Communication Vulnerabilities in Electric Mobility HCP Systems: A Semi-Quantitative Analysis
Abstract
:1. Introduction
2. Preliminaries
2.1. System Description
2.1.1. Role of Each Actor
- EV User: is the one who uses the electric vehicle (EV). The owner and user should not necessarily point to the same person.
- EV: is the transportation mean which is powered by an electric battery system.
- EVSE: EV supply equipment, also known as the charging connector, is responsible for providing electricity drawn from the power system to the EV to charge its battery. The EVSE communicates with the EV to negotiate the charging parameters, manage power delivery, and to handle the payment.
- eMSP: electric mobility service provider grants EV Users access to a variety of EVSEs, facilitates payment services with different methods, and helps in searching for available charging stations. For this purpose, eMSP normally makes an agreement with CSOs to get the data of charging sessions of their customers. One entity could also play the role of CSO and eMSP for the same purpose.
- CSO: charging station operator is responsible for managing the different charging boxes (e.g., a collection of EVSEs) located at one or more charging stations. Furthermore, it is responsible for technical operations and maintenance of EVSEs (public and semi-public). Its revenue comes mainly from providing electrical energy to EVs, and it has the information for authorising EV Users for using its EVSEs.
- CH: clearing house, also known as roaming, enables EV Users to be able to charge their EVs at EVSEs that belong either to a different country or contracted CSO.
- DSO: distribution system operator, also known as the grid operator, has the main responsibility of maintaining the stability of the grid and hence the constant flow of electricity.
- Energy Supplier: is responsible for supplying energy to the utility companies and DSOs. In certain cases, energy supplier and DSO can be the same entity.
2.1.2. Information Commutation
2.2. Cyber Security
2.2.1. Types of Attacks
- Man-in-the-Middle (MiM): includes the insertion of unauthentic information and spoofing by intervening the communication between two entities through a forged party. During the exchange of messages, the attacker might counterfeit the message and send the wrong information to the endpoint. This can decrease the availability of communicating entities and damage their reputation.
- Impersonation: the theft of another entity’s identity by a malicious party. To this end, this latter uses the victim’s credentials during the identification and authentication processes, so that it pretends to be the authentic entity. This can lead to various harmful effects on the system.
- Eavesdropping: the illegal scan of the conversation between two entities by a malicious party. This is done in order to capture sensitive information about the system (e.g., credentials). This attack can lead EV Users, CSOs, and other actors (e.g., sub-systems) of electric mobility HCP systems to financial damage depending on the significance of the captured information. For instance, the loss of personally identifiable information (PII) can create privacy issues, and chances for impersonation become significant.
- Denial-of-Service (DoS): too many requests on communication channels and services may delay message delivery. Furthermore, disruption can also be realised by deleting messages/actions/processes which can make the services inaccessible to authentic users. This could cause unavailability of the service for a temporary period of time, which can damage the reputation and integrity of service providers (e.g., DSO, CSO, eMSP).
- Tampering of messages: is the act of deliberately modifying (e.g., destroying, manipulating, or editing) information that belongs to some other entity. It could cause harmful effects to the system. For instance, the fabrication of tariff information or metering data may lead to energy theft in EV charging infrastructure.
- Repudiation: systems, services, or processes can deliberately or unintentionally stop executing their proper actions, such as message transmission or data storage, etc. For instance, EV Users can claim to have received less energy than stated on the billing record. Likewise, the DSO may claim to have delivered more energy to the CSO.
2.2.2. Security Requirements
- Confidentiality: is the protection of information from any unauthorised disclosure. To face eavesdropping attacks, the confidentiality of sensitive information such as charging request messages, control messages for payments, etc. should be protected.
- Authentication: is the process of verification in order to ensure that the communicating entity is the one that it claims to be. To face impersonation attacks and to provide a fair billing with an EV roaming support, strong entity identification and mutual authentication services should be realised.
- Authorisation: is the process of granting authorised users legitimate access to resources (e.g., system, data, application, etc.). It is beneficial to minimise the chances of successful impersonation attacks.
- Integrity: ensures that the original message being sent has not been altered or changed during the transmission. To face tampering attacks, the integrity of the messages should be ensured.
- Availability: is the property of a system or a resource of the system being accessible and usable upon demand by authorised entities. DoS attacks impose a threat to this property. Measures (e.g., gateway filtering) must be in place to ensure that important service entities can resist DoS attacks.
3. Literature Review
3.1. EV-EVSE
3.2. EVSE-CSO
3.3. CSO-eMSP
3.4. DSO-CSO and -eMSP
4. Methodology to Assess Vulnerabilities
4.1. Common Vulnerability Scoring System
4.1.1. Base Metric Group
- Access Vector: represents either the fact that the vulnerability is remotely exploitable or up to what extent the attacker needs access to get into the system. For this purpose, it has three possibilities of network, adjacent and local. Network describes that vulnerability is remotely exploitable and has the highest value of 1. Adjacent is used when attacker requires physical or logical access to the network (e.g., local IP, Bluetooth) and has a value of 0.646. Local indicates that the attacker needs either local or physical access to vulnerable entities for their manipulation, and has a value of 0.395.
- Access Complexity: illustrates the level of complexity in carrying out attacks on a system. The more complex the attack is, the least vulnerable the system becomes. It has three possibilities of high, medium and low. High shows that the vulnerable configuration is seen very rarely in practice, and has a value of 0.35. Medium indicates that access depends on some factors such as authentication, special configuration and/or knowledge about the system, and has a value of 0.61. Low denotes that the attack can be performed easily, and has the highest value of 0.71.
- Authentication: shows that either the attacker needs to be authorised by the system or does not need to be, in order to successfully compromise the system. It has three possibilities of none, single and multiple. None is used when the attacker is unauthorised and does not require privilege to access system resources, and has the highest value of 0.704. Single shows that the attacker needs to be authorised at least once and must have privilege up to non-sensitive resources, and has a value of 0.56. Multiple denotes that the attacker is authorised and has privilege up to administrative level or the attack depends on user interaction, and has a value of 0.45.
- Impact Metric: describes the level of CIA (Confidentiality, Integrity, Availability) of the system impacted by an attack. It has three possibilities of complete, partial and none. Complete illustrates that there is a complete loss of CIA, and has the highest value of 0.660. Partial is used when there is loss of CIA up to some extent, and has a value of 0.275. None indicates that there is no impact on CIA and has a value of 0.
4.1.2. Temporal Metric Group
- Exploitability: represents the severity in exploiting the vulnerabilities of the system. To this end, it has four possibilities: high, functional exploitation, PoC code, and unproven. High indicates that attack is possible by commonly available codes, remotely deliverable viruses or by manual trigger, and has the highest value of 1. Functional exploitation shows that exploitation techniques along with code are available that can be functional in case of vulnerability, and has a value of 0.95. Proof-of-concept (PoC) code demonstrates that exploitation techniques do not work for all situations, where extensive modifications are required by a skilled attacker, and has a value of 0.9. Unproven illustrates that no exploitable code is available, and only theoretical concept of exploitability can be found, and has a value of 0.85.
- Remediation Level: measures the level of effort realised to remedy the effected components of the system by attacks. Like the previous metric, this one too has four possibilities: unavailable, workaround, temporary and official fixes. Unavailable demonstrates that there is currently no available solution, and has the highest value of 1. Workaround indicates that solutions might be available through third-parities, and has a value of 0.95. Temporary fix shows that the official vendors provide a temporary solution, and has a value of 0.9. Official fix shows that a complete solution is available by official vendors, and has a value of 0.87.
- Report Confidence: this metric measures the level of assurance on the existence of vulnerabilities by authorised vendors. This metric has three possibilities: confirmed, reasonable, and unknown. Confirmed shows that the corresponding vulnerability is acknowledged by vendors, and has the highest value of 1. Reasonable indicates that the vulnerability is confirmed by unofficial vendors such as researchers or security analysts, and has a value of 0.95. Finally, unknown demonstrates that only the impact indicates the presence of vulnerability, where the reason of the vulnerability is not known, and has a value of 0.9.
4.1.3. Environmental Metric Group
- Collateral Damage Potential: this parameter measures the possible loss of (1) physical assets of an organisation, and (2) life through damage caused by an attack. It has six possibilities: low, low-medium, medium-high, high, and undefined with values of 0.1, 0.3, 0.4, 0.5 and 0 respectively. In this paper, as we consider the information and communication layers of EMSA without analysing its component layer, then we consider the possibility of undefined (e.g., value of 0) for this parameter.
- Target Distribution: it measures the percentage of systems that could be affected by the vulnerability. This parameter has five possibilities: none, low, medium, high, and undefined with values of 0, 0.25, 0.75, 1.0, and 1.0 respectively. For the same reason as explained in the previous parameter, this one too we select the value of zero (e.g., none) to skip this metric in the equation.
- Security Requirements: this metric measures the effect that an organisation or individuals could have by loss of confidentiality, integrity, and availability (CIA). Thus, it consists of three sub-metrics of ,, and . Furthermore, each such sub-metric has four possibilities: low, medium, high and undefined with values of 0.5, 1.0, 1.51, and 1.0 respectively.
5. Evaluation
5.1. EV-EVSE
5.1.1. Base Metric Group
5.1.2. Temporal Metric Group
5.1.3. Environmental Metric Group
5.1.4. Overall Score
5.2. EVSE-CSO
5.2.1. Base Metric Group
Vulnerability : Transport Layer Security
Vulnerability : Local Authentication
Vulnerability : System Maintenance Methods
5.2.2. Temporal Metric Group
Vulnerability : Transport Layer Security
Vulnerability : Local Authentication
Vulnerability : System Maintenance Methods
5.2.3. Environmental Metric Group
Vulnerability : Transport Layer Security
Vulnerability : Local Authentication
Vulnerability : System Maintenance Methods
5.2.4. Overall Score
5.3. CSO-eMSP
5.3.1. Base Metric Group
Vulnerability : Static Credentials for Authentication
Vulnerability : Transport Layer Security
Vulnerability : Application Layer Security
5.3.2. Temporal Metric Group
Vulnerability : Static Credentials for Authentication
Vulnerability : Transport Layer Security
Vulnerability : Application Layer Security
5.3.3. Environmental Metric Group
Vulnerability : Static Credentials for Authentication
Vulnerability : Transport Layer Security
Vulnerability : Application Layer Security
5.3.4. Overall Score
5.4. DSO-CSO and -eMSP
5.4.1. Base Metric Group
Vulnerability : Lack of Key Management System
Vulnerability : Vulnerabilities in AMI
5.4.2. Temporal Metric Group
Vulnerability : Lack of Key Management System
Vulnerability : Vulnerabilities in AMI
5.4.3. Environmental Metric Group
Vulnerability : Lack of Key Management System
Vulnerability : Vulnerabilities in AMI
5.4.4. Overall Score
5.5. Summary of the Results
- Scenario 1: In case more than one vulnerability exist within the communication of a given sub-system (e.g., 3 vulnerabilities for CSO-eMSP), we consider the worst score of the vulnerabilities as the one for the whole sub-system.
- Scenario 2: In case more than one vulnerability exist within the communication of a given sub-system (e.g., 3 vulnerabilities for CSO-eMSP), we consider the average score of those vulnerabilities as the one for the whole sub-system.
6. Conclusions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
AMI | advanced metering infrastructure |
CIA | confidentiality, integrity and availability |
CS | charging station |
CSO | charging station operator |
CPS | cyber physical system |
CVSS | common vulnerability scoring system |
DoS | denial-of-service |
DSO | distribution system operator |
EMSA | e-mobility system architecture |
eMSP | e-mobility service provider |
EV | electric vehicle |
EVSE | electric vehicle supply equipment |
HCPS | human-centred CPS |
ICT | information and communications technology |
MiM | man-in-the-middle |
OCN | open charging network |
OCPI | open charge point interface |
OCPP | open charge point protocol |
OICP | open inter charge protocol |
OpenADR | open automated demand response |
OSCP | open smart charging protocol |
SCADA | supervisory control and data acquisition |
References
- Lee, E.A. Cyber Physical Systems: Design Challenges. In Proceedings of the 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC), Orlando, FL, USA, 5–7 May 2008; pp. 363–369. [Google Scholar] [CrossRef] [Green Version]
- Eider, M.; Sellner, D.; Berl, A.; Basmadjian, R.; de Meer, H.; Klingert, S.; Schulze, T.; Kutzner, F.; Kacperski, C.; Stolba, M. Seamless Electromobility. In Proceedings of the Eighth International Conference on Future Energy Systems, e-Energy ’17, Hong Kong, China, 16–19 May 2017; pp. 316–321. [Google Scholar] [CrossRef] [Green Version]
- Basmadjian, R.; Kirpes, B.; Mrkos, J.; Cuchý, M. A Reference Architecture for Interoperable Reservation Systems in Electric Vehicle Charging. Smart Cities 2020, 3, 1405–1427. [Google Scholar] [CrossRef]
- Lee, R.; Assante, M.; Conway, T. Analysis of the Cyber Attack on the Ukrainian Power Grid-Defense Use Case; Technical Report; Industrial Control System, 2016; Available online: https://www.nerc.com/pa/CI/ESISAC/Documents/E-ISAC_SANS_Ukraine_DUC_18Mar2016.pdf (accessed on 10 March 2021).
- Volkova, A.; Niedermeier, M.; Basmadjian, R.; de Meer, H. Security Challenges in Control Network Protocols: A Survey. IEEE Commun. Surv. Tutor. 2019, 21, 619–639. [Google Scholar] [CrossRef]
- Sherwood, J.; Clark, A.; Lynas, D. Enterprise Security Architecture: A Business-Driven Approach; CRC Press: Boca Raton, FL, USA, 2005. [Google Scholar]
- Zweistra, M.; Janssen, S.; Geerts, F. Large Scale Smart Charging of Electric Vehicles in Practice. Energies 2020, 13, 298. [Google Scholar] [CrossRef] [Green Version]
- Paverd, A.J.; Martin, A.P.; Brown, I. Security and Privacy in Smart Grid Demand Response Systems. In Smart Grid Security. SmartGridSec 2014. Lecture Notes in Computer Science; Cuellar, J., Ed.; Springer: Cham, Switzerland, 2014; Volume 8448, pp. 1–15. [Google Scholar]
- Ding, D.; Han, Q.L.; Xiang, Y.; Ge, X.; Zhang, X.M. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 2018, 275, 1674–1683. [Google Scholar] [CrossRef]
- Vaidya, B.; Mouftah, H.T. Multimodal and Multi-pass Authentication Mechanisms for Electric Vehicle Charging Networks. In Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June 2020; pp. 371–376. [Google Scholar] [CrossRef]
- Bao, K.; Valev, H.; Wagner, M.; Schmeck, H. A threat analysis of the vehicle-to-grid charging protocol ISO 15118. Comput. Sci. Res. Dev. 2017, 33, 3–12. [Google Scholar] [CrossRef]
- Morosan, A.G.; Pop, F. OCPP Security-Neural Network for Detecting Malicious Traffic. In Proceedings of the International Conference on Research in Adaptive and Convergent Systems, RACS ’17, Krakow, Poland, 20–23 September 2017; pp. 190–195. [Google Scholar] [CrossRef]
- Alcaraz, C.; Lopez, J.; Wolthusen, S. OCPP Protocol: Security Threats and Challenges. IEEE Trans. Smart Grid 2017, 8, 2452–2459. [Google Scholar] [CrossRef]
- van Aubel, P.; Poll, E.; Rijneveld, J. Non-Repudiation and End-to-End Security for Electric-Vehicle Charging. In Proceedings of the 2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), Bucharest, Romania, 29 September–2 October 2019; pp. 1–5. [Google Scholar] [CrossRef]
- Rubio, J.E.; Alcaraz, C.; Lopez, J. Addressing Security in OCPP: Protection Against Man-in-the-Middle Attacks. In Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 26–28 February 2018; pp. 1–5. [Google Scholar] [CrossRef]
- Lee, S.; Park, Y.; Lim, H.; Shon, T. Study on Analysis of Security Vulnerabilities and Countermeasures in ISO/IEC 15118 Based Electric Vehicle Charging Technology. In Proceedings of the 2014 International Conference on IT Convergence and Security (ICITCS), Beijing, China, 28–30 October 2014; pp. 1–4. [Google Scholar] [CrossRef]
- Vaidya, B.; Mouftah, H.T. Deployment of Secure EV Charging System Using Open Charge Point Protocol. In Proceedings of the 2018 14th International Wireless Communications Mobile Computing Conference (IWCMC), Limassol, Cyprus, 25–29 June 2018; pp. 922–927. [Google Scholar] [CrossRef]
- Van Keulen, J. Smart Charging: A Privacy and Security Analysis; Radboud Universiteit: Nijmegen, The Netherlands, 2014; pp. 1–67. [Google Scholar]
- Kirpes, B.; Danner, P.; Basmadjian, R.; de Meer, H.; Becker, C. E-Mobility Systems Architecture: A Framework for Managing Complexity and Interoperability. Submitt. Energy Inform. (Preprint) 2019, 2, 1–30. [Google Scholar] [CrossRef]
- CEN-CENELEC-ETSI Smart Grid Coordination Group. Smart Grid Reference Architecture; Technical Report; CEN-CENELEC-ETSI: New Delhi, India, 2012. [Google Scholar]
- Open Clearing House Protocol. Available online: http://www.ochp.eu/ (accessed on 17 March 2021).
- Open Intercharge Protocol. Available online: https://www.hubject.com/en/downloads/oicp/ (accessed on 17 March 2021).
- Open Charge Point Interface Protocol. Available online: https://ocpi-protocol.org/ (accessed on 17 March 2021).
- Open Smart Charging Protocol. Available online: https://www.openchargealliance.org/protocols/ (accessed on 17 March 2021).
- Open Charge Point Procotol. Available online: https://www.openchargealliance.org/protocols/ocpp-20/ (accessed on 17 March 2021).
- Open Automated Demand Response. Available online: https://www.openadr.org/. (accessed on 17 March 2021).
- ISO 15118-1:2013. Available online: https://www.iso.org/standard/55365.html. (accessed on 17 March 2021).
- IEC 61851. Available online: https://www.vde-verlag.de/iec-normen/224263/iec-61851-1-2017.html. (accessed on 17 March 2021).
- Falk, R.; Fries, S. Electric Vehicle Charging Infrastructure-Security Considerations and Approaches. In Proceedings of the Fourth International Conference on Evolving Internet (INTERNET), Venice, Italy, 24–29 June 2012; pp. 1–7. [Google Scholar]
- Lim, H.; Ko, J.; Lee, S.; Kim, J.; Kim, M.; Shon, T. Security Architecture Model for Smart Grid Communication Systems. In Proceedings of the 2013 International Conference on IT Convergence and Security (ICITCS), Macau, China, 16–18 December 2013; pp. 1–4. [Google Scholar] [CrossRef]
- Mustafa, M.A.; Zhang, N.; Kalogridis, G.; Fan, Z. Smart electric vehicle charging: Security analysis. In Proceedings of the 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 24 February 2013; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
- Guidelines for Smart Grid Cyber Security: Volume 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements; Technical Report; National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2010.
- Dondossola, G.; Terruggia, R. Cyber Security of Smart Grid Communications: Risk Analysis and Experimental Testing. In Cyber Physical Systems Approach to Smart Electric Power Grid; Khaitan, S.K., McCalley, J.D., Liu, C.C., Eds.; Springer: Berlin/Heidelberg, Germany, 2015; pp. 169–193. [Google Scholar]
- Tymchuk, O.; Iepik, M.; Sivyakov, A. Information Security Risk Assessment Model Based on Computing with Words. MENDEL 2017, 23, 119–124. [Google Scholar] [CrossRef]
- NIST; Aroms, E. NIST Special Publication 800-30 Risk Management Guide for Information Technology Systems; CreateSpace: Scotts Valley, CA, USA, 2012. [Google Scholar]
- Howard, M.; LeBlanc, D. Writing Secure Code; Best Practices Series; Microsoft Press: Redmond, WA, USA, 2003. [Google Scholar]
- Mell, P.; Scarfone, K.; Romanosky, S. Common Vulnerability Scoring System. IEEE Secur. Priv. 2006, 4, 85–89. [Google Scholar] [CrossRef]
- OWASP Top 10-2017 The Ten Most Critical Web Application Security Risks; Technical Report; The Open Web Application Security Project: Annapolis, MD, USA, 2017.
- Tailoring for MIL-STD-882E Including SMC Safety Requirements; Technical Report; US Department of Defense: Washington, DC, USA, 2019.
- SIG Questionnaire. Available online: https://sharedassessments.org/sig/ (accessed on 17 March 2021).
- Deloitte. Available online: https://www2.deloitte.com/de/de.html (accessed on 17 March 2021).
- Open SSL. Available online: https://www.openssl.org/news/vulnerabilities.html (accessed on 17 March 2021).
- Basmadjian, R. Flexibility-Based Energy and Demand Management in Data Centers: A Case Study for Cloud Computing. Energies 2019, 12, 3301. [Google Scholar] [CrossRef] [Green Version]
Approach | Type | Parameters | Reference |
---|---|---|---|
NIST Special Publication 800-30 | Qualitative and semi-quantitative | Likelihood and impact | [35] |
Common Vulnerability Scoring System | Semi-quantitative (0–10) | Attack vector, attack complexity, privilege required, user interaction, CIA impact, exploit code maturity, remediation level, report confidence, and security requirements | [37] |
Microsoft’s DREAD | Semi-quantitative (1–10) | Damage, reproducibility, exploitability, affected users, discoverability | [36] |
OWASP Risk Rating Methodology | Qualitative and semi-quantitative (0–9) | Likelihood based on threat agent and vulnerability factors, impact based on technical and business factors | [38] |
MIL-STD-882E System Safety | Qualitative | Severity and probability | [39] |
Automotive Safety Integrity Level (ASIL) | Qualitative | Probability, severity, controllability | ISO 26262 |
Category | CVSS Score Range |
---|---|
Low | 0.1–3.9 |
Medium | 4.0–6.9 |
High | 7.0–8.9 |
Critical | 9.0–10 |
Base Metrics | Parameter Values |
---|---|
Access Vector | local |
Access Complexity | medium |
Authentication | single |
Confidentiality Impact | partial |
Integrity Impact | partial |
Availability Impact | partial |
Temporal Metrics | Parameter Values |
Exploitability | functional exploitation |
Remediation Level | workaround |
Report Confidence | reasonable |
Environmental Metrics | Parameter Values |
Confidentiality Requirement | low |
Integrity Requirement | medium |
Availability Requirement | medium |
Overall vulnerability score | 3.0 |
Base Metrics | Parameter Values for | Parameter Values for | Parameter Values for |
---|---|---|---|
Access Vector | network | network | network |
Access Complexity | medium | low | medium |
Authentication | none | none | multiple |
Confidentiality Impact | partial | none | partial |
Integrity Impact | complete | none | partial |
Availability Impact | complete | complete | partial |
Temporal Metrics | Parameter Values for | Parameter Values for | Parameter Values for |
Exploitability | functional exploitation | PoC code | PoC code |
Remediation Level | official fix | workaround | workaround |
Report Confidence | confirmed | reasonable | reasonable |
Environmental Metrics | Parameter Values for | Parameter Values for | Parameter Values for |
Confidentiality Requirement | medium | undefined | low |
Integrity Requirement | high | undefined | low |
Availability Requirement | medium | low | low |
Overall vulnerability score | 7.7 | 4.4 | 3.9 |
Base Metrics | Parameter Values for | Parameter Values for | Parameter Values for |
---|---|---|---|
Access Vector | network | network | network |
Access Complexity | low | medium | low |
Authentication | none | none | none |
Confidentiality Impact | complete | complete | undefined |
Integrity Impact | complete | partial | partial |
Availability Impact | none | partial | undefined |
Temporal Metrics | Parameter Values for | Parameter Values for | Parameter Values for |
Exploitability | functional exploitation | PoC code | PoC code |
Remediation Level | temporary fix | temporary fix | workaround |
Report Confidence | reasonable | reasonable | reasonable |
Environmental Metrics | Parameter Values for | Parameter Values for | Parameter Values for |
Confidentiality Requirement | low | low | undefined |
Integrity Requirement | medium | medium | low |
Availability Requirement | undefined | low | undefined |
Overall vulnerability score | 7 | 6.2 | 3.0 |
Base Metrics | Parameter Values for | Parameter Values for |
---|---|---|
Access Vector | network | network |
Access Complexity | low | low |
Authentication | none | none |
Confidentiality Impact | partial | partial |
Integrity Impact | partial | partial |
Availability Impact | undefined | low |
Temporal Metrics | Parameter Values for | Parameter Values for |
Exploitability | PoC code | PoC code |
Remediation Level | temporary fix | temporary fix |
Report Confidence | unknown | reasonable |
Environmental Metrics | Parameter Values for | Parameter Values for |
Confidentiality Requirement | low | medium |
Integrity Requirement | low | medium |
Availability Requirement | undefined | low |
Overall vulnerability score | 3.9 | 4.9 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Basmadjian, R. Communication Vulnerabilities in Electric Mobility HCP Systems: A Semi-Quantitative Analysis. Smart Cities 2021, 4, 405-428. https://doi.org/10.3390/smartcities4010023
Basmadjian R. Communication Vulnerabilities in Electric Mobility HCP Systems: A Semi-Quantitative Analysis. Smart Cities. 2021; 4(1):405-428. https://doi.org/10.3390/smartcities4010023
Chicago/Turabian StyleBasmadjian, Robert. 2021. "Communication Vulnerabilities in Electric Mobility HCP Systems: A Semi-Quantitative Analysis" Smart Cities 4, no. 1: 405-428. https://doi.org/10.3390/smartcities4010023
APA StyleBasmadjian, R. (2021). Communication Vulnerabilities in Electric Mobility HCP Systems: A Semi-Quantitative Analysis. Smart Cities, 4(1), 405-428. https://doi.org/10.3390/smartcities4010023