Abstract
To support the increasing spread of Electric Vehicles (EVs), Charging Stations (CSs) are being installed worldwide. The new generation of CSs employs the Vehicle-To-Grid (V2G) paradigm by implementing novel standards such as the ISO 15118. This standard enables high-level communication between the vehicle and the charging column, helps manage the charge smartly, and simplifies the payment phase. This novel charging paradigm, which connects the Smart Grid to external networks (e.g., EVs and CSs), has not been thoroughly examined yet. Therefore, it may lead to dangerous vulnerability surfaces and new research challenges.
In this paper, we present EVExchange, the first attack to steal energy during a charging session in a V2G communication: i.e., charging the attacker’s car while letting the victim pay for it. Furthermore, if reverse charging flow is enabled, the attacker can even sell the energy available on the victim’s car! Thus, getting the economic profit of this selling, and leaving the victim with a completely discharged battery. We developed a virtual and a physical testbed in which we validate the attack and prove its effectiveness in stealing the energy. To prevent the attack, we propose a lightweight modification of the ISO 15118 protocol to include a distance bounding algorithm. Finally, we validated the countermeasure on our testbeds. Our results show that the proposed countermeasure can identify all the relay attack attempts while being transparent to the user.
You have full access to this open access chapter, Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
The fast growth of Electric Vehicles (EVs) in the market led to the diffusion of new architectures to support the energy demeaning required by the vehicles’ battery charging. Despite the global pandemic, the sales of EVs in the first quarter of 2021 were more than 2.5 times higher than in the same months of the previous year [40]. Furthermore, the International Energy Agency estimates that if governments agreed to encourage the so-called “Green Transition”, EVs could reach 230 million by 2030. Vehicle vendors such as Honda plans to convert to electric its entire car production by 2040 [36]. This transition process is also facilitated by the global economic trend, pushing the adoption of renewable energies. The growing concern about the climate crisis leads to a worldwide movement to create a green and sustainable future. In 2018, The United States Environmental Protection Agency estimated that the \(28.2\%\) of Greenhouse Gas Emissions in the US is due to the transportation sector [1].
With such a forecast on the increase of EVs, the energy request from the electric grid will grow as well. This electric demand increase requires smart management of the charging process of each device to avoid overloads and local blackouts. The most common and upcoming paradigm employed to manage the charging of the EVs is the Vehicle-to-Grid (V2G). V2G systems manage the energy distribution from a Smart Grid to the vehicles (i.e., the final user) by providing a communication channel between the two parties [38]. It can be used for various features, from the charging schedule during off-peak hours to more advanced services such as automatic authentication and billing.
V2G is a novel paradigm and, for this reason, it still requires many investigations on security features. When designing such a complex and highly interconnected scenario, security aspects represent extensive and complex requirements, as highlighted by different works [3, 33]. For instance, by exploiting the unique MAC address of a vehicle and unshielded charging cables, it is possible to track a user across different stations [5]. Since V2G can provide a complete internet connection, the EV is exposed to various threats like malware, affecting the vehicle’s internal components. The charging column can be attacked as well, for instance by a denial of service attack, blocking the delivering of the charge service to the users. Other exploits which have been proved to be effective in the V2G scenario include the profilation of the battery behavior [39] and the profilation of the vehicle charging process [8] based on the electric traces generated from the charging process.
Contribution. In this paper, we present EVExchange, the first relay attack specifically conceived for V2G communication. EVExchange allows the attacker to exchange the charging flows accounting a victim for the energy consumed. We implemented EVExchange in both an emulated scenario employing MiniV2G [4] and in a physical testbed composed of different Raspberry Pi, proving its functioning and effectiveness. Finally, we propose an extension of the ISO 15118 protocol (i.e., the standard protocol in V2G communication) that utilizes distance bounding to identify relay attack attempts. We tested the distance bounding protocol in both scenarios under different conditions, proving its ability to identify the relay attack. The contributions of the paper are summarized as follow:
-
We propose EVExchange, the first relay attack conceived for V2G communication.
-
We implemented EVExchange in simulated and emulated scenarios based on the ISO 15118 charging protocol standard.
-
We prove the effectiveness of EVExchange in stealing the power intended for the victim’s car.
-
We propose a countermeasure which allows to early identify relay attacks such as EVExchange. We tested such countermeasure under different scenarios and conditions, proving its effectiveness.
Organization. The remainder of the paper is organized as follows. Section 2 briefly recalls the main concepts useful for the goal of the paper, while Sect. 3 provides an overview of the related work. Section 4 outlines the system model and the adversary model assumed. Then, Sect. 5 presents EVExchange attack and its implementation, while Sect. 6 describes the proposed countermeasure. Finally, Sect. 7 concludes the paper with some final remarks.
2 Background
This section overviews the basic concepts related to the electric vehicle charging system from a communication perspective. In Sect. 2.1, we introduce the V2G paradigm, while in Sect. 2.2 we analyze the most advanced standard in this field. Then, in Sect. 2.3 we recall the concept of relay attacks.
2.1 Vehicle-To-Grid (V2G)
The Vehicle-To-Grid (V2G) concept refers to how an Electric Vehicle can communicate with the power grid. It is a feature reserved for Mode 3 and Mode 4 charges, while Mode 1 and Mode 2 have no communication at all since they employ standard and non-dedicated socket outlets [44]. The communication can range from simple signaling to high-level communication adopting most of the ISO/OSI layers. On the energy side, we can identify two different versions. Unidirectional V2G (also referred to as V1G) employs the communication to manage the charging of the EV smartly. V1G can offer services to the grid, such as load leveling by shifting the power demand to off-peak hours, and the EV owners, by charging the EV when the energy price is lower. This strategy can impact the grid’s performances avoiding overloads and local blackouts without requiring huge investments in the infrastructure [38].
The bidirectional V2G represents an advanced paradigm. In addition to offering smart management of the charging process, it enables the EV to create a bidirectional power flow with the grid. The discharge of a vehicle can be useful for the grid and the EV’s owner in different contexts. The grid can benefit from ancillary services such as frequency regulation and balancing, load leveling, and voltage regulation. On the other side, EV owners can get revenues from the power sold to the grid [14].
To support the V2G paradigm, different players proposed different communication protocols. The most widely adopted protocols for the front-end communication between the vehicle and the Electric Vehicle Supply Equipment (EVSE) are ISO 15118, SAE J2847, and CHAdeMO. In the back-end communication between EVSEs and control centers, ISO 61850 and Open Charge Point Protocol are the most used [34].
In this paper, we uniquely focus on front-end communication. Nowadays, CHAdeMO can be considered the defacto standard. It enables communication through a Control Area Network and does not support any authentication method for the vehicle. However, it is available only on expensive DC chargers, not very suited for private owners. SAE J2847 was instead designed for homes. It supports AC and DC charging through Power Line Communication (PLC) communication, and it is suited to manage different technologies, such as smart air-conditioning or smart refrigerators. However, with the expected increase of EVs in the next years, this integration can make it difficult to develop algorithms to manage all the devices smartly. The most advanced standard is the ISO 15118 [27, 29]. It supports both AC and DC charging and shares the same communication means of SAE J2847, making it possible to employ the same infrastructure partially. Since ISO 15118 can support a vast number of services, ranging from authentication to vehicle’s firmware update [9], it aims to be implemented globally and become the standard for the future of electric mobility.
2.2 ISO 15118
Firstly released in 2013, ISO 15118 is a modern standard for the regulation of the communications between the Electric Vehicle Communication Controller (EVCC) and the Supply Equipment Communication Controller (SECC). EVCC and SECC are, respectively, the endpoints that manages the transmission on the EV and EVSE [27, 29]. It defines a communication channel via PLC on the Control Pilot (CP) of the IEC 62196 connectors [26].
At the beginning of the connection, the Signal Level Attenuation Characterization (SLAC) protocol is employed to pair EVCC and SECC through a series of pulses. Then, the EVCC broadcasts a default number of UDP packets following the SECC Discovery Request (SDP) protocol to retrieve the IPv6 local-link address of the connected SECC. After that, the High-Level Communication Protocol (HCP) starts using a TCP communication, generally ciphered using TLS. More information on the packets exchanged can be found in [4].
Unlike the oldest standards (e.g., CHAdeMO), which employ the communication channel only to exchange technical information about the battery and the recharge process, ISO 15118 leverages the high-level communication to provide many services to the grid and the user. The authentication process is based on TLS protocol. The TLS certificate employed for the authentication can be obtained or updated during the connection phase. Payments are managed by the standard which supports External Identification Means such as credit cards, RFID cards, or QR codes. Furthermore, ISO 15118 provides a highly comfortable service called Plug-and-Charge (PnC). This mechanism allows the user to be automatically accounted for the energy requested without using a card or other payment means at the moment of the recharge. In this way, the user only need to insert the plug in his vehicle socket to start the charging process. The PnC authentication mechanism employs the TLS certificate installed in the vehicle and used by the charging system identifies the car [16]. The owner can obtain its personal certificate by registering with a charging service provider, as defined in the ISO 15118 standard [27]. However, as we will see in this paper, PnC can expose the user to some security threats.
2.3 Relay Attacks
A relay attack is a technique through which an attacker can intercept communication between two entities and replay it in another place in space and time through a proxy [22]. It differs from a Man-in-the-Middle attack since there is no hypothesis that the attacker can understand or modify the information relayed (e.g., communication can be encrypted).
Relay attacks are powerful in many applications, generally in the case of transmission of blocks of independent information or encrypted data. For instance, proximity cards (e.g., credit cards) are a profitable target for relay attacks. In this scenario, the card and the receiver perform mutual authentication, and then all the subsequent traffic is encrypted. Using cryptanalysis to recover the keys might be unfeasible or may require tampering with the hardware with costly instrumentation. An attacker can exploit a relay attack to transfer the entire data flow (including the authentication) from the card to a remote reader. A practical attack consists of relaying the data flow from a victim’s credit card to a reader near the attacker to account the victim for the payment.
3 Related Works
Although electrical vehicle charging systems are a novel topic, various research papers have examined various aspects of their security. Mustafa et al. [33] proposed a security analysis of the charging system, highlighting different threats for charging at home, at work, or in public places. A similar investigation was conducted by Antoun et al. [3] showing possible countermeasures for ISO 15118 and OCPP. Other works addressed specifically the ISO 15118 standard [6, 31] proposing threats analysis and security mitigations. However, none of these works analyzed the threats deriving from relay attacks in the charging process or tested the feasibility of the presented attacks in a real or emulated environment.
Few researchers conducted in-depth studies on aspects related to the security of the ISO 15118 standard. Martinovic and Baker showed that it is possible to eavesdrop on the communication between a vehicle and a charging column exploiting the electromagnetic emissions of the PLC on an unshielded cable [5]. Hofer et al. [25] focused on privacy aspects presenting POPCORN, a protocol that enhances privacy on the ISO 15118 standard. To participate in V2G communication and especially to use PnC, EV should maintain keys and certificates stored inside the vehicle itself. To store these data safely, Fuchs et al. [21] designed HIP, a backward-compatible protocol extension for ISO 15118, which enables the generation and storing of keys in a Trusted Platform Module (TPM) within the vehicle. Despite an increasing interest in these security aspects of the standard, to the best of the author’s knowledge, there are no available solutions to protect against EVExchange or similar relay attacks.
There are many scenarios in which relay attacks are used. Its application on Near Field Communication (NFC), for instance, is analyzed in different works in literature [11, 20]. Recently, researchers have successfully proved the effectiveness of a relay attack on the SARS-CoV-2 contact tracking application, proposing a hashing-based countermeasure to secure the environment without losing privacy [10]. Also the vehicular environment was interested in this kind of attack: examples in the literature show possible relay attacks conducted on the passive keyless entry [19]. In [37] the authors propose a solution to enforce the relay resilience of cryptographic protocols in such application, based on a crypto-chain framework. While there are numerous studies focused on the communication between vehicles and keys, to the best of our knowledge, this is the first study that highlights the threat of relay attacks on a V2G communication.
4 System and Adversary Models
To be successfully implemented, EVExchange must be performed in a scenario that respects different assumptions from the system and attacker points of view. In this section we outline the system model and we detail the assumption an attacker must respect to implement EVExchange.
System Model. Figure 1a represents the scenario in which the EVExchange attack can be performed. As reported in the figure, two EVs are connected to two EVSEs which are in turn managed by the same back-end infrastructures. Since the victim will set the charging parameters used for the attacker’s vehicle charge, the attacker must carefully choose two charging columns entirely supported by his vehicle. If more than two EVSEs are available, the attack can be easily extended. However, in this work, we focus on the basic scenario with two EVs and two EVSEs. The front-end communication (i.e., between the vehicle and the charging column) employs the most common ISO 15118 standard using the PnC authentication method. Alternatively, this attack is also valid if other means for automatic billing based on a particular ID of the EV are used, such as Autocharge [17] which employs the MAC address of the EV and is commonly used in North Europe.
EV and EVSE are connected via wired cables, that is the most common setting for power and data, which travel in different cables. Examples of widely employed sockets outlets are Type 1 or Type 2 for AC and Combo 1 or Combo 2 for DC [43]. There are no substantial differences between them for the purpose of this paper, as soon as the communication is established and billing data are transmitted through the cable in the CP pin. It can also be possible to extend EVExchange when wireless communication is employed in the charging process between EV and EVSE. However, we do not consider wireless charging in this work since it is currently rarely used in the real world.
Adversary Model.
As a preliminary phase, the attacker must tamper with the charging station to install two malicious devices (i.e., Dev1 and Dev2) as depicted in Fig. 1b. The two devices can be two simple microcomputers (e.g., Raspberry Pi) with two interfaces to demodulate the PLC in the CP pin and WiFi connection capabilities. A highly skilled attacker could design an ad-hoc device to minimize the device’s size to remain undetected. Ideally, each device can be placed in the socket as an adapter, essentially invisible to an average user. Other solutions could be to cut the charging cable to extract the CP cable, cut it and connect it to the two PLC interfaces of the device. The best solution depends on the charging column’s type.
Furthermore, the two devices must be connected with each other. While a wired connection is the most reliable and fast solution, it can be visible and could create some suspicion in the user. A wireless connection is the most suited and straightforward approach to avoid this issue. In this work, we employed a standard WiFi connection (i.e., IEEE 802.11ac and IEEE 802.11g) with an intermediate Access Point and in an ad-hoc configuration. If the distance between the two devices is significant, high-range wireless connections (e.g., 4G/LTE) can also be employed.
Once installed and activated, the two devices must block the communication channel between each EV and its legitimate EVSE. Then, they must function as a relay by forwarding the communication coming from an EV to the other device (called Dev1 to Dev2 relay, or viceversa), which will recreate the data flow on the EVSE side. It is worth noting that the two devices do not need to read the content of the forwarding traffic. This is important because the security standard imposes the usage of TLS to encrypt the communication channel in public places, especially when using PnC [29]. However, as reported in [5], this security measure is often not implemented in practice, exposing the users to many security issues [4]. However, even if the traffic is encrypted, the relay process is still feasible, and EVExchange can be performed. In this work, we will assume that all the communications between EV and EVSE are always encrypted using TLS. The adversary does not have any valid certificate in addition to the one in the EV. Therefore, it is computationally infeasible for an attacker to decrypt and modify packets on the fly. The attacker is only able to stop and forward the communication flow.
The key concept to enable EVExchange attack is that, while the communication flows are forwarded as described above, the energy provided from the two EVSEs is instead directed to the legitimate vehicle (Fig. 1b). In this way, the attacker can control the energy supplied by the victim’s EVSE and vice versa.
5 EVExchange Attack
After setting the two devices, the attacker can proceed with the EVExchange attack. We now describe the attack stages through which an attacker can make the victim pay for the energy consumed. We will use Fig. 1b as reference.
The attacker waits for a victim to arrive at the charging station. When the victim plugs the vehicle into the EVSE A, the attacker will follow by plugging his or her EV into EVSE B. At this point, both users are required to set the charging options they need (e.g., time of departure, energy requirements). Since the two malicious devices are activated, each request made by a user will trigger an action in the EVSE of the other user.
At this point, to be stealthy, the attacker must replicate the victim’s request. However, since the attacker has no clues on the victim’s behavior, he can suppose with discrete confidence that the victim will require charging the vehicle since it is the most common operation at charging stations. While it is reasonable to assume that the user will look at the EVSE’s display to verify the start of the charging process, the victim probably will not notice a minor difference in the charging parameters, provided that they are displayed in the EVSE. As an example, the forecast duration of the charging process is variable based on the state of charge, the charger type, and the time of the charging. Therefore, it is improbable that an average user can precisely predict this parameter and spot the attack through it. After requesting the service, since the charging process can take longer, the victim will usually get away from the vehicle to spend the time doing other things while the EV is charging. At this moment, the attacker, who controls the victim’s EVSE, can require a stop of charging from the attacker’s vehicle. The attacker will now trigger a stop in energy provision in the victim’s EVSE (i.e., EVSE A). At the same time, the EVSE connected to the attacker’s vehicles (i.e., EVSE B) will continue to follow the victim’s request.
Then, when the attacker is satisfied with the charge of the vehicle, he or she can wait for the victims to come back and request a stop of charge for the attacker’s EV. Alternatively, the attacker could stop the charging process before the end in his or her charging column to unlock the vehicle and go away, for instance, by using the Emergency Stop button.
Since PnC is employed by the two users in this scenario, the payment of the energy provided to the attacker’s EVSE will be billed to to the victim. In the same way, the energy supplied to the victim’s EV will be billed for by the attacker but, since the attacker has previously stopped the charge of the victim (at the moment the victim has moved away), he will pay virtually nothing. In contrast, the victim will be billed for a complete charge.
In the following we summarize the steps of EVExchange . These steps are also illustrated in Fig. 2.
-
0.
The attacker places the two devices as depicted in Fig. 1b;
-
1.
The victim connects the vehicle to EVSE A; the attacker connects the vehicle to EVSE B;
-
2.
The two vehicles start a communication with a charging request which is forwarded by the malicious devices;
-
3.
The victim, unaware of the attack, goes away from the vehicle;
-
4.
The attacker, while recharging by the victim’s charging schedule, stops the victim’s charge.
-
5.
When the victim is back, he or she stops the charging process of the attacker.
5.1 Variations of the Attack
EVExchange attacks can be tailored to achieve different goals. We report here two examples, but many others could be possible.
Discharge Victim’s Battery. We assume a system supporting the bidirectional charge (i.e., the vehicle can sell energy to the grid during peak hours and provide ancillary services to the grid [14]). In this case, since the attacker controls the victim’s communication with the EVSE, he can decide to sell the energy to the grid the power in the battery. Furthermore, by doing so, the revenue will be billed for in the attacker’s account.
Damage Victim’s Battery. One of the most delicate components of the vehicle is undoubtedly the battery. It is subjected to fast degradation through usage, which is responsible for reducing the maximum capacity over time [35]. In [8] the authors demonstrate the possibility to profile a vehicle based on the battery charging profile. Some situations can speed up the degradation process, such as extreme operation temperatures, overcharging, and completely draining the battery [45]. Since the attacker controls the victim’s charging parameters, he or she can overcharge the battery by requiring energy even if the battery is full. If the bidirectional charge is available, full discharge can be performed as well. Furthermore, an advanced attacker could modify the EVCC or, more simply, modify packets with battery status on the fly to send abnormal charging parameters to the victim’s charging column requiring an amount of energy that may damage the battery.
5.2 Attack Validation
The EV charging infrastructure is complex to reproduce and manage since it involves different technical aspects, from the energy to the communication, and includes expensive components. The most common workaround to these limitations is the usage of simulators or emulators. We started our study by testing the attack on implementation of the scenario in MiniV2G [4], an open-source emulator able to simulate networks of EVs and EVSEs. MiniV2G is built on top of Mininet-WiFi [18], a popular software to create realistic virtual networks, running real kernel, switch, and application code. Furthermore, MiniV2G includes RiseV2G [13], an open-source simulator to implement the ISO 15118 communication. Currently, MiniV2G can only emulate the network communication between EVs and EVSEs without simulating the actual battery charging process. However, this limitation does not affect the implementation of EVExchange since it is entirely implemented at a network level. For space limitation, we will not discuss the MiniV2G implementation in this work, but we will focus on the development of the physical testbed. However, the MiniV2G implementation and all the code related to this work can be found on GithubFootnote 1.
We preliminary verified the feasibility of EVExchange on MiniV2G and then we implemented a more realistic scenario by using six Raspberry Pis to emulate vehicles, charging columns, and malicious devices. We used the Ethernet interfaces to simulate the PLC communication while we employed GPIO pins to emulate the energy exchange. We install LEDs to monitor the different stages (i.e., battery charging, energy delivered, authentication completed). As in MiniV2G, we employ RiseV2G in the physical testbed to perform the ISO 15118 communication, with a Python wrapper to turn on the LEDs. Figure 3a represents a high-level schema of the testbed, while Fig. 3b illustrates a picture of the testbed developed.
To connect the malicious devices and allow the packets forwarding, we employ Linux bridge [23] command to create a channel between the two physical interfaces in each device. These settings do not alter the normal communication flow between EV and EVSE.
When the scripts to activate EVExchange are executed, bridges are deactivated, and the attack is set up by employing Virtual eXtensible Local Area Network (VXLAN) [32]. Generally, this tool addresses the need for overlay networks within virtualized data centers accommodating multiple tenants. In our case, we employ VXLANs to create two independent data flows over the wireless network, which can transport packets from one interface of Dev1 to the opposite interface of Dev2. We employ this strategy to configure EVExchange by relaying data from each EV to the opposite EVSE.
6 Countermeasure
To prevent EVExchange and other potentially related attacks, in this section, we present an extension of the ISO 15118 protocol, which contains a countermeasure based on a distance bounding algorithm. In particular, in Sect. 6.1 we design the distance bounding protocol, while in Sect. 6.2 we discuss the security and the limitation of the proposed algorithm. Then, in Sect. 6.3, we describe an implementation of the protocol, providing some numerical results.
6.1 Distance Bounding Protocol
To create a countermeasure against EVExchange, we can exploit the temporal delay created by the relay process of the communication flows through a wireless channel. The strategy of measuring distance between two devices by considering the Round Trip Time (RTT) is known as distance bounding [7]. As demonstrated in its applications in different contexts in the literature, this approach is the most simple and effective solution to relay attacks. Distance bounding is applied for instance in contactless smart cards [15], NFC devices [24, 41], and Passive Keyless Entry [46]. This protocol is well suited to work at the application layer in preventing relay attacks since these threats inevitably introduce a measurable delay in the communication.
In general, the distance bounding enables one device (the verifier) to securely establish an upper bound on its distance to another device (the prover) [42]. In our case, the verifier is the victim’s EV, which wants to check the authenticity of the charging column to which its connected. We consider the EVSE (from now on called supply equipment SE to avoid confusion) as the prover. Therefore, the algorithm’s goal is to assess the EV is connected to the correct SE by verifying that the distance between them is no more than an expected value.
The phases of the proposed distance bounding protocol are similar to those proposed by Thorpe et al. [41], where the authors designed a protocol at the application layer of the NFC protocol. Our algorithm starts after the establishment of the IPv6 connection when the SE starts the listening mode. The core of the proposed solution resides in the fast packet exchange. In this phase, one entity will immediately respond to each packet sent by the other. It is possible to compute the RTT precisely and estimate the distance between the two entities from each exchange. In the following, we explain the different phases of the algorithm in detail. Figure 5, in Appendix A, graphically summarizes the steps of the protocol.
-
1.
EV generates a random string \(\alpha =\{\alpha _1, \alpha _2,\dots ,\alpha _k\}\) with a fixed length k. Meanwhile, SE generates a random string \(\beta =\{\beta _1,\beta _2,\dots ,\beta _k\}\) of the same length k. These two steps can be done beforehand.
-
2.
The fast packet exchange starts for every \(i=1,2,\dots ,k\) and the \(RTT_i\) is measured:
-
EV send a UDP packet to SE containing as data the symbol \(\alpha _i\);
-
SE receives \(\alpha _i\) and immediately responds with an UDP packet including \(\beta _i\).
-
-
3.
After k exchanges, EV computes the mean \(\mu \) and the standard deviation \(\sigma \) of the RTTs.
-
4.
EV compares \(\mu \) and \(\sigma \) with \(\mu _{max}\) and \(\sigma _{max}\), which represent the thresholds for \(\mu \) and \(\sigma \), respectively. If \(\mu >\mu _{max}\) or \(\sigma >\sigma _{max}\), an error is thrown indicating an attack could be going on.
-
5.
If no alert is raised, the secure communication using TLS between the two entities can start as depicted in ISO 15118. Before actually exchanging charging parameters and setting, SE sends to EV the string \(S_{SE}=\{\tilde{\alpha _1},\beta _1,\dots \tilde{\alpha _k},\beta _k\}\).
-
6.
EV computes \(S_{EV}=\{\alpha _1,\tilde{\beta _1},\dots ,\alpha _k,\tilde{\beta _k}\}\) and compares \(S_{EV}\) with \(S_{SE}\). If the two strings differ, an alert is raised since an attacker might have forged some packets.
-
7.
Finally, if no alerts have been raised, the actual charging process can start following the ISO 15118 protocol.
6.2 Security Considerations
An attacker can employ a series of malicious devices placed in the middle between the EV and the EVSE. For visualization simplicity, in Fig. 5, we represent this set of devices as one single entity called relay as a black-box. Considering the adversary devices as a black-box is a reasonable simplification since the legitimate user is unaware of them. We remark that the relay device can selectively or completely relay the traffic flow from two entities as for our hypothesis. Furthermore, the relay can eavesdrop on all the not-encrypted communication between the two entities, but it is not equipped with a valid and signed pair of keys to initialize TLS sessions. We do not assume any restriction of the computational capabilities of the adversary. However, it is reasonable to assume that the attacker cannot decipher or modify communication encrypted with TLS.
The proposed distance bounding protocol performs two verifications on the communication. The first one is represented by the effective distance measurement provided by the RTTs. The attacker may try to tamper with it by reducing the latency generated by the relay. However, each strategy must be consistent and avoid failure in the second check during the verification of the transmitted data.
To lower the RTTs, an attacker can reduce the relay’s complexity by employing, for instance, a faster transmission mode. We exclude the possibility of applying a wired connection since it will be easily spottable by an average user or the service provider. Furthermore, it is common for normal and semi-fast charging stations to be equipped with a detachable cable that must be carried by the driver [44], making even more identifiable a wired relay. An alternative is to employ faster wireless communication modes with respect to the IEEE 802.11 standard, such as 5G, to reduce the protocol overhead and any protocol mode translation. However, this would, on the other hand, increase the system’s cost and complexity. For short distances, Bluetooth can be considered, but it will lead to equal or lower performances as WiFi [30]. It is worth noticing that the PLC employs HomePlug Green PHY, which has almost no delay at the MAC layer when applied between two entities only [12], making it even harder to create a fast enough channel to avoid detection. Furthermore, it is important to recall that the implementation must be small enough not to draw the victim’s attention.
The previous strategies represent attack optimizations to faster the packet exchange. Another strategy to reduce the RTT could be to tamper with the initial packet flows. Since the initial rapid packet exchange is performed without encryption, the attacker could potentially alter the transmission of the packets. For instance, an attacker can decide to send random \(\beta _i\) immediately after seeing an \(\alpha _i\) to reduce the RTT. This process might bypass the first alert control assuring a lower \(\mu \) and \(\sigma \), but it will be detected during the second control when comparing \(S_{EV}\) and \(S_{SE}\). By defining \(\alpha _i\) and \(\beta _i\) values from an alphabet of N symbols, the probability for the attacker to correctly guess the entire string \(\beta \) is \(\frac{1}{N^k}\). Assuming to employ only the 128 ASCII chars and a sequence of \(k=10\) exchanges, we obtain a probability of success for the attacker of \(\frac{1}{128^{10}}\approx 10^{-22}\) which is negligible. We can further reduce this probability by implementing additional exchanges k and a larger alphabet N.
Note that the proposed protocol does not try to prevent relay from knowing both \(\alpha \) and \(\beta \). Instead, it imposes bounds on the maximum time by which the information must be received. In other words, when relay read the packet containing \(\beta _i\), it introduces a delay that makes it too late for the forwarding of the packet to EV and the achievement of a low RTT. Furthermore, the transmission of \(S_{SE}\) secured by the TLS ensures that relay cannot be able to modify it. The only way it is possible to change \(S_{SE}\) by an attacker in possession of valid TLS certificates is to pretend to be EV and SE when sending messages to SE and EV, respectively. However, we can reasonably assume that the Public Key Infrastructure is solid, and the attacker cannot craft private keys and certificates. Nevertheless, it is essential that both the legitimate entities check the validity of their counterpart’s certificates before starting the charging process.
6.3 Evaluation
To implement the distance bounding algorithms, we wrote two Python scripts to be executed in the EV and the SE, respectively. The protocol starts with a pair of hello messages that enables the EV to get the IPv6 of the SE. Then, the EV starts the algorithm by sending a UDP packet to the SE that acts as a server and immediately responds. This process is iterated 100 times to account for the channel variability. To evaluate, we compute the mean and the standard deviation of every set of measures. We perform 1000 executions of the described protocol for each scenario to validate the countermeasure.
To verify the feasibility and effectiveness of our countermeasure, we preliminary test it on the MiniV2G emulator under different propagation models and on the physical testbed with different distances between the devices. We report in the following the results related to the physical testbed, and for space limitations, we report in Appendix B the result of the MiniV2G emulation. We create different configurations on the testbed in order to represent different possible scenarios:
-
1.
A completely legitimate solution, without malicious devices in place (Wired);
-
2.
A legitimate scenario, with malicious devices inserted but turned off (Wired OFF);
-
3.
An attack scenario, where the two malicious devices are connected through a cabled Ethernet connection (Wired ON);
-
4.
An attack scenario, where the two malicious devices are connected through a WiFi connection with a router in the middle, placed at 5cm (WiFi 5cm) or 2m (WiFi 2 m) from the victim.
-
5.
An attack scenario, where the two malicious devices are connected through ad-hoc WiFi connection (i.e., without any router in the middle). In this case, we avoid the extra hop between the two malicious devices given by the router (WiFi ad-hoc).
We represent the mean RTT in Fig. 4a and the standard deviation of the RTT in Fig. 4b. The error bar represents the 99% percentile. There is a clear separation between the wired data with respect to all the attack cases. This makes it simple to search for good threshold values for \(\mu _{max}\) and \(\sigma _{max}\), which are represented as a horizontal dashed line. Based on the data we have obtained during our tests, we can safely set \(\mu _{max}=2\times 10^{-3}\) and \(\sigma _{max}=0.5\times 10^{-3}\), without almost any risk of having false positives or false negatives.
Note that the time needed for the distance bounding algorithms is generally less than 0.06s using 100 fast exchanges, with tops of about 0.3s when under attack, which is in practice a rare condition. Furthermore, sufficient security could be ensured even with a few exchanges, reducing the time requirements. Since a charge could last from half an hour to several hours, we can say that extra time added from this countermeasure is negligible and invisible to the end-user. We must underline that the experiments were performed in a controlled environment. A thorough evaluation of distance bounding should include a broader spectrum of devices and a wider range of environmental conditions. However, this is beyond the scope of this work.
7 Conclusions
To support the ongoing diffusion of EVs, the charging process’s cybersecurity must be considered to improve users’ trust in the system. We demonstrated for the first time that EVExchange, a relay attack, is a potent threat against the electric vehicle charging environment against the ISO 15118 protocol. On one side, EVExchange can harm the victim, avoiding the charge of its vehicle. On the other side, EVExchange can damage the EV by exploiting wrong charging parameters and useless charging cycles. Furthermore, EVExchange allows the attacker to obtain a profit such as free energy and money from the victim.
To defend against relay attacks, we developed an effective countermeasure able to identify the relay attack in the early stages before sensitive data are shared. The security mechanism adapts distance bounding algorithms to work in the application layer of the ISO 15118 protocol. The countermeasure can always detect the attack in less than 0.3s without affecting the normal communication if no attack occurs.
Since ISO 15118 is a novel protocol, we believe that our work can help the secure development of future versions (such as ISO/DIS 15118–20, under development at the moment of writing [28]), integrating countermeasures against relay attacks. In future works, the development of novel technology like Wireless Power Transfer could enable a possible extension of EVExchange to wireless communication between EV and EVSE.
Notes
- 1.
“EVExchange" on Github, github.com/donadelden/evexchange
References
Agency, U.S.E.P.: “Sources of Greenhouse Gas Emissions" (2016). https://www.epa.gov/ghgemissions/sources-greenhouse-gas-emissions, Accessed 20 May 2021
Akhtar, T., Politis, I., Kotsopoulos, S.: Wireless channel characterisation over simulations for an indoors environment at 2.4 GHz. In: Sucasas, V., Mantas, G., Althunibat, S. (eds.) BROADNETS 2018. LNICST, vol. 263, pp. 387–397. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-05195-2_38
Antoun, J., Kabir, M.E., Moussa, B., Atallah, R., Assi, C.: A detailed security assessment of the EV charging ecosystem. IEEE Netw. 34(3), 200–207 (2020)
Attanasio, L., Conti, M., Donadel, D., Turrin, F.: MiniV2G: an electric vehicle charging emulator. In: Proceedings of the 7th ACM Cyber-Physical System Security Workshop (CPSS 2021), 7 June 2021, Virtual Event, Hong Kong, vol. 1. ACM (2021)
Baker, R., Martinovic, I.: Losing the car keys: wireless phy-layer insecurity in EV charging. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 407–424. USENIX Association, Santa Clara, CA (2019)
Bao, K., Valev, H., Wagner, M., Schmeck, H.: A threat analysis of the vehicle-to-grid charging protocol ISO 15118. Comput. Sci. Res. Dev. 33(1–2), 3–12 (2018)
Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48285-7_30
Brighente, A., Conti, M., Donadel, D., Turrin, F.: Evscout2.0: electric vehicle profiling through charging profile. arXiv preprint arXiv:2106.16016 (2021)
Buschlinger, L., Springer, M., Zhdanova, M.: Plug-and-patch: secure value added services for electric vehicle charging. In: ACM International Conference Proceeding Series (2019)
Casagrande, M., Conti, M., Losiouk, E.: Contact tracing made un-relay-able. In: CODASPY 2021, pp. 221–232. ACM, New York, USA (2021)
Cavdar, D., Tomur, E.: A practical NFC relay attack on mobile devices using card emulation mode. In: 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2015 - Proceedings, pp. 1308–1312 (2015)
Chung, M.Y., Jung, M.H., Lee, T.J., Lee, Y.: Performance analysis of HomePlug 1.0 MAC with CSMA/CA. IEEE J. Select. Areas Commun. 24(7), 1411–1420 (2006)
Clarity, V.: “Reference Implementation Supporting the Evolution of the Vehicle-2-Grid communication interface ISO 15118" (2020). https://v2g-clarity.com/rise-v2g/, Accessed 14 May 2021
Clement-Nyns, K., Haesen, E., Driesen, J.: The impact of vehicle-to-grid on the distribution grid. Electric Power Syst. Res. 81(1), 185–192 (2011)
Drimer, S., Murdoch, S.J.: Keep your enemies close: distance bounding against smartcard relay attacks. In: 16th USENIX Security Symposium, pp. 87–102 (2007)
ElaadNL, Klapwijk, P., Driessen-Mutters, L.: Exploring the public key infrastructure for ISO 15118 in the EV charging ecosystem. Tech. Rep. (2018)
Fastned: “Autocharge" (2020). https://support.fastned.nl/hc/en-gb/articles/115012747127-Autocharge- Accessed 19 Nov 2020
Fontes, R.R., Afzal, S., Brito, S.H., Santos, M.A., Rothenberg, C.E.: Mininet-WiFi: emulating software-defined wireless networks. In: 2015 11th International Conference on Network and Service Management (CNSM), pp. 384–389. IEEE (2015)
Francillon, A., Danev, B., Capkun, S.: Relay attacks on passive keyless entry and start systems in modern cars. In: Proceedings of the Network and Distributed System Security Symposium (NDSS). Department of Computer Science, Eidgenössische Technische Hochschule Zürich (2011)
Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Practical NFC peer-to-peer relay attack using mobile phones. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 35–49. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-16822-2_4
Fuchs, A., Kern, D., Krauß, C., Zhdanova, M.: HIP: HSM-based Identities for plug-and-charge. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1–6. ACM, New York, USA (2020)
Hancke, G.P., Mayes, K.E., Markantonakis, K.: Confidence in smart token proximity: relay attacks revisited. Comput. Secur. 28(7), 615–627 (2009)
Hemminger, S.: “bridge - show / manipulate bridge addresses and devices" (2012). https://man7.org/linux/man-pages/man8/bridge.8.html Accessed 16 July 2021
Henzl, M., Hanacek, P., Kacic, M.: Preventing real-world relay attacks on contactless devices. In: Proceedings - International Carnahan Conference on Security Technology, 13–18 Oct 2014 (2014)
Höfer, C., Petit, J., Schmidt, R., Kargl, F.: POPCORN: privacy-preserving charging for emobility. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 37–48 (2013)
Plugs, socket-outlets, vehicle connectors and vehicle inlets - Conductive charging of electric vehicles - Part 1: General requirements. Standard, International Electrotechnical Commission, Geneva, CH (2014)
Road vehicles - Vehicle-to-Grid Communication Interface - Part 1: General information and use-case definition. Standard, International Organization for Standardization, Geneva, CH (2019)
Road vehicles - Vehicle to grid communication interface - Part 20: 2nd generation network layer and application layer requirements. Standard, International Organization for Standardization, Geneva, CH (2021)
Road vehicles - Vehicle-to-Grid Communication Interface - Part 2: Network and application protocol requirements. Standard, International Organization for Standardization, Geneva, CH (2014)
Korak, T., Hutter, M.: On the power of active relay attacks using custom-made proxies. In: 2014 IEEE International Conference on RFID, pp. 126–133 (2014)
Lee, S., Park, Y., Lim, H., Shon, T.: Study on analysis of security vulnerabilities and countermeasures in ISO/IEC 15118 based electric vehicle charging technology. In: 2014 International Conference on IT Convergence and Security, ICITCS 2014, pp. 6–9 (2014)
Mahalingam, M., et al.: Virtual extensible local area network (VXLAN): a framework for overlaying virtualized layer 2 networks over layer 3 networks. RFC 7348, 1–22 (2014)
Mustafa, M.A., Zhang, N., Kalogridis, G., Fan, Z.: Smart electric vehicle charging: security analysis. In: 2013 IEEE PES Innovative Smart Grid Technologies Conference, ISGT, 7 Feb 2013 (2013)
Noel, L., Zarazua de Rubens, G., Kester, J., Sovacool, B.K.: The technical challenges to V2G. In: Vehicle-to-Grid. ECE, pp. 65–89. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-04864-8_3
Pelletier, S., Jabali, O., Laporte, G., Veneroni, M.: Battery degradation and behaviour for electric vehicles: review and numerical analyses of several models. Trans. Res. Part B Method. 103, 158–187 (2017)
Ramey, J.: “Honda Will Go Electric- and Fuel Cell-Only by 2040" (2021). https://www.autoweek.com/news/green-cars/a36230978/honda-electric-and-fuel-cell-by-2040/ Accessed 20 May 2021
Sani, A.S., Yuan, D., Bertino, E., Dong, Z.Y.: Crypto-chain: a relay resilience framework for smart vehicles. In: Annual Computer Security Applications Conference, pp. 439–454. ACSAC, ACM, New York, USA (2021)
Sortomme, E., El-Sharkawi, M.A.: Optimal charging strategies for unidirectional vehicle-to-grid. IEEE Trans. Smart Grid 2(1), 131–138 (2011)
Sun, C., Li, T., Low, S.H., Li, V.O.: Classification of electric vehicle charging time series with selective clustering. Electric Power Syst. Res. 189, 106695 (2020)
The Guardian: “Electric vehicles on world’s roads expected to increase to 145m by 2030" (2021), https://www.theguardian.com/environment/2021/apr/29/electric-vehicles-on-worlds-roads-expected-to-increase-to-145m-by-2030 Accessed 20 May 2021
Thorpe, C., Tobin, J., Murphy, L.: An ISO/IEC 7816–4 application layer approach to mitigate relay attacks on near field communication. IEEE Access 8, 190108–190117 (2020)
Tippenhauer, N.O., Luecken, H., Kuhn, M., Capkun, S.: UWB rapid-bit-exchange system for distance bounding. In: Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015 (2015)
Unal, C., Yirik, E., Ünal, E., Cuma, M., Onur, B., Tümay, M.: A review of charging technologies for commercial electric vehicles. Int. J. Adv. Autom. Technol. pp. 61–70 (2018)
Van den Bossche, P.: Electric Vehicle Charging Infrastructure. Elsevier B.V (2010)
Wu, C., Sun, J., Zhu, C., Ge, Y., Zhao, Y.: Research on overcharge and overdischarge effect on lithium-ion batteries. In: 2015 IEEE Vehicle Power and Propulsion Conference (VPPC), pp. 1–6 (2015)
Yang, T., Kong, L., Xin, W., Hu, J., Chen, Z.: Resisting relay attacks on vehicular Passive Keyless Entry and start systems. In: 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, pp. 2232–2236. IEEE (2012)
Acknowledgments
This article has received funding from the European Union’s Horizon 2020 research and innovation programme under the Grant Agreement No 825183 for the NGI Explorers project and US Office of Naval Research grant #N00014-20–1-2636. Denis Donadel is supported by Omitech S.r.l., while Federico Turrin is supported by a grant from the Cariparo Foundation and Yarix S.r.l.. We would like to thank all of them.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
A Appendix a Distance Bounding Countermeasure
We report in Fig. 5 a graphical representation of the Distance Bounding protocol employed as a countermeasure and described in Sect. 6.1.
B Appendix B MiniV2G Distance Bounding Simulation
We report in this section the validation on different scenarios implemented in MiniV2G and performed in a virtual machine with Ubuntu 20.04.2 LTS x64 and 2GB of RAM. The most important parameter that governs the attack’s success or failure is the distance between the two malicious devices. We consider two scenarios: two EVSEs at the opposite ends of a parking lot (10 m) and two adjacent parking spots (2 m). To emulate a wireless connection in the emulator, we employ different propagation models included in Mininet-WiFi [18].
We chose as possible models Log Distance Path Loss (LDPL) and Log Normal Shadowing (LNS), both with \(exp=2\). As presented in [2], these two models are suited to simulate a connection in free space and urban area. Furthermore, we test with two different WiFi versions (i.e., IEEE 802.11g and IEEE 802.11ac).
We represent the mean RTT in Fig. 6a and the standard deviation of the RTT in Fig. 6b. As in the data presented in Sect. 6.3, the error bar represents the 99% percentile, and there is a clear separation between the wired data and all the other malicious cases.
Rights and permissions
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
Copyright information
© 2022 The Author(s)
About this paper
Cite this paper
Conti, M., Donadel, D., Poovendran, R., Turrin, F. (2022). EVExchange: A Relay Attack on Electric Vehicle Charging System. In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds) Computer Security – ESORICS 2022. ESORICS 2022. Lecture Notes in Computer Science, vol 13554. Springer, Cham. https://doi.org/10.1007/978-3-031-17140-6_24
Download citation
DOI: https://doi.org/10.1007/978-3-031-17140-6_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-17139-0
Online ISBN: 978-3-031-17140-6
eBook Packages: Computer ScienceComputer Science (R0)