skip to main content
10.1145/3627106.3627127acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article
Open access

Detection of Anomalies in Electric Vehicle Charging Sessions

Published: 04 December 2023 Publication History

Abstract

Electric Vehicle (EV) charging involves a complex system with cyber-physical components, backend systems, and communication protocols. A potential security incident in this system can open up cyber-physical threats and, for instance, lead to EV battery fires or power grid blackouts. In this paper, we propose a hybrid Intrusion Detection System (IDS) method consisting of regression-based charging session forecasting and anomaly detection. The method considers an EV’s detailed charging behavior throughout a session and we discuss and evaluate different design choices. For anomaly detection, we consider both classification- and novelty-based models as well as an ensemble method to combine both models. We perform evaluations based on real-world EV charging session data with simulated attacks. Our results show that regression-based forecasting provides a significant increase in detection performance for attacks affecting individual reports during a charging session. Additionally, the proposed ensemble method, which combines artificial neural network-based classification and local outlier factor-based novelty detection, can maintain a low false alarm rate while offering good detection performance w.r.t. known attacks as well as generalization to previously unseen attacks. We thus argue that the proposed solution can provide a positive contribution to EV charging security, resilience, and trustworthiness.

References

[1]
Sajjad Abedi, Ata Arvani, and Reza Jamalzadeh. 2015. Cyber security of plug-in electric vehicles in smart grids: application of intrusion detection methods. In Plug In Electric Vehicles in Smart Grids. Springer, 129–147.
[2]
Samrat Acharya, Yury Dvorkin, and Ramesh Karri. 2020. Public plug-in electric vehicles+ grid data: Is a new cyberattack vector viable?IEEE Transactions on Smart Grid (2020).
[3]
Bushra A Alahmadi, Louise Axon, and Ivan Martinovic. 2022. 99% False Positives: A Qualitative Study of { SOC} Analysts’ Perspectives on Security Alarms. In 31st USENIX Security Symposium (USENIX Security 22). 2783–2800.
[4]
Mohammad Ashrafuzzaman, Saikat Das, Yacine Chakhchoukh, Sajjan Shiva, and Frederick T Sheldon. 2020. Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning. Computers & Security 97 (2020), 101994.
[5]
Defense Use Case. 2016. Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC) 388 (2016).
[6]
Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, 2011. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security Symposium, Vol. 4. San Francisco, 2021.
[7]
Gong Chen, Yanfeng Qu, and Dong Jin. 2022. Cyber-Physical Simulation Testbed for MadIoT Attack Detection and Mitigation. In Proceedings of the 2022 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation. 59–60.
[8]
Yu-Wei Chung, Mervin Mathew, Cole Rodgers, Bin Wang, Behnam Khaki, Chicheng Chu, and Rajit Gadh. 2020. The framework of invariant electric vehicle charging network for anomaly detection. In IEEE Transportation Electrification Conference & Expo.
[9]
David Coats, Harish Suryanarayana, Zhenyuan Wang, Alex Brissette, Yuzhi Zhang, VR Ramanan, Don Scoffield, Duncan Woodbury, Nick Haltmeyer, and Austin Benzinger. 2021. Cybersecurity for Grid Connected eXtreme Fast Charging (XFC) Station (CyberX). Technical Report. ABB, Inc.
[10]
Jesus Cumplido, Cristina Alcaraz, and Javier Lopez. 2022. Collaborative Anomaly Detection System for Charging Stations. In European Symposium on Research in Computer Security. Springer, 716–736.
[11]
Mathias Dalheimer. 2017. Chaos Computer Club hacks e-motor charging stations. https://www.ccc.de/en/updates/2017/e-motor
[12]
Satadru Dey and Munmun Khanra. 2020. Cybersecurity of Plug-In Electric Vehicles: Cyberattack Detection During Charging. IEEE Transactions on Industrial Electronics (2020).
[13]
ElaadNL. 2019. ElaadNL Open EV Charging Transactions. platform.elaad.io/download-data/
[14]
Hossam ElHussini, Chadi Assi, Bassam Moussa, Ribal Atallah, and Ali Ghrayeb. 2021. A tale of two entities: Contextualizing the security of electric vehicle charging stations on the power grid. ACM Transactions on Internet of Things 2, 2 (2021), 1–21.
[15]
Federal Office for Information Security. 2023. FAQ on attack detection systems. https://www.bsi.bund.de/EN/Themen/KRITIS-und-regulierte-Unternehmen/Kritische-Infrastrukturen/KRITIS-FAQ/FAQ-Systeme-Angriffserkennung/faq-systeme-angriffserkennung_node.html
[16]
Andreas Fuchs, Dustin Kern, Christoph Krauß, and Maria Zhdanova. 2020. Securing electric vehicle charging systems through component binding. In International Conference on Computer Safety, Reliability, and Security. Springer, 387–401.
[17]
Lingwen Gan, Ufuk Topcu, and Steven H Low. 2012. Optimal decentralized protocol for electric vehicle charging. IEEE Transactions on Power Systems 28, 2 (2012), 940–951.
[18]
IEA. [n. d.]. Global EV Outlook 2022. www.iea.org/reports/global-ev-outlook-2022
[19]
ISO/IEC. 2014. Road vehicles – Vehicle-to-Grid Communication Interface – Part 2: Network and application protocol requirements. ISO Standard 15118-2.
[20]
MZH Jesmeen, J Hossen, and Azlan Bin Abd Aziz. 2021. Unsupervised anomaly detection for energy consumption in time series using clustering approach. Emerging Science Journal 5, 6 (2021), 840–854.
[21]
Jay Johnson, Timothy Berg, Benjamin Anderson, and Brian Wright. 2022. Review of Electric Vehicle Charger Cybersecurity Vulnerabilities, Potential Impacts, and Defenses. Energies 15, 11 (2022), 3931.
[22]
Mohammad Ekramul Kabir, Mohsen Ghafouri, Bassam Moussa, and Chadi Assi. 2021. A two-stage protection method for detection and mitigation of coordinated EVSE switching attacks. IEEE Transactions on Smart Grid 12, 5 (2021), 4377–4388.
[23]
Abdollah Kavousi-Fard, Tao Jin, Wencong Su, and Navid Parsa. 2020. An Effective Anomaly Detection Model for Securing Communications in Electric Vehicles. IEEE Transactions on Industry Applications (2020).
[24]
Dustin Kern and Christoph Krauß. 2021. Analysis of E-Mobility-based Threats to Power Grid Resilience. In Computer Science in Cars Symposium. 1–12.
[25]
Dustin Kern and Christoph Krauß. 2023. Detection of e-Mobility-based Attacks on the Power Grid. In 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 352–365.
[26]
Zachary J. Lee, Tongxin Li, and Steven H. Low. 2019. ACN-Data: Analysis and Applications of an Open EV Charging Dataset. In Proceedings of the Tenth International Conference on Future Energy Systems (Phoenix, Arizona) (e-Energy ’19).
[27]
Xiaoxue Liu, Peidong Zhu, Yan Zhang, and Kan Chen. 2015. A collaborative intrusion detection mechanism against false data injection attack in advanced metering infrastructure. IEEE Transactions on Smart Grid 6, 5 (2015), 2435–2443.
[28]
Yao Liu, Peng Ning, and Michael Reiter. 2011. False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (2011).
[29]
Stefano Longari, Daniel Humberto Nova Valcarcel, Mattia Zago, Michele Carminati, and Stefano Zanero. 2020. CANnolo: An anomaly detection system based on LSTM autoencoders for controller area network. IEEE Transactions on Network and Service Management 18, 2 (2020), 1913–1924.
[30]
Yiqi Lu, Yongpan Li, Da Xie, Enwei Wei, Xianlu Bao, Huafeng Chen, and Xiancheng Zhong. 2018. The application of improved random forest algorithm on the prediction of electric vehicle charging load. Energies 11, 11 (2018), 3207.
[31]
Srinidhi Madabhushi and Rinku Dewri. 2021. Detection of Demand Manipulation Attacks on a Power Grid. In International Conference on Privacy, Security and Trust. IEEE.
[32]
Maigha and M. L. Crow. 2016. Cost-constrained dynamic optimal electric vehicle charging. IEEE Transactions on Sustainable Energy 8, 2 (2016), 716–724.
[33]
Seyedamirabbas Mousavian, Melike Erol-Kantarci, Lei Wu, and Thomas Ortmeyer. 2017. A risk-based optimization model for electric vehicle infrastructure response to cyber attacks. IEEE Transactions on Smart Grid 9, 6 (2017), 6160–6169.
[34]
Ali Bou Nassif, Manar Abu Talib, Qassim Nasir, and Fatima Mohamad Dakalbab. 2021. Machine learning for anomaly detection: A systematic review. Ieee Access 9 (2021), 78658–78700.
[35]
Xiangyu Niu, Jiangnan Li, Jinyuan Sun, and Kevin Tomsovic. 2019. Dynamic detection of false data injection attack in smart grid using deep learning. In 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE, 1–6.
[36]
OCA. 2020. Open Charge Point Protocol 2.0.1. Open Standard. Open Charge Alliance, Netherlands. www.openchargealliance.org/protocols/ocpp-201/
[37]
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (2011), 2825–2830.
[38]
Marco AF Pimentel, David A Clifton, Lei Clifton, and Lionel Tarassenko. 2014. A review of novelty detection. Signal processing 99 (2014), 215–249.
[39]
Panagiotis I Radoglou-Grammatikis and Panagiotis G Sarigiannidis. 2019. Securing the smart grid: A comprehensive compilation of intrusion detection and prevention systems. IEEE Access 7 (2019), 46595–46620.
[40]
Thomas Rosenstatter, Tomas Olovsson, and Magnus Almgren. 2021. V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems. In Proceedings of the 16th International Conference on Availability, Reliability and Security. 1–10.
[41]
Ron Ross, Victoria Pillitteri, Richard Graubart, Deborah Bodeau, and Rosalie McQuaid. 2019. Developing Cyber Resilient Systems: A Systems Security Engineering Approach. NIST SP 800-160.
[42]
Florian Sagstetter, Martin Lukasiewycz, Sebastian Steinhorst, Marko Wolf, Alexandre Bouard, William R Harris, Somesh Jha, Thomas Peyrin, Axel Poschmann, and Samarjit Chakraborty. 2013. Security challenges in automotive hardware/software architecture design. In 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 458–463.
[43]
Mohammad Ali Sayed, Mohsen Ghafouri, Ribal Atallah, Mourad Debbabi, and Chadi Assi. 2023. Protecting the Future Grid: An Electric Vehicle Robust Mitigation Scheme Against Load Altering Attacks on Power Grids. arXiv preprint arXiv:2308.07526 (2023).
[44]
Saleh Soltan, Prateek Mittal, and H Vincent Poor. 2018. BlackIoT: IoT botnet of high wattage devices can disrupt the power grid. In 27th USENIX Security Symposium.
[45]
Florian Sommer, Jürgen Dürrwang, and Reiner Kriesten. 2019. Survey and classification of automotive security attacks. Information 10, 4 (2019), 148.
[46]
Bo Wang, Payman Dehghanian, Shiyuan Wang, and Massimo Mitolo. 2019. Electrical safety considerations in large-scale electric vehicle charging stations. IEEE Transactions on Industry Applications 55, 6 (2019), 6603–6612.
[47]
Jacob Wurm, Yier Jin, Yang Liu, Shiyan Hu, Kenneth Heffner, Fahim Rahman, and Mark Tehranipoor. 2016. Introduction to cyber-physical system security: A cross-layer perspective. IEEE Transactions on Multi-Scale Computing Systems 3, 3 (2016), 215–227.
[48]
Yue Yang and Jiarou Li. 2022. Electric Vehicle Charging Anomaly Detection Method Based on Multivariate Gaussian Distribution Model. In Proceedings of the Asia Conference on Electrical, Power and Computer Engineering. 1–6.
[49]
Jin Ye, Lulu Guo, Bowen Yang, Fangyu Li, Liang Du, Le Guan, and Wenzhan Song. 2020. Cyber–physical security of powertrain systems in modern electric vehicles: Vulnerabilities, challenges, and future visions. IEEE Journal of Emerging and Selected Topics in Power Electronics 9, 4 (2020), 4639–4657.
[50]
Stefano Zanero. 2018. When cyber got real: Challenges in securing cyber-physical systems. In 2018 IEEE SENSORS. IEEE, 1–4.
[51]
Maria Zhdanova, Julian Urbansky, Anne Hagemeier, Daniel Zelle, Isabelle Herrmann, and Dorian Höffner. 2022. Local Power Grids at Risk–An Experimental and Simulation-based Analysis of Attacks on Vehicle-To-Grid Communication. In Annual Computer Security Applications Conference. 42–55.
[52]
Ce Zhou, Qiben Yan, Zhiyuan Yu, Eshan Dixit, Ning Zhang, Huacheng Zeng, and Alireza Safdari Ghanhdari. 2023. ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems. arXiv preprint arXiv:2305.08037 (2023).

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ACSAC '23: Proceedings of the 39th Annual Computer Security Applications Conference
December 2023
836 pages
ISBN:9798400708862
DOI:10.1145/3627106
This work is licensed under a Creative Commons Attribution International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 December 2023

Check for updates

Badges

Author Tags

  1. Anomaly Detection
  2. E-Mobility
  3. EV Charging
  4. Intrusion Detection System
  5. Power Grid

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • Hessian Ministry of Higher Education, Research, Science and the Arts
  • Deutsche Forschungsgemeinschaft (DFG, German Research Foundation)
  • German Federal Ministry of Education and Research

Conference

ACSAC '23

Acceptance Rates

Overall Acceptance Rate 104 of 497 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1,675
  • Downloads (Last 6 weeks)177
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media