To support the increasing spread of Electric Vehicles (EVs), Charging Stations (CSs) are being installed worldwide. The new generation of CSs employs the Vehicle-To-Grid (V2G) paradigm by implementing novel standards such as the ISO 15118. This standard enables high-level communication between the vehicle and the charging column, helps manage the charge smartly, and simplifies the payment phase. This novel charging paradigm, which connects the Smart Grid to external networks (e.g., EVs and CSs), has not been thoroughly examined yet. Therefore, it may lead to dangerous vulnerability surfaces and new research challenges. In this paper, we present EVExchange, the first attack to steal energy during a charging session in a V2G communication: i.e., charging the attacker's car while letting the victim pay for it. Furthermore, if reverse charging flow is enabled, the attacker can even sell the energy available on the victim's car! Thus, getting the economic profit of this selling, and leaving the victim with a completely discharged battery. We developed a virtual and a physical testbed in which we validate the attack and prove its effectiveness in stealing the energy. To prevent the attack, we propose a lightweight modification of the ISO 15118 protocol to include a distance bounding algorithm. Finally, we validated the countermeasure on our testbeds. Our results show that the proposed countermeasure can identify all the relay attack attempts while being transparent to the user.
翻译:为了支持电动车辆(EVs)的日益普及,世界各地正在安装充电站(CS),新一代CS公司采用汽车到Grid(V2G)范式,实施了ISO 15118等新标准。这一标准使车辆和充电列之间能够进行高级别通信,有助于明智地管理电费,简化支付阶段。这一将智能网连接到外部网络(例如,EVs和CS)的新型充电模式尚未经过彻底审查。因此,它可能导致危险的易受灾表面和新的研究挑战。在本文件中,我们介绍EVExchanger,这是在V2G充电环节中首次窃取能源的攻击:即向攻击者车辆收费,同时让受害者支付费用。此外,如果能够进行反向收费流动,攻击者甚至可以出售受害者汽车上现有的能源!因此,出售这种货物的经济收益,并留下完全卸载的电池。我们开发了虚拟和实物测试床位,在V2G通信中,我们设计了一次对攻击的试算结果。我们最后检验了15个标准,我们检验了对攻击的试算结果。我们检验了对攻击的试算。