1. Introduction
The increasing global emphasis on sustainable and low-carbon transportation systems has significantly amplified the focus on electric vehicles (EVs), a phenomenon that is swiftly altering the dynamics of mobility and energy sectors [
1]. This transition is driven by pressing environmental needs, including the reduction in greenhouse gas emissions, the improvement of urban air quality, and the decreased reliance on fossil fuels [
2]. EVs, when powered by renewable energy sources, offer a promising avenue for achieving net-zero emissions within the transportation sector [
3]. However, as the adoption of EVs continues to rise, there is an essential requirement for a scalable, reliable, and intelligent charging infrastructure to accommodate the needs of millions of vehicles effectively.
This infrastructure must not only ensure the efficient delivery of energy but also protect the integrity, confidentiality, and availability of its services amidst the growing challenges posed by cybersecurity threats. Modern electric vehicle charging stations (EVCS) have transcended their previous status as isolated hardware units, evolving into advanced cyber–physical systems that function within the expansive Internet of Vehicles (IoV) framework [
4]. These systems utilize bidirectional energy flow, including vehicle-to-grid (V2G) technology, cloud-based analytics, and advanced wireless communication technologies such as 5G and emerging 6G networks, to facilitate real-time interaction with grid operators, EV owners, and third-party service providers [
5,
6]. Although these technological advancements significantly enhance the functionality, interoperability, and user experience of EVCS, they concurrently render the infrastructure susceptible to intricate and potentially severe cyber–physical vulnerabilities.
There is an increasing body of evidence indicating the heightened vulnerability of EVCS to malicious cyber activities [
7]. Attacks such as spoofing [
8], false data injection [
9], man-in-the-middle (MitM) [
10], ransomware [
11], denial-of-service (DoS) [
12], and firmware tampering [
13] have demonstrated the capacity to compromise charging session integrity, mislead grid operators, extract sensitive consumer data, and even destabilize local energy distribution networks [
14,
15]. The integration of EVs into the power grid via V2G considerably broadens the potential attack surface, which can compromise charging session integrity, mislead grid operators, extract sensitive consumer data, or destabilize local energy networks [
16].
In 5G/6G environments, the inherent risks are intensified by features such as ultra-low latency, high device density, and distributed edge computing. These characteristics necessitate the development and deployment of advanced and adaptive security mechanisms to effectively address the associated challenges [
17]. In the face of these emerging challenges, Digital Twin (DT) technology has emerged as a transformative concept with the potential to redefine cybersecurity approaches within cyber–physical infrastructures such as EVCS. A DT is a high-fidelity, real-time virtual model of a physical system that maintains synchronization with its physical counterpart through continuous data exchange, as illustrated in
Figure 1 [
18].
Originally developed for applications in aerospace and manufacturing, DTs are now being reconceptualized for the protection of critical infrastructure. Recent studies show DTs’ real-world impact on securing EVCS. Coppolino et al. [
19] used FIWARE and Security Information and Event Management (SIEM) tools in Kropa, Slovenia, to monitor a smart grid with EVCS, catching data tampering in real-time charging sessions, while authors in [
20] applied deep reinforcement learning to correct compromised EVCS control signals instantly. Similarly, Galkin et al. [
21] simulated Open Charge Point Protocol (OCPP)-based systems for virtual commissioning, spotting protocol vulnerabilities before deployment. These applications highlight DTs’ ability to enhance monitoring, detect anomalies, and test security measures in controlled environments. By facilitating continuous monitoring, anomaly detection, failure prediction, and control optimization, DTs can function as intelligent sentinels, actively safeguarding EVCS against both established and emerging threats [
22,
23].
When integrated into EVCS and enhanced with Artificial Intelligence (AI), blockchain-based integrity assurance, and quantum-resistant cryptography, DTs facilitate an unparalleled degree of situational awareness and operational resilience [
24]. For instance, conducting real-time analyses of anticipated versus actual system behaviors can identify anomalies that may signal zero-day attacks. Additionally, DTs can serve as experimental platforms for simulating attack scenarios and validating incident response strategies without jeopardizing the physical infrastructure [
25]. Despite the conceptual promise and early pilot implementations, the deployment of DTs in EVCS cybersecurity remains fragmented and underexplored. Existing research tends to focus on isolated domains such as cryptographic enhancements [
26], intrusion detection systems [
27], or communication protocol hardening without integrating these into a comprehensive, system-wide framework supported by DTs.
A significant gap persists in the literature regarding the intersection of DTs with established standards such as ISO 15118 [
28] and OCPP 2.0.1 [
29], as well as with the regulatory frameworks and technological ecosystems that govern EV charging infrastructure. Few studies have systematically examined how these elements can jointly strengthen EVCS security against both current and emerging cyber threats. This review addresses that gap by providing a comprehensive, multidisciplinary synthesis of DTs in EVCS cybersecurity. Whereas earlier studies have tended to isolate specific technologies or focus on narrow vulnerabilities, this work integrates technical, policy, ethical, and economic perspectives into a unified analysis of system resilience.
Unlike Aljohani and Almutairi [
14], whose 2024 survey examined protocol vulnerabilities without establishing linkages to DT synthesis or 5G/6G threat modeling, and unlike Qureshi et al. [
26], and Mun et al. [
30], whose 2025 reviews addressed DTs in manufacturing and other critical infrastructure settings without incorporating EVCS-specific integration or cyber–physical risk considerations, this framework adopts a holistic approach. It presents a structured DT architecture, validates it through real-world pilot studies [
31], and aligns it with pertinent international standards. The review’s distinctive contributions include systematic mapping of 5G/6G-driven cyber–physical risks in EVCS environments; a comprehensive evaluation of DT applications for real-time monitoring and attack simulation; and synthesis of actionable recommendations for scalable, standards-compliant DT frameworks that address persistent gaps in interoperability, data protection, and cost-effectiveness.
In summary, this review makes the following three major contributions:
Examines EVCS, emphasizing the advantages of 5G/6G connectivity while identifying new cyber–physical attack risks across control, communication, and power interfaces.
Outlines DTs’ applications for EVCS cybersecurity, covering real-time monitoring, anomaly detection, attack simulation, and predictive response, using AI, blockchain, and cryptography, and reviews case studies validating these approaches.
Evaluates cybersecurity standards (ISO 15118-20, OCPP 2.0.1, NIST IR 8356) for DTs’ deployment, highlighting gaps in interoperability, data protection, and cost-effectiveness, and suggests research priorities for scalable, resilient DT frameworks.
To provide readers with a clear overview of the paper’s structure and facilitate navigation through the complex topics covered, a roadmap figure is presented in
Figure 2, illustrating the flow of information from EVCS architecture and vulnerabilities through DT fundamentals, implementation strategies, standards compliance, and future research directions.
The review paper is organized to offer a thorough evaluation of Digital Twins (DTs) in augmenting the cybersecurity of Electric Vehicle Charging Stations (EVCS). It commences with an analysis of EVCS architecture and its cyber vulnerabilities, detailing components such as EVs, Charging Station Management Systems (CSMS), and grid interfaces, while emphasizing the advantages of 5G/6G technologies and the associated cybersecurity risks in both physical and communication layers. This is followed by an introduction to the foundational aspects of DTs for EVCS security, encompassing their structure, underlying technologies, and their role in replicating EVCS operations, alongside methodologies for real-time cybersecurity anomaly detection and attack simulation. The paper then investigates practical use cases and simulation tools for DT implementation, concentrating on applications such as monitoring, threat detection, firmware validation, and automated response, as well as simulation platforms for testing security in EVCS deployments.
Subsequently, it addresses standards, privacy, and deployment considerations, discussing policies, data privacy, encryption, regulatory compliance, and economic factors such as cost, integration, and interoperability that influence DT deployment. The paper also identifies research gaps and future directions, highlighting limitations in scaling and securing DTs for EVCS and advocating for further exploration into twin coordination with Vehicle-to-Grid (V2G) systems, real-time threat intelligence, and standardized frameworks. Finally, it concludes by summarizing the benefits of DTs for EVCS cybersecurity and providing practical recommendations for researchers, operators, and policymakers to ensure safe and scalable adoption.
Methodology
This review employs a systematic methodology to evaluate digital twin applications in EVCS cybersecurity within 5G/6G ecosystems. A three-phase approach was used:
Literature acquisition from Web of science, IEEE Xplore, Elsevier, and SpringerLink (2020–2025), yielding 284 relevant studies from 772 records.
Content analysis using a matrix framework to assess technological focus, EVCS layers, and cybersecurity functionalities.
Thematic synthesis to identify gaps and propose a digital twin framework. Search terms included “digital twin,” “EVCS cybersecurity,” and “5G/6G”.
Inclusion criteria prioritized peer-reviewed studies with technical depth, simulations, or regulatory insights. This entire process is summarized in a flow diagram in
Figure 3 below.
2. EV Charging Infrastructure and Threat Landscape in 5G/6G Environments
Modern EV charging ecosystems comprise four critical components: EVs, EVCS, Charging Station Management Systems (CSMS), and Grid Interfaces, each contributing to an interconnected and potentially vulnerable infrastructure, as shown in
Figure 4 [
32].
Electric Vehicles serve as highly sophisticated nodes with embedded subsystems such as Battery Management Systems (BMS), Telematics Control Units (TCUs), Infotainment Modules, and Over-the-Air (OTA) update capabilities [
33,
34]. These subsystems are integral to managing energy, ensuring connectivity, and facilitating user interaction. Nonetheless, they also introduce a range of cyber risks [
35]. BMS units, for example, utilize proprietary algorithms to optimize the process of charging and discharging. However, these systems may be vulnerable to exploitation if adequate authentication protocols are not implemented [
32].
Similarly, TCUs and infotainment systems establish continuous communication pathways with external networks, thereby heightening susceptibility to spoofing, data injection, and unauthorized access [
34]. Moreover, the integration of V2G systems supports the bidirectional flow of electricity, which requires stringent encryption and authentication protocols to protect against potential grid tampering [
32,
36].
EVCS have transitioned from merely serving as passive power dispensers to becoming sophisticated edge computing platforms. These platforms are now equipped with features such as contactless payment systems, dynamic load balancing, and cryptographic authentication [
37]. Nevertheless, the enhancement of their computational and communication abilities broadens the cyber–physical attack surface. Vulnerabilities in Plug and Charge (PnC) implementations, particularly those conforming to ISO 15118, have been observed due to inconsistent cryptographic enforcement across vendors [
38,
39]. Ultra-fast charging stations with integrated cooling systems and local energy storage further complicate the threat profile by incorporating additional sensors and control logic that require protection [
40]. CSMS platforms function as orchestration layers that manage authentication, billing, diagnostics, and energy optimization across a distributed network of EVCS [
41]. The implementation of a hybrid cloud-edge architecture within CSMS operations raises concerns regarding data synchronization, Application Programming Interface (API) integrity, and role-based access control [
42].
Furthermore, the integration with fleet management systems and third-party applications through open APIs heightens the risk of data breaches and subsequent service disruptions in the event of a security breach [
43]. Grid interface components, including smart transformers, advanced metering infrastructure (AMI), and virtual power plant (VPP) systems, enable bidirectional data and power flows between the grid and charging infrastructure [
44]. These components utilize real-time data analytics and communication protocols to optimize grid load management and implement demand response operations. Nevertheless, their digital interfaces render them susceptible to cyber threats, which, if exploited, could result in grid instability, energy theft, or extensive service disruptions. The integration of 5G and emerging 6G networks into EV charging infrastructure facilitates enhanced connectivity, increased bandwidth, and advanced computational intelligence. The concept of network slicing within 5G/6G technology allows for the logical separation of services, providing dedicated bandwidth and customized security policies [
45].
This approach enables the prioritization of essential services, such as authentication and energy management, while effectively segregating them from general-purpose traffic [
46]. Despite advancements, the implementation of slice-specific security protocols remains inconsistent among operators, thereby increasing the risk of cross-slice attacks. Multi-access Edge Computing (MEC) enhances the responsiveness and resilience of EVCS by relocating computation and analytics closer to the source of data generation [
47]. This approach mitigates latency and ensures operational continuity during instances of cloud disconnection. Nevertheless, the distributed architecture of MEC introduces novel trust boundaries, thereby necessitating advanced strategies for hardware protection, anomaly detection, and decentralized identity verification.
In densely populated urban environments, the scalability of MEC must be judiciously balanced with resource constraints that may limit security monitoring capabilities. The advent of 6G technologies, including Terahertz (THz) communication, integrated sensing, and centimeter-level positioning, is expected to further augment the precision and intelligence of EV charging operations [
46]. These technologies support applications ranging from immersive maintenance interfaces to real-time tamper detection.
However, they also introduce novel attack vectors, particularly at the physical layer, which will require new forms of lightweight cryptographic protection and adaptive security frameworks. The cyber–physical interface of EV charging infrastructure encompasses multiple communication layers and protocols. At the physical and transport layers, Controller Area Network (CAN) buses [
14,
48] and Automotive Ethernet [
49] are commonly used to transmit data within vehicles and between EVs and charging stations.
This supports real-time control, diagnostics, and power management functions. These protocols, while efficient, often lack robust security features such as encryption and mutual authentication, making them susceptible to spoofing, injection, and side-channel attacks. Middleware and application layer protocols such as Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), and Constrained Application Protocol (CoAP) enable structured messaging and efficient data exchange between charging system components and external platforms [
50,
51]. Protocols like Open Charge Point Protocol (OCPP) [
52] and ISO 15118 standardize the communication between EVCS and CSMS, offering features such as Transport Layer Security (TLS) encryption and certificate-based authentication [
53,
54,
55]. However, real-world deployments frequently suffer from implementation flaws such as certificate mismanagement and fallback to insecure versions, undermining their theoretical security guarantees.
In grid integration, protocols such as Open Automated Demand Response (OpenADR), IEC 61850, and IEEE 2030.5 enable energy-aware control of EVCS based on real-time grid conditions [
56,
57]. These standards support demand-side management, frequency regulation, and distributed energy resource coordination, but introduce complexity in parsing and execution, particularly on constrained edge devices. The interoperability of these protocols, while essential for seamless system operation, introduces attack surfaces if authentication and authorization procedures are inconsistently enforced across platforms [
41,
58,
59]. The infrastructure for EV charging is susceptible to a diverse array of threat vectors encompassing software, hardware, and human interfaces. DoS attacks [
60] can render chargers inoperable, potentially paralyzing fleets or critical infrastructure. MitM attacks [
39] target communication sessions to intercept or manipulate sensitive data, particularly in protocols lacking mutual TLS enforcement. Firmware manipulation, which includes actions such as false data injection, backdoor insertion, and update interception, poses a substantial risk of enduring compromise.
This threat is particularly acute in devices that do not incorporate secure boot protocols and integrity verification measures [
15]. User-facing components such as mobile applications, payment interfaces, and public display terminals are frequently targeted through social engineering and phishing campaigns [
5,
34]. Poor input validation and session handling in these systems can lead to data breaches and financial fraud [
48]. At the physical layer, cable tampering, connector spoofing, and device substitution can bypass digital protection if hardware integrity checks are absent or ineffective [
14]. As illustrated in
Figure 5, the EVCS threat landscape encompasses diverse vectors that extend across cyber, physical, and communication domains, with prevalent examples including spoofing, DoS, and firmware manipulation. Mapping these attack pathways to specific system components such as the EV, central system management server, grid interface, and communication protocols provides a structured basis for evaluating severity and likelihood, thereby enabling the prioritization of countermeasures within a layered defense strategy.
Table 1,
Table 2,
Table 3 and
Table 4 synthesize key studies on cyberattacks and countermeasures in EV charging infrastructure, highlighting authors, methodologies, and findings across distinct threat domains.
Table 1 presents solutions for authentication and privacy, tackling unauthorized access and man-in-the-middle attacks through techniques like blockchain, biometric authentication, and lightweight cryptography. These studies explore secure key establishments for V2G, energy harvesting in dynamic wireless charging, and bandwidth identification, all tailored to the constraints of EV charging systems, limited processing power, real-time operation, and bandwidth limitations. The novelty lies in customizing lightweight, privacy-preserving mechanisms to resist threats such as desynchronization, replay, and Sybil attacks within a constrained environment.
Table 2 focuses on AI- and ML-based intrusion detection systems that identify threats like denial-of-service and other cyber–physical anomalies. Approaches include deep neural networks, Long Short-Term Memory (LSTM) architecture, and edge-based detection of oscillatory load attacks. These systems analyze real-time system metrics to flag abnormal behavior and mitigate evolving threats. Notably, several studies incorporate complex datasets like CICEVCS2024 and apply transfer learning to improve adaptability across different EVCS contexts. The emphasis is on building smart, self-improving detection systems that keep pace with dynamic, cross-platform threat landscapes.
Table 3 explores blockchain technologies applied to EVCS, using frameworks such as Byzantine Fault Tolerance and Hyperledger Fabric to secure data integrity and transaction trust. These methods prevent fraud, false data injection, and man-in-the-middle attacks, supporting critical functions like payment processing and energy trading. By leveraging consortium blockchains and smart contracts, these studies address issues like double-spending, Sybil attacks, and congestion in decentralized networks. The innovation lies in adapting general blockchain principles to the specific operational and scalability demands of EV infrastructure.
Table 4 examines cyber–physical attacks and proposed mitigation strategies, including multi-layered authentication and Moving Target Defense. Studies analyze attacks exploiting public EVCS data, coordinated switching attempts, and vulnerabilities in EVCS management systems. Defenses include TCWGAN-based forecasting and multi-source control schemes to counter false data injection, malicious operating modes, and Distributed Denial-of-Service (DDoS) attacks.
The key contribution is in modeling complex and evolving attack vectors, such as time-varying DDoS, and embedding robust, EVCS-specific defenses into grid and V2G systems.
Comparative Evaluation of AI Models for EVCS Cybersecurity
The studies in
Table 2 leverage various AI models for intrusion and anomaly detection in EVCS, including Deep Neural Networks (DNN) [
68], Long Short-Term Memory (LSTM) [
92], Convolutional Neural Networks (CNN) [
93], and Generative Adversarial Networks (GAN) variants like GAN-Gated Recurrent Unit (GRU), GAN-LSTM, and GAN-CNN [
8]. Each model offers distinct strengths and weaknesses depending on the characteristics of EVCS data, such as time-series telemetry, high-dimensional sensor inputs, and dynamic network traffic patterns, understanding their suitability is critical for effective deployment in EVCS cybersecurity. DNNs excel in processing high-dimensional, non-sequential data, making them suitable for detecting complex patterns in EVCS metrics like voltage, current, and network traffic [
94,
95]. Their strength lies in handling large datasets and generalizing across diverse attack types, such as DoS and cyber–physical attacks [
95,
96,
97]. However, DNNs require substantial computational resources and labeled training data, which can be a bottleneck in resource-constrained edge devices typical in EVCS deployments [
96]. Overfitting is also a risk if training data lacks diversity, potentially missing novel attack vectors [
98].
The LSTM models are tailored for sequential data, ideal for EVCS time-series data like power flow or communication logs [
99,
100]. They capture temporal dependencies, making them effective for detecting anomalies in charging patterns or oscillatory load attacks [
101,
102]. Their memory cells allow retention of long-term patterns, which is useful for identifying gradual attack escalations [
103]. However, LSTMs are computationally intensive and sensitive to hyperparameter tuning, which can complicate real-time implementation in EVCS environments with strict latency requirements [
104]. Convolutional Neural Networks (CNN), particularly Convolutional LSTM variants, combine spatial and temporal feature extraction, making them effective for detecting oscillatory load attacks or spatially correlated anomalies in EVCS networks [
105].
CNNs reduce computational complexity compared to LSTMs by leveraging convolutional layers, suitable for edge-based detection [
105]. However, they may struggle with long-term dependencies in highly dynamic EVCS data and require careful preprocessing to align with spatial data structures [
106]. The GAN variants, such as GAN-GRU, GAN-LSTM, and GAN-CNN, are used for predictive tasks like remaining useful life (RUL) estimation and anomaly detection [
7,
98].
GANs generate synthetic attack scenarios, enhancing training data diversity and improving detection of rare or zero-day attacks [
107]. Their ability to model complex distributions is valuable for EVCS data with non-linear patterns [
108]. However, GANs are prone to training instability and require significant computational resources, limiting their practicality in real-time EVCS applications [
109]. Their reliance on Unsupervised learning also risks generating false positives if not carefully tuned [
107].
In the context of EVCS, data characteristics like real-time telemetry, high-noise levels, and dynamic network interactions favor models that balance computational efficiency with temporal sensitivity [
110]. LSTM and Convolutional LSTM are particularly effective for time-series anomaly detection, while DNN suits broader pattern recognition across diverse metrics [
111,
112,
113]. GAN variants are promising for simulating rare attack scenarios but need optimization for edge deployment [
107]. Future work should focus on hybrid models combining LSTM temporal strengths with CNN’s efficiency or lightweight GAN frameworks to address EVCS-specific constraints like low latency and limited edge computing power [
100,
114,
115].
To delineate these attributes systematically,
Table 5 compares key AI models, including methodology, benchmarks such as dataset, accuracy and gaps, building on
Table 2’s studies.
3. Digital Twins Foundations for EVCS Security
The IoDT signifies a transformative advancement in the design, monitoring, and safeguarding of complex cyber–physical systems, including EVCS [
118]. DTs are defined as dynamic, digital models of physical assets or processes, which remain in constant alignment with their physical counterparts by integrating real-time data [
119]. In the early 2000 s, Dr. Michael Grieves at the University of Michigan laid the groundwork for the concept of DTs. This foundational idea was later implemented by NASA to enhance simulation and diagnostic capabilities within aerospace systems [
120]. Since then, the development of DTs has rapidly progressed due to advancements in artificial intelligence (AI), cloud infrastructure, and the extensive deployment of Internet of Things (IoT) technologies [
31,
121]. Today, DTs offer real-time operational insights, predictive analytics, and proactive control mechanisms, capabilities that are especially crucial in the cybersecurity landscape of EVCS [
25].
The success of DT systems in safeguarding the cybersecurity of EVCS is fundamentally dependent on achieving precise synchronization between the physical infrastructure and its digital model. This synchronization is facilitated by distributed sensor networks that gather comprehensive telemetry data, including parameters such as voltage, current, temperature, network latency, and usage patterns [
122].
These inputs are utilized to create multi-domain models that encompass not only physical behaviors, such as electrical, mechanical, and thermal, but also the digital interactions within communication and control layers. By merging real-time data with historical trends, DTs enhance situational awareness and predictive capabilities. In the realm of EVCS, this modeling aids in the early detection of anomalous power flows, compromised communication channels, or unauthorized access attempts, thereby bolstering robust cybersecurity postures [
123].
Digital Twin systems for EVCS are generally organized into layered architecture, facilitating modular design and seamless integration into various operational environments. At the foundational level is the physical layer, which comprises EVCS hardware, power conversion units, control modules, and sensing devices [
124].
Situated above the physical layer is the communication layer, which facilitates the exchange of data between internal modules and external interfaces by employing secure and standardized protocols [
125]. The logical or data processing layer integrates AI-driven modules designed for state estimation, anomaly detection, behavior prediction, and system optimization [
126]. Additional components may encompass visualization dashboards, rule-based mechanisms for the enforcement of cybersecurity protocols, and middleware that facilitates interaction with grid operators and external systems [
127].
The layered architecture of the EVCS digital ecosystem ensures resilience, flexibility, and security. In environments where cybersecurity is a critical concern, DTs function as continuous monitoring agents and analytical engines, capable of detecting and mitigating cyber threats in real time. Through cross-domain modeling, DTs identify vulnerabilities that arise from the interaction between physical processes, control logic, and communication protocol vulnerabilities that traditional, siloed assessments may overlook [
128]. DTs serve as a virtual platform for testing and enhancing security measures by replicating attack vectors such as false data injection, protocol spoofing, firmware manipulation, and DoS scenarios [
125]. Moreover, DTs maintain comprehensive event logs, which facilitate forensic investigations and compliance reporting following incidents [
129].
As illustrated in
Figure 6, the operational flow of cybersecurity-focused DTs encompasses monitoring, anomaly detection, threat simulation, and response pathways, which are distributed across EVCS components. This flow begins with continuous monitoring, where IoT sensors collect real-time data from EVCS components like charging ports, power converters, and communication interfaces [
130].
These sensors feed metrics such as current fluctuations, packet loss rates, or unauthorized access attempts into the DTs data processing layer [
131]. Anomaly detection then employs AI algorithms, such as unsupervised clustering or statistical modeling, to identify deviations from normal operational patterns [
132]. For instance, an unexpected spike in power draw or irregular network traffic could signal a potential cyberattack [
35]. Threat simulation, a critical component, involves the DTs replicating attack scenarios, like injecting false data into control systems or simulating a denial-of-service attack, to test system resilience and refine mitigation strategies without risking the physical infrastructure [
133]. Response pathways are activated when anomalies or threats are confirmed, leveraging predefined rules and AI-driven decisions to isolate compromised components, reroute power flows, or alert grid operators [
134]. This closed-loop process ensures rapid detection and mitigation, maintaining EVCS integrity across its physical and digital domains.
As illustrated in
Figure 6, the operational flow of cybersecurity-focused DTs encompasses monitoring, anomaly detection, threat simulation, and response pathways distributed across EVCS components. This visualization captures the closed-loop process of data collection, analysis, and mitigation across digital and physical domains. To further clarify how digital twins mitigate specific cyber threats in EVCS environments, the main DT-based solutions are summarized in
Table 6 below.
The implementation of DTS capabilities in the cybersecurity of EVCS is supported by a combination of well-established and novel technologies. The IoT-based sensor arrays constitute the core of data acquisition, capturing a comprehensive array of environmental and operational metrics at the edge [
141]. Edge computing platforms enhance system responsiveness by performing data processing tasks locally. This approach reduces reliance on centralized systems and facilitates real-time threat mitigation [
142]. Cloud infrastructures offer scalable computing and storage capabilities that are crucial for analyzing historical data, training models, and synchronizing across networks.
Additionally, the use of microservices and containerization supports the modular deployment and lifecycle management of Digital Twin components [
143]. The integration of AI techniques, such as supervised learning for identifying known attack patterns and unsupervised clustering for detecting anomalies, enhances the ability of digital twins to adapt to evolving cyber threats [
144]. Collectively, these technologies provide a solid foundation for the implementation of DTs that satisfy the stringent security requirements of contemporary, interconnected EVCS environments.
However, the effectiveness of these technological components ultimately depends on how well they perform operationally. Technical performance in DT-driven EVCS cybersecurity relies on three interdependent factors: synchronization fidelity between digital and physical systems, model accuracy in representing operational states, and communication latency in threat response mechanisms [
122]. Degradation in any of these dimensions amplifies vulnerabilities, particularly in 5G/6G network environments where high-speed data exchange is fundamental to security operations [
117].
Synchronization is maintained through the continuous IoT sensor data streams described above, enabling real-time anomaly detection [
145]. However, this continuous exchange creates attack surfaces vulnerable to man-in-the-middle attacks and data tampering [
7]. Studies of cyber–physical systems demonstrate that desynchronization can delay threat mitigation by 20–50% in smart grid infrastructures [
146]. When DT’s lose synchronization with physical energy systems, they fail to detect fraudulent data injection attacks, reducing the effectiveness of grid destabilization countermeasures [
147].
Model fidelity directly influences the threat simulation accuracy of the AI techniques integrated into the DT architecture [
148]. High-fidelity models employing CNN/LSTM hybrid architectures have achieved 93% detection accuracy for advanced persistent threats in IoT environments [
149]. Conversely, models trained on synthetic datasets that inadequately capture operational complexity exhibit reduced generalizability [
150]. In dynamic EVCS scenarios, low-fidelity models can increase false negative rates by up to 15%, allowing genuine threats to evade detection [
151,
152].
Communication latency presents critical constraints for the edge–cloud architecture discussed previously, particularly during handoffs in distributed deployments [
47]. Ultra-reliable low-latency communication protocols must maintain latency below 50 ms to prevent exploitation through denial-of-service attacks [
153]. When additional verification layers such as blockchain consensus mechanisms introduce overhead, latency can increase to 100–200 ms, compromising the responsiveness essential for vehicle-to-grid stability [
154,
155].
These performance requirements necessitate careful protocol selection that balances model fidelity with operational speed [
156]. Industrial IoT pilot deployments have demonstrated that this balance is achievable through lightweight architectures, though successful implementation requires systematic optimization across all three performance dimensions [
157,
158].
4. Simulation Tools for Digital Twins Implementation
Digital Twins in EVCS function through a stratified architecture that enables synchronized interaction between physical components and their digital representations. As depicted in
Figure 7, the physical layer encompasses hardware components such as EVCS, sensors, and connected EVs.
The data layer records sensor inputs, telemetry, and time-series metrics pertaining to system status [
159]. The modeling layer performs real-time simulations, conducts cybersecurity analyses, and facilitates predictive diagnostics [
160]. The service layer integrates tools for decision-making that are grounded in machine learning and artificial intelligence, whereas the visualization layer conveys actionable intelligence via dashboard interfaces [
161]. These layers work together seamlessly to oversee charging operations, detect threats, and autonomously initiate corrective actions in a secure manner. Real-time system monitoring is a fundamental application of DTS technology in EVCS. DTs continuously monitor operational metrics such as voltage, current, temperature, state-of-charge (SoC), and power quality.
These data streams are visualized through 2D or 3D interfaces, offering infrastructure operators high-resolution situational awareness [
5]. Prior to implementing software patches or backend updates, stakeholders may employ DT environments to simulate their potential effects on EVCS within a controlled, sandboxed virtual setting [
162].
Prominent programming and numerical computing platforms, such as MATLAB/Simulink, Python-based frameworks, and Modelica [
163], and Julia [
164] offer robust modeling capabilities for power flow analysis, communication behavior emulation, and cyber-attack scenario validation.
Python is widely used for DTs implementation in EVCS cybersecurity due to its flexibility, extensive libraries, and open-source nature, but it differs from tools like MATLAB/Simulink, Modelica, and Julia in capability and outcome [
124]. Python frameworks such as OpenModelica, SimPy, or custom environments with libraries like NumPy, SciPy, and TensorFlow enable high-fidelity modeling of EVCS components, including power flows, communication protocols, and AI-driven anomaly detection [
165]. Its strength lies in rapid prototyping and machine learning integration for real-time threat analysis, but it requires significant customization to match the precision of domain-specific tools [
166].
MATLAB/Simulink, with toolboxes for power systems and control, offers robust support for EVCS simulations and seamless hardware-in-the-loop (HIL) integration, reducing development time for cyber–physical models [
167]. Its proprietary nature and licensing costs around
$1015–
$4090 per year, contrast with Python’s accessibility [
168,
169].
Modelica excels in multi-physics modeling, capturing EVCS thermal and electrical dynamics, but its steeper learning curve slows implementation compared to Python’s syntax [
168,
170]. Julia, optimized for numerical performance, handles large-scale simulations faster than Python in some cases but lacks mature libraries for EVCS applications [
171].
Outcomes are generally consistent across tools for well-defined DTs tasks, such as replicating EVCS behavior or anomaly detection, when models are accurately parameterized [
126,
172]. However, tool-specific differences arise in computational efficiency and integration. Python’s flexibility suits experimental setups and diverse data sources, but it may lag in real-time performance for 5G/6G environments compared to Julia or MATLAB’s solvers [
173,
174,
175]. Validation against standards like ISO 15118 or OCPP 2.0.1 shows comparable accuracy, though MATLAB’s compliance templates streamline regulatory alignment [
176]. For resource-constrained teams, Python’s low cost and community support often outweigh specialized tools, but outcomes depend on expertise in tailoring Python to EVCS requirements [
177].
These platforms facilitate high-resolution time-domain simulations, enable co-simulation with real-time systems, and allow integration with machine learning toolkits, thereby serving as indispensable tools for proactive cybersecurity validation. The choice of a suitable simulation environment depends on the specific EVCS component being assessed, the required level of fidelity, and the complexity of integration with live operational data streams. This mitigates operational risk and facilitates adherence to standards such as ISO/SAE 21434 and NIST SP 800-82 [
7,
8]. A DTS can effectively replicate the response of a charging unit when subjected to a compromised firmware injection.
This capability allows developers to scrutinize unauthorized behaviors, simulate command failures, and evaluate the risks associated with data exfiltration. Such anticipatory testing empowers stakeholders to confirm the system’s resilience without subjecting the actual system to potential exploitation [
9]. Another vital application is threat emulation and attack simulation [
26], DTs are capable of modeling sophisticated cyberattacks such as DoS, spoofing, false data injection (FDI), and advanced persistent threats (APTs) [
10,
11]. By integrating historical attack signatures and behavioral models into the DTs analytics engine, infrastructure providers can effectively simulate malicious activities, evaluate the proliferation of cyber threats, and assess the efficacy of layered security measures [
26].
Beyond passive detection, digital twins play a crucial role in facilitating real-time cybersecurity mitigation. By juxtaposing real-time operational data with established models of anticipated behavior, DTs can identify anomalies with a high degree of precision [
178]. Upon detection of abnormal behaviors, such as unexpected handshake failures, irregular voltage oscillations, or backend command delays, they can initiate automated responses [
179]. These measures may involve isolating affected components, executing firmware rollbacks, deploying over-the-air configuration updates, or issuing alerts to system operators.
This automated response loop significantly reduces the mean time to detect and respond, which is particularly crucial in ultra-dense urban charging networks or highway supercharging corridors [
180]. The efficacy of DTS based cybersecurity is fundamentally reliant on the communication stack that facilitates system coordination.
Figure 8 presents a comparative analysis of prominent industry entities that provide platforms for the development of cybersecurity detection and mitigation strategies.
The EVCS operates on a sophisticated protocol suite that encompasses the physical, transport, and application layers. Intra-vehicle communication is facilitated by the Controller Area Network (CAN) bus and Automotive Ethernet, while secure messaging between electric vehicles, charging stations, and backend servers is enabled by protocols such as TCP/IP, ISO 15118, OCPP, Message Queuing Telemetry Transport (MQTT), and Open Platform Communications Unified Architecture (OPC UA) [
16]. DTs facilitate the simulation of these layered interactions, enabling developers to evaluate protocol compliance, packet sequencing, timing delays, and the resilience of security handshakes under diverse load conditions [
17]. The integration with 5G and the emerging 6G networks facilitates further advancements through the implementation of network slicing, ultra-reliable low-latency communications (URLLC), and multi-access edge computing (MEC).
These technologies enable the localization of DT operations and threat detection, thereby allowing for a more rapid response to localized anomalies while maintaining the integrity of the global system [
18]. In addition, DTs significantly enhance the processes of virtual commissioning and interoperability testing [
181]. Prior to the implementation of new charging systems or the expansion to additional sites, operators can employ DTs to simulate deployment conditions, network topology, and environmental variability.
This pre-deployment modeling ensures compliance with standards such as OCPP 2.0.1 or ISO 15118 Plug and Charge and mitigates integration risks with utility backends or fleet management platforms [
19]. This simulation capability is also applicable to V2G environments, where the bidirectional flow of energy and data introduces novel control logic and synchronization challenges. DTs are particularly well-suited to modeling and optimizing these complexities [
20]. The realization of these capabilities is facilitated by a growing ecosystem of commercial DT platforms specifically designed for the energy and mobility sectors. Companies such as Opal-RT, RTDS, Typhoon HIL, and Speedgoat have emerged as prominent technology providers in the development and deployment of DT frameworks for EVCS.
Their platforms are equipped to manage real-time data streaming, model-based system design, hardware-in-the-loop (HIL) testing, and seamless edge–cloud integration capabilities, which are crucial for high-fidelity simulation of cyber–physical systems operating under 5G/6G connectivity.
Figure 9 illustrates the architecture and operational focus of these platforms, demonstrating how each vendor supports different aspects of DTS-enabled cybersecurity pipelines, such as co-simulation, protocol fuzzing, or electromagnetic interference testing.
Table 7 provides a comparative summary of platform specifications, simulation software, and use cases in smart mobility and EV infrastructure. Together, these resources offer practitioners a reference framework for selecting and deploying DTs tailored to advanced EVCS security applications.
5. Standards, Privacy and Financial Feasibility
The integration of DTs technology into EVCS enhances operational visibility, predictive analytics, and cybersecurity by utilizing real-time data. Nevertheless, it presents substantial challenges concerning privacy, encryption, regulatory compliance, and cost [
127].
For effective deployment, it is imperative to adhere to standards such as ISO 15118, OCPP 2.0.1, and GDPR, while addressing deficiencies in synchronization, authentication, and data integrity [
209]. Privacy-preserving techniques and robust encryption are essential for safeguarding sensitive information. Economic considerations, including capital expenditures (CAPEX), operational expenditures (OPEX), and return on investment (ROI), significantly impact adoption. Additionally, interoperability challenges within diverse EVCS environments also play a crucial role [
2]. Addressing these challenges necessitates the implementation of coordinated standards as discussed below.
5.1. Compliance with Technical Standards
To ensure interoperability, security, and scalability, DTs-enabled EVCS must adhere to industry standards such as ISO 15118 [
28], OCPP 2.0.1 [
52], IEEE 2030.5 [
210], and NIST IR 8356 [
211]. These standards provide frameworks for secure communication, data management, and system integration:
- I.
ISO 15118: This standard establishes the framework for V2G communication, outlining the protocols necessary for the secure transmission of data between EVs and charging stations [
28]. Transport Layer Security (TLS) is employed to facilitate encrypted communications, while digital certificates are utilized for authentication. This, when employed by DTs, can securely process data related to charging sessions [
212]. Ensuring compliance with data protection laws is vital for DTs systems to sustain trust in V2G interactions, particularly when dealing with bidirectional charging scenarios.
- II.
OCPP 2.0.1: The Open Charge Point Protocol (OCPP) 2.0.1 significantly enhances communication between chargers and backend systems by incorporating advanced security features, including support for TLS 1.3 and secure firmware updates [
213]. DTs that implement OCPP 2.0.1 are capable of securely transmitting telemetry data to cloud-based twins, effectively reducing the potential for eavesdropping or data tampering.
- III.
IEEE 2030.5: This communication standard helps utilities, distributed energy resources (DERs), and grid-connected devices like EV chargers share data safely and efficiently. It uses the Internet Protocol (IP) to control DERs from a distance and allows two-way communication to keep the grid stable. The standard ensures smart grids work well together by combining digital technologies with DERs and grid management systems [
14,
32,
210]. It requires the establishment of rigorous cybersecurity strategies, such as mutual authentication and encryption, to ensure the protection of data exchanges within EVCS ecosystems.
- IV.
NIST IR 8356: The incident report (IR) from the National Institute of Standards and Technology (NIST) on DTs cybersecurity offers a risk-based framework for the protection of DTs systems. It underscores the importance of continuous monitoring, threat modeling, and incident response strategies to mitigate vulnerabilities in DTS-enabled EVCS [
214]. Adherence to NIST IR 8356 guarantees that DTs systems maintain resilience against the evolving landscape of cyber threats, including data breaches and DoS attacks.
Failure to adhere to these standards may result in interoperability complications, expose security weaknesses, and lead to regulatory sanctions, thereby threatening the scalability and reliability of DT-enabled electric vehicle charging systems (DTs-enabled EVCS).
5.2. Technical Safeguards for Privacy and Data Protection
The incorporation of DTs technologies into EVCS presents notable challenges and responsibilities concerning data privacy and cybersecurity.
These systems are required to function within a multifaceted regulatory framework that encompasses various jurisdictions, including the General Data Protection Regulation (GDPR) of the European Union, the California Consumer Privacy Act (CCPA), and the Network and Information Security Directive 2 (NIS2) for critical infrastructure in Europe [
215,
216,
217]. These frameworks enforce stringent requirements concerning data handling, user consent, and system-level security practices. For example, the GDPR specifies essential user rights in Articles 15 to 21, including the rights to access, rectification, erasure (the “right to be forgotten”), and objection to automated decision-making, all of which must be integrated into the technical architecture of DTs platforms [
218].
Concurrently, the CCPA emphasizes transparency and consumer control over personal data, whereas the NIS2 classifies EVCS as critical infrastructure, necessitating increased resilience against cyber threats and service interruptions. These systems routinely collect, transmit, and process data across various legal jurisdictions, thereby necessitating compliance with data protection laws that span a fragmented array of regulatory frameworks [
126]. This challenge is particularly acute in emerging markets, where regulatory frameworks specific to digital transformation technologies are frequently underdeveloped or entirely absent. Consequently, implementing entities must adopt anticipatory compliance strategies that align with internationally recognized standards and best practices to ensure lawful and ethical data governance.
5.3. Privacy by Design and System Architecture
Deploying DTs on a large scale involves handling vast amounts of sensitive and personally identifiable data, such as vehicle location, battery state-of-charge (SoC), consumption patterns, and user billing information [
219,
220]. This scenario requires a system architecture that embodies the principles of privacy by design and security by default. These core principles highlight the necessity of embedding data protection mechanisms throughout the system, from edge-level devices and sensor arrays to cloud-based analytics and user-facing visualization platforms [
15,
221].
A fundamental component of this approach is the implementation of user-centric consent management frameworks. These systems must provide users with transparent information regarding data collection and processing purposes, such as predictive maintenance, billing optimization, grid balancing, and data sharing practices [
222]. In alignment with the stipulations of GDPR and CCPA, it is imperative that users are granted the capability to opt out of non-essential data processing, access their personal information, request its deletion, and contest profiling practices. The implementation of dynamic consent models, which facilitate real-time adjustments to user consent, has been shown to bolster user trust and participation [
223].
In accordance with privacy by design principles, the adoption of data minimization and purpose limitation is vital for ensuring responsible data governance in DTs-enabled EVCS. These principles require that only data necessary for fundamental system operations, such as routing, billing, or charging optimization, be collected and processed [
53]. For instance, real-time location data essential for operational efficiency can be anonymized following initial processing to reduce the risks associated with prolonged user tracking. Furthermore, it is imperative to establish well-defined data retention policies that impose temporal constraints on data storage and usage, in accordance with the GDPR’s accountability and proportionality requirements [
224].
5.4. Cryptographic Protections and Access Control
The protection of sensitive data necessitates the implementation of robust encryption protocols and access control mechanisms.
Data in transit should be secured using TLS 1.3, which provides forward secrecy and minimizes handshake overhead [
225], while data at rest must employ encryption standards such as AES-256. Implementing Role-Based Access Control (RBAC) is essential for regulating access to sensitive datasets. By assigning permissions according to predefined roles, RBAC effectively minimizes the risk of internal misuse [
226,
227]. Furthermore, advanced techniques for privacy-preserving computation are crucial, particularly within federated and decentralized DTs environments. Prominent methods include:
- I.
k-Anonymity: Ensures that individual user records cannot be uniquely identified by aggregating datasets [
228]. This method proves highly effective in concealing electric vehicle (EV) charging patterns for regional grid analysis.
- II.
Homomorphic Encryption: Facilitates the processing of encrypted data without the need for decryption, thereby enabling secure cloud-based analytics while maintaining the confidentiality of the data [
229].
- III.
Secure Multi-Party Computation (SMPC): This process enables collaborative computation among various stakeholders, including utilities, regulators, and Original Equipment Manufacturers (OEMs), while ensuring that raw data inputs remain confidential [
230].
These strategies facilitate the continued functionality of DTs systems while effectively minimizing the potential for unauthorized access or inference attacks.
5.5. Risk Assessment and Continuous Monitoring
To ensure privacy and security throughout the digital transformation lifecycle, it is imperative to conduct Privacy Impact Assessments (PIAs) on a regular basis [
231]. These assessments, in accordance with the accountability principle of the GDPR and the ISO/IEC 27701 standard for Privacy Information Management Systems (PIMS), are designed to identify, evaluate, and mitigate privacy risks in dynamic system configurations [
232].
Moreover, continuous cybersecurity monitoring, as delineated in NIST IR 8356, is crucial for identifying vulnerabilities such as unauthorized access attempts, malware intrusions, or anomalous data behavior [
233]. To ensure the long-term sustainability and scalability of DTs-enabled electric vehicle charging systems, a comprehensive, multi-faceted strategy is necessary, integrating legal, technical, and ethical dimensions. Adherence to international standards such as ISO 15118, OCPP 2.0.1, IEEE 2030.5, and NIST IR 8356 are essential for facilitating interoperability, secure communication, and maintaining system integrity.
In conjunction with compliance with GDPR, CCPA, and NIS2 regulations, these technical safeguards establish a robust framework for ensuring user privacy and data protection. By integrating privacy by design principles, employing advanced cryptographic techniques, and implementing comprehensive risk governance mechanisms, stakeholders can enhance trust, achieve regulatory compliance, and advance technological maturity within the evolving context of DTs-enabled electric vehicle charging infrastructure.
5.6. Financial Feasibility of Digital Twin Implementation
The incorporation of DTs technology into EVCS, particularly within 5G/6G-enabled smart mobility networks, presents significant potential for advancing cybersecurity. By facilitating real-time system monitoring, predictive diagnostics, and automated threat response, DTs offer a proactive defense mechanism against a broad range of cyber–physical threats [
234]. The capabilities are further enhanced by the low-latency and high-throughput communication features of next-generation wireless networks, such as Ultra-Reliable Low Latency Communications (URLLC) and MEC within the framework of 5G/6G standards [
235].
Nevertheless, the integration of DTs architecture within EVCS ecosystems presents a variety of cost-related complexities that require thorough assessment. These costs encompass several technological layers as discussed below:
- I.
The physical layer encompasses investments in instrumentation, embedded control modules, edge computing devices, and HIL simulation units.
- II.
The data layer includes investments in gateways that comply with protocols such as OCPP 2.0.1 and ISO 15118, secure communication interfaces, and high-bandwidth network subscriptions.
- III.
The modeling and control layer demands the integration of real-time simulation platforms, such as MATLAB/Simulink or RSCAD, alongside system optimization engines to refine performance tuning.
- IV.
The implementation of the AI layer entails substantial expenses associated with the development of data pipelines, the training of models, the orchestration of federated learning, and the continuous monitoring for model drift and bias.
Each layer greatly affects the total Capital Expenditure (CAPEX) and Operational Expenditure (OPEX) of the DTs-enhanced EVCS setup. These financial factors are very important in large city projects, where growth, compatibility, and following global standards must be balanced with budget limits. So, while adding digital technologies improves strength, automation, and risk control, it also requires careful cost planning to keep it economically sustainable in the long run.
To assess the economic viability of DTS-based cybersecurity solutions for EVCS, a cost–benefit analysis compared to conventional approaches is crucial. Conventional EVCS cybersecurity, utilizing firewalls, intrusion detection systems, and periodic updates, requires lower initial CAPEX of
$10,000–
$50,000 per site and OPEX of
$5000–
$15,000 annually for maintenance and monitoring [
236]. However, their reactive nature leads to significant indirect costs from cyber incidents, such as data breaches costing around
$200,000–
$1 million per incident or service disruptions affecting grid stability and user trust [
237,
238]. In contrast, DTs-based solutions demand higher CAPEX, ranging from
$30,000–
$600,000 per site, including sensors costing approximately
$50–
$765 [
238], edge computing devices ranging
$120–
$249 [
239], HIL platforms costing
$20,000–
$500,000 [
240,
241,
242], and network subscriptions estimated at
$5000–
$50,000 [
243]. The modeling and AI layers further elevate costs, with total CAPEX for a mid-sized urban deployment covering 10–50 chargers reaching
$200,000–
$1.5 million and OPEX of
$50,000–
$150,000 annually for cloud services, AI retraining, and personnel [
244,
245,
246,
247].
Despite higher costs, DTs offer substantial benefits through enhanced security and efficiency. Real-time anomaly detection and predictive diagnostics reduce successful attacks by 60–80%, avoiding losses of
$120,000–
$800,000 per incident and cutting downtime costs by 10–20% costing
$10,000–
$50,000 per hour for large networks [
248,
249,
250]. DTs also save 5–15% on electricity costs
$10,000–
$30,000 annually per high-traffic site, achieving ROI within 3–5 years for a 50-charger network, compared to 5–7 years for conventional systems [
251]. While conventional approaches struggle with scalability in 5G/6G environments and zero-day threats, DTs provide modular scalability and automated responses, reducing labor costs by 20–30% value at
$15,000–
$25,000 per site [
252]. Although small-scale or rural deployments may find DTs costs prohibitive, phased adoption and policy incentives like grants could offset CAPEX and enhance user trust and regulatory compliance while accelerating secure EVCS deployment.
5.7. Physical Layer Costs
At the physical layer, the architecture of EVCS is dependent on a range of hardware components essential for real-time monitoring and control.
These components include voltage and current sensors, thermal monitoring devices, and embedded control modules, which are typically integrated into the EVCS.
The cost of instrumentation per EVCS unit varies considerably, ranging from approximately
$50 to
$765, contingent upon the complexity and precision of the sensing technologies employed [
253]. In addition to sensing hardware, edge computing platforms such as the NVIDIA Jetson and Raspberry Pi are commonly employed to enable local data processing. These devices are priced at approximately
$249 and
$120, respectively, with the price differences reflecting variations in computational capabilities and memory configurations [
254,
255]. Furthermore, for the advanced testing and real-time validation of EVCS operations, HIL simulation systems, including platforms such as Opal-RT and Typhoon HIL, are essential. These systems facilitate high-fidelity simulation environments and are available at a wide price range of
$20,000 to
$500,000, contingent upon system specifications, scalability, and the degree of Multiphysics integration required [
241,
256].
5.8. Data Layer Costs
At the data layer, DTs-enabled EVCSs depend on effective telemetry management, which is facilitated by standard communication protocols such as the Controller Area Network (CAN), OCPP 2.0.1, and ISO 15118. These protocols ensure secure, real-time data exchange between the EVCS, backend servers, and grid management systems [
53]. To ensure protocol interoperability and maintain data integrity, specialized communication gateways are implemented at the charger level. The unit costs of these gateways range from approximately
$164.70 to
$1190, contingent upon factors such as processing capacity, embedded encryption features, and compatibility with multi-protocol operations [
257]. As EVCS networks progress towards enhanced scalability and responsiveness, the connectivity infrastructure emerges as a fundamental aspect of performance. The incorporation of 5G/6G technologies, particularly those utilizing URLLC and MEC, significantly improves communication latency and throughput, thereby facilitating time-sensitive telemetry and security operations [
235].
5.9. Modeling and Simulation Layer Costs
At the modeling layer, real-time simulations are performed to mimic the dynamic behavior of EVCS under various operating conditions. This capability is essential for virtual commissioning, control logic validation, and testing cyber–physical resilience. Industry-standard simulation environments like MATLAB/Simulink and RSCAD are frequently used for these purposes. MATLAB/Simulink provides a wide array of toolboxes specifically designed for power systems and embedded control, with commercial licenses typically costing between
$5000 and
$15,000 per seat, depending on the configuration and toolbox selection [
169].
RSCAD, designed specifically for integration with Real-Time Digital Simulator (RTDS) hardware, facilitates high-fidelity electromagnetic transient simulations in real-time settings. When bundled with RTDS hardware, the licensing costs for RSCAD typically range from
$25,000 to over
$500,000. These costs vary based on the size of the simulation rack, the number of nodes, and the inclusion of advanced modules like GTNET and GTFPGA for communication and hardware interfacing [
258].
While Python-based frameworks such as OpenModelica, SimPy, or custom-built co-simulation environments offer the advantage of open-source flexibility, they generally necessitate substantial customization and development time. This requirement often leads to increased personnel costs and prolonged integration cycles [
259].
Furthermore, the utilization of cloud-based GPU resources for AI-enhanced simulations or federated modeling incur operational costs ranging from $0.35 to $2.48 per hour.
These expenses are contingent upon computational requirements, the complexity of the simulations, storage needs, and the necessity for continuous uptime [
260]. Notwithstanding the associated cost implications, the modeling layer confers significant strategic advantages. By facilitating high-fidelity simulations within controlled digital environments, organizations can mitigate commissioning risks, substitute costly field testing with virtual validation, and expedite deployment timelines while ensuring adherence to safety and performance standards [
130].
5.10. AI and Analytics Layer Costs
In the context of AI, DTs-enabled EVCSs employ advanced computational models to enhance predictive analytics, detect anomalies, and optimize adaptive control strategies. This layer plays a pivotal role in enabling proactive system diagnostics and the early identification of threats, both of which are crucial for maintaining the performance and security of modern smart mobility infrastructure [
261]. The initial capital investment required for the implementation of artificial intelligence capabilities encompasses the establishment of robust data pipelines. This process typically incurs costs ranging from
$100,000 to
$300,000, which include data ingestion, cleaning, labeling, and integration across diverse sources [
262].
In the implementation of federated learning architectures and reinforcement learning agents, particularly within decentralized environments that emphasize edge privacy and control coordination, additional costs ranging from
$50,000 to
$100,000 are frequently incurred [
262]. Operational expenditures are sustained throughout the lifecycle of AI models, particularly concerning model retraining, bias mitigation, and drift detection. These activities are crucial for ensuring model accuracy, fairness, and adherence to regulatory standards in dynamic environments [
263]. Despite the considerable costs associated with setup and maintenance, the implementation of an AI layer yields substantial improvements in operational efficiency.
This results in quantifiable labor savings and enhanced resilience for operators of smart cities and managers of electric vehicle fleets [
264]. Financial feasibility, evaluated through CAPEX, OPEX, and ROI, indicates that while the initial investments are substantial, the long-term economic and security advantages substantiate the integration. Ultimately, a strategic, standards-aligned implementation of DTs in EVCS ensures a scalable, secure, and economically viable infrastructure for the future of electric mobility. To contextualize the implementation challenges and opportunities associated with DTs in EVCS, it is imperative to examine the intersection of technical standards, data privacy regulations, and financial considerations.
Table 8 presents a synthesized review of the key aspects influencing the adoption and scalability of DTs-enabled EVCS, highlighting the relevant regulatory frameworks, implementation challenges, and recommended mitigation strategies.
5.11. Energy Consumption and Environmental Impact
The deployment of DT systems in EVCS introduces significant energy consumption considerations due to the computational and communication demands of maintaining real-time synchronization between physical and digital components. Frequent edge–cloud synchronization, enabled by 5G/6G networks, requires substantial data transmission and processing, which can consume considerable energy [
272]. Edge computing platforms, such as NVIDIA Jetson or Raspberry Pi, used for local data processing, typically draw 5–20 watts per unit, depending on workload and configuration [
200]. Cloud-based servers, often employed for complex simulations and AI model training, can consume hundreds of watts per server, with large-scale data centers potentially requiring megawatts of power for continuous operation [
273].
The high-frequency data exchanges in 5G/6G environments, particularly with Ultra-Reliable Low Latency Communications (URLLC), further amplify energy usage due to the power demands of high-speed, low-latency network infrastructure [
274]. This energy consumption directly impacts the environmental footprint of DTs-enabled EVCS, particularly in regions that are reliant on fossil fuel-based energy sources. The carbon emissions associated with powering edge devices, cloud servers, and network infrastructure can undermine the sustainability goals of smart mobility systems, which aim to reduce greenhouse gas emissions through EV adoption.
For instance, a typical cloud data center can emit approximately 0.4–0.6 kg of CO
2 per kWh of electricity consumed, depending on the energy mix [
274,
275]. In urban environments with dense EVCS deployments, the cumulative energy demand of DT systems can be substantial, potentially offsetting the environmental benefits of EVs if not powered by renewable energy sources [
276,
277]. To mitigate these impacts, energy-efficient strategies must be integrated into DTS implementations.
Utilizing renewable energy sources, such as solar or wind power, for edge and cloud computing operations can significantly reduce carbon emissions [
278].
Energy-efficient hardware, such as low-power edge devices and optimized server architectures, can further minimize energy consumption [
279]. Adaptive synchronization protocols that dynamically adjust data exchange frequency based on operational needs can reduce unnecessary energy usage while maintaining system performance [
280]. Additionally, leveraging open-source simulation frameworks like OpenModelica can lower computational demands compared to resource-intensive commercial platforms like MATLAB/Simulink, provided they meet performance requirements [
281]. These measures are critical to aligning DTs-enabled EVCS with the environmental objectives of sustainable mobility, ensuring that cybersecurity enhancements do not come at the expense of increased carbon footprints.