Stage-oe-small.jpg

Article3147: Unterschied zwischen den Versionen

Aus Aifbportal
Wechseln zu:Navigation, Suche
(Die Seite wurde neu angelegt: „{{Publikation Erster Autor |ErsterAutorNachname=Bao |ErsterAutorVorname=Kaibin }} {{Publikation Author |Rank=1 |Author=Hristo Valev }} {{Publikation Author |Rank=…“)
 
Zeile 4: Zeile 4:
 
}}
 
}}
 
{{Publikation Author
 
{{Publikation Author
|Rank=1
+
|Rank=2
 
|Author=Hristo Valev
 
|Author=Hristo Valev
 
}}
 
}}
 
{{Publikation Author
 
{{Publikation Author
|Rank=2
+
|Rank=3
 
|Author=Manuela Wagner
 
|Author=Manuela Wagner
 
}}
 
}}
 
{{Publikation Author
 
{{Publikation Author
|Rank=3
+
|Rank=4
 
|Author=Hartmut Schmeck
 
|Author=Hartmut Schmeck
 
}}
 
}}

Version vom 18. Oktober 2017, 05:32 Uhr


A threat analysis of the vehicle-to-grid charging protocol ISO 15118


A threat analysis of the vehicle-to-grid charging protocol ISO 15118



Veröffentlicht: 2017 September

Journal: Computer Science - Research and Development




Referierte Veröffentlichung

BibTeX




Kurzfassung
This work performs a security analysis of the vehicle-to-grid charging protocol ISO 15118 and presents various scenarios of how to compromise the availability of the charging service or the integrity, authenticity, or confidentiality of the communication on a protocol level. Furthermore, it analyzes processes related to the authentication, transfer of information, and the certification hierarchy for vulnerabilities, which could be used by an adversary to gain unfair advantage over the charging process and use it for his own self-interest, mostly harming legitimate users or other participants.

ISSN: 1865-2042
DOI Link: 10.1007/s00450-017-0342-y

Projekt

IILSEKASTEL



Forschungsgruppe

Effiziente Algorithmen


Forschungsgebiet

Energieinformatik, Sicherheit