Defence Technology (Dec 2024)

A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods

  • Tawfiq Aljohani,
  • Abdulaziz Almutairi

Journal volume & issue
Vol. 42
pp. 31 – 58

Abstract

Read online

With the continuous development of transportation electrification, the cybersecurity of energy infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool to carryout cyberattacks since EVs are not only seen as dynamic loads but also as mobile energy sources that establish two-way communications with several players in the grid. This taxonomy aims to provide a comprehensive overview of cyberattacks against EVs from four distinct perspectives. The first is the research domains of EVs application, which investigates the different fields of research related to the development and application of EVs and how they are susceptible to cyber threats. The second is the CIA-based attacks, which examines the threats to the confidentiality, integrity, and availability of EVs' sensitive information and critical systems. The third taxonomy discusses the countermeasures and defensive mechanisms to secure the EVs against cyberattacks, including preventive measures, detection algorithms, response strategy, and recovery techniques. The fourth taxonomy is the verification and validation methodologies, which explores the software tools and hardware testbeds used to test and evaluate the security of EVs against cyber threats. Finally, this taxonomy presents an understanding of the current state of cyberattacks against EVs and serves as a valuable resource for researchers and practitioners in the fields of cybersecurity and electric mobility.

Keywords