An efficient operation of the electric shared mobility system (ESMS) relies heavily on seamless interconnections between shared electric vehicles (SEV), electric vehicle supply equipment (EVSE), and the grid. Nevertheless, this interconnectivity also makes the ESMS vulnerable to cyberattacks that may cause short-term breakdowns or long-term degradation of the ESMS. This study focuses on one such attack with long-lasting effects, the Delayed Charge Attack (DCA), that stealthily delays the charging service by exploiting the physical and communication vulnerabilities. To begin, we present the ESMS threat model by highlighting the assets, information flow, and access points. We next identify a linked sequence of vulnerabilities as a viable attack vector for launching DCA. Then, we detail the implementation of DCA, which can effectively bypass the detection in the SEV's battery management system and the cross-verification in the cloud environment. We test the DCA model against various Anomaly Detection (AD) algorithms by simulating the DCA dynamics in a Susceptible-Infectious-Removed-Susceptible (SIRS) process, where the EVSE can be compromised by the DCA or detected for repair. Using real-world taxi trip data and EVSE locations in New York City, the DCA model allows us to explore the long-term impacts and validate the system consequences. The results show that a 10-min delay will result in 12-min longer queuing times and 8% more unfulfilled requests, leading to a 10.7% (\$311.7) weekly revenue loss per driver. With the AD algorithms, the weekly revenue loss remains at 3.8% (\$111.8), suggesting the robustness of the DCA.
翻译:电动共享移动系统(ESMS)的高效运行在很大程度上依赖于共享电动车辆(SEV)、电动车辆供应设备(EVSE)和电网之间的无缝互连。然而,这种互连性也使得ESMS容易受到可能导致ESMS短期崩溃或长期退化的网络攻击的伤害。这项研究侧重于具有长期效应的这种攻击,即延迟电荷攻击(DCA),这种攻击利用物理和通信弱点,偷偷地拖延了收费服务。首先,我们通过突出资产、信息流动和接入点来展示ESMSS威胁性模型。我们接下来确定一个连接的弱点序列,作为发射DCA的可行攻击矢量。然后,我们详细介绍DCA的落实情况,这可以有效地绕过SEVE管理系统的检测和云环境中的交叉校验。我们测试DCA模型,通过模拟DCA动态的可察觉性-可感知度(SIRS),在这个系统里,使用REVSE的更长期损失时间里, 将显示REA 80,将显示REA 的数值定位到 10 。