TY - JOUR
T1 - DCA
T2 - Delayed Charging Attack on the Electric Shared Mobility System
AU - Guo, Shuocheng
AU - Chen, Hanlin
AU - Rahman, Mizanur
AU - Qian, Xinwu
N1 - Publisher Copyright:
© 2000-2011 IEEE.
PY - 2023/11/1
Y1 - 2023/11/1
N2 - An efficient operation of the electric shared mobility system (ESMS) relies heavily on seamless interconnections among shared electric vehicles (SEV), electric vehicle supply equipment (EVSE), and the grid. Nevertheless, this interconnectivity also makes the ESMS vulnerable to cyberattacks that may cause short-term breakdowns or long-term degradation of the ESMS. This study focuses on one such attack with long-lasting effects, the Delayed Charge Attack (DCA), that stealthily delays the charging service by exploiting the physical and communication vulnerabilities. To begin, we present the ESMS threat model by highlighting the assets, information flow, and access points. We next identify a linked sequence of vulnerabilities as a viable attack vector for launching DCA. Then, we detail the implementation of DCA, which can effectively bypass the detection in the SEV's battery management system and the cross-verification in the cloud environment. We test the DCA model against various Anomaly Detection (AD) algorithms by simulating the DCA dynamics in a Susceptible-Infectious-Removed-Susceptible process, where the EVSE can be compromised by the DCA or detected for repair. Using real-world taxi trip data and EVSE locations in New York City, the DCA model allows us to explore the long-term impacts and validate the system consequences. The results show that a 10-min delay results in 12-min longer queuing times and 8% more unfulfilled requests, leading to a 10.7% ( 311.7) weekly revenue loss per driver. With the AD algorithms, the weekly revenue loss remains at least 3.8% (111.8) with increased repair costs of 36,000, suggesting the DCA's robustness against the AD.
AB - An efficient operation of the electric shared mobility system (ESMS) relies heavily on seamless interconnections among shared electric vehicles (SEV), electric vehicle supply equipment (EVSE), and the grid. Nevertheless, this interconnectivity also makes the ESMS vulnerable to cyberattacks that may cause short-term breakdowns or long-term degradation of the ESMS. This study focuses on one such attack with long-lasting effects, the Delayed Charge Attack (DCA), that stealthily delays the charging service by exploiting the physical and communication vulnerabilities. To begin, we present the ESMS threat model by highlighting the assets, information flow, and access points. We next identify a linked sequence of vulnerabilities as a viable attack vector for launching DCA. Then, we detail the implementation of DCA, which can effectively bypass the detection in the SEV's battery management system and the cross-verification in the cloud environment. We test the DCA model against various Anomaly Detection (AD) algorithms by simulating the DCA dynamics in a Susceptible-Infectious-Removed-Susceptible process, where the EVSE can be compromised by the DCA or detected for repair. Using real-world taxi trip data and EVSE locations in New York City, the DCA model allows us to explore the long-term impacts and validate the system consequences. The results show that a 10-min delay results in 12-min longer queuing times and 8% more unfulfilled requests, leading to a 10.7% ( 311.7) weekly revenue loss per driver. With the AD algorithms, the weekly revenue loss remains at least 3.8% (111.8) with increased repair costs of 36,000, suggesting the DCA's robustness against the AD.
KW - Delayed charging attack
KW - cybersecurity
KW - electric shared mobility system
KW - false data injection attack
KW - shared electric vehicle
UR - http://www.scopus.com/inward/record.url?scp=85163509576&partnerID=8YFLogxK
U2 - 10.1109/TITS.2023.3287792
DO - 10.1109/TITS.2023.3287792
M3 - Article
AN - SCOPUS:85163509576
SN - 1524-9050
VL - 24
SP - 12793
EP - 12805
JO - IEEE Transactions on Intelligent Transportation Systems
JF - IEEE Transactions on Intelligent Transportation Systems
IS - 11
ER -