | Power flow control, availability prediction, grid balancing | Long Short-Term Memory, Ensemble Learning, Deep Reinforcement Learning | [5,7,10] |
Vehicle communication systems | V2X protocol optimization, transmission efficiency, interference detection | Bayesian Networks, Convolutional Neural Networks, Random Forest | [1,11,22] |
Name | 2017–2020 | 2021–2024 | All Years | Share [%] | Chi–Square |
---|---|---|---|---|---|
Total | 26 | 76 | 102 | 100.0 | |
Document Type | |||||
Conference Paper | 15 | 37 | 52 | 50.98 | χ2 = 1.16 (df = 2, p = 0.56) |
Article | 11 | 37 | 48 | 47.06 | |
Other | 0 | 2 | 2 | 1.96 | |
Cybersecurity | |||||
Authentication and Cryptography | 21 | 27 | 48 | 47.06 | χ2 = 12.38 (df = 3, p = 0.01) |
Cyber Attacks | 6 | 35 | 41 | 40.2 | |
Intrusion and Anomaly Detection | 3 | 19 | 22 | 21.57 | |
Blockchain | 3 | 11 | 14 | 13.73 | |
Technologies and Infrastructure | |||||
Vehicle Charging | 21 | 63 | 84 | 82.35 | χ2 = 1.62 (df = 2, p = 0.45) |
Grid Integration | 16 | 35 | 51 | 50.0 | |
Vehicle Systems | 7 | 29 | 36 | 35.29 | |
Research Methodology | |||||
Experiment | 15 | 46 | 61 | 59.8 | χ2 = 3.74 (df = 3, p = 0.29) |
Literature Analysis | 6 | 26 | 32 | 31.37 | |
Case Study | 0 | 7 | 7 | 6.86 | |
Conceptual | 20 | 48 | 68 | 66.67 |
Country | 2017–2020 | 2021–2024 | All Years | Share [%] | Chi–Square |
---|---|---|---|---|---|
All countries | 26 | 76 | 102 | 100.0 | 26.1 |
United States | 11 | 22 | 33 | 32.35 | |
China | 2 | 17 | 19 | 18.63 | |
Canada | 5 | 13 | 18 | 17.65 | |
Germany | 5 | 6 | 11 | 10.78 | |
India | 0 | 10 | 10 | 9.8 | |
Australia | 0 | 5 | 5 | 4.9 | |
Italy | 1 | 4 | 5 | 4.9 | |
United Kingdom | 0 | 5 | 5 | 4.9 | |
Brazil | 4 | 0 | 4 | 3.92 | |
South Korea | 1 | 3 | 4 | 3.92 | |
Turkey | 0 | 4 | 4 | 3.92 | |
Other | 3 | 8 | 11 | 10.78 |
Name | Authentication and Cryptography | Cyber Attacks | Intrusion and Anomaly Detection | Blockchain | Total |
---|---|---|---|---|---|
Total | 48 | 41 | 22 | 14 | 102 |
Technologies and Infrastructure | |||||
Vehicle Charging | 41 | 32 | 18 | 9 | 84 |
Grid Integration | 25 | 23 | 9 | 6 | 51 |
Vehicle Systems | 15 | 16 | 8 | 8 | 36 |
Research Methodology | |||||
Experiment | 30 | 27 | 13 | 9 | 61 |
Literature Analysis | 14 | 14 | 5 | 2 | 32 |
Case Study | 0 | 4 | 3 | 0 | 7 |
Conceptual | 37 | 23 | 14 | 12 | 68 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pawlik, L.; Wilk-Jakubowski, J.L.; Grabski, P.T.; Wilk-Jakubowski, G. Securing the Electrified Future: A Systematic Review of Cyber Attacks, Intrusion and Anomaly Detection, and Authentication in Electric Vehicle Charging Infrastructure. Energies 2025, 18, 4847. https://doi.org/10.3390/en18184847
Pawlik L, Wilk-Jakubowski JL, Grabski PT, Wilk-Jakubowski G. Securing the Electrified Future: A Systematic Review of Cyber Attacks, Intrusion and Anomaly Detection, and Authentication in Electric Vehicle Charging Infrastructure. Energies. 2025; 18(18):4847. https://doi.org/10.3390/en18184847
Chicago/Turabian StylePawlik, Lukasz, Jacek Lukasz Wilk-Jakubowski, Pawel Tomasz Grabski, and Grzegorz Wilk-Jakubowski. 2025. "Securing the Electrified Future: A Systematic Review of Cyber Attacks, Intrusion and Anomaly Detection, and Authentication in Electric Vehicle Charging Infrastructure" Energies 18, no. 18: 4847. https://doi.org/10.3390/en18184847
APA StylePawlik, L., Wilk-Jakubowski, J. L., Grabski, P. T., & Wilk-Jakubowski, G. (2025). Securing the Electrified Future: A Systematic Review of Cyber Attacks, Intrusion and Anomaly Detection, and Authentication in Electric Vehicle Charging Infrastructure. Energies, 18(18), 4847. https://doi.org/10.3390/en18184847