Por favor, use este identificador para citar o enlazar este ítem:
http://hdl.handle.net/11531/104773
Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | Jarauta Gastelu, Javier | es-ES |
dc.contributor.author | Gesteira Miñarro, Roberto | es-ES |
dc.contributor.author | Matanza Domingo, Javier | es-ES |
dc.contributor.author | Palacios Hielscher, Rafael | es-ES |
dc.contributor.author | López López, Gregorio | es-ES |
dc.date.accessioned | 2025-09-26T12:23:57Z | - |
dc.date.available | 2025-09-26T12:23:57Z | - |
dc.date.issued | 2025-10-01 | es_ES |
dc.identifier.issn | 2327-4662 | es_ES |
dc.identifier.uri | https:doi.org10.1109JIOT.2025.3589219 | es_ES |
dc.identifier.uri | http://hdl.handle.net/11531/104773 | - |
dc.description | Artículos en revistas | es_ES |
dc.description.abstract | es-ES | |
dc.description.abstract | This paper explores a Man-in-the-Middle (MitM) attack targeting AC charging points for electric vehicles (EVs), demonstrating the ability to covertly control the vehicle’s charging process without detection by either the charging station or the vehicle. The attack was conducted successfully in both controlled laboratory environments and real-world settings, exposing vulnerabilities in the communication protocols between the charging station and the vehicle. By intercepting and manipulating the communication, an attacker can adjust the charging rate, reducing, increasing, or halting the charging process altogether. This not only affects individual vehicles but could have a broader impact on the electrical grid, especially as the use of high-power EV chargers continues to grow. With the rapid increase in electric vehicle adoption worldwide, the potential for synchronized attacks on multiple charging points presents a significant risk to grid stability, from local affections to higher widespread impacts. This research then underscores the need for stronger cybersecurity measures to protect the charging infrastructure and prevent large-scale disruptions to energy systems. | en-GB |
dc.language.iso | en-GB | es_ES |
dc.source | Revista: IEEE Internet of Things Journal, Periodo: 1, Volumen: online, Número: 19, Página inicial: 39689, Página final: 39700 | es_ES |
dc.subject.other | Instituto de Investigación Tecnológica (IIT) | es_ES |
dc.title | MitM Attack to Electric Vehicle AC Chargers | es_ES |
dc.type | info:eu-repo/semantics/article | es_ES |
dc.description.version | info:eu-repo/semantics/publishedVersion | es_ES |
dc.rights.holder | es_ES | |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | es_ES |
dc.keywords | es-ES | |
dc.keywords | Electric Vehicles, AC Charging, Man-in-the Middle, Cybersecurity | en-GB |
Aparece en las colecciones: | Artículos |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
IIT-25-260R | 2,38 MB | Unknown | Visualizar/Abrir | |
IIT-25-260R_preview | 3 kB | Unknown | Visualizar/Abrir |
Los ítems de DSpace están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.