Article3147: Unterschied zwischen den Versionen
Pc9792 (Diskussion | Beiträge) |
Sc7759 (Diskussion | Beiträge) |
||
Zeile 16: | Zeile 16: | ||
}} | }} | ||
{{Article | {{Article | ||
− | |Referiert= | + | |Referiert=True |
|Title=A threat analysis of the vehicle-to-grid charging protocol ISO 15118 | |Title=A threat analysis of the vehicle-to-grid charging protocol ISO 15118 | ||
|Year=2017 | |Year=2017 | ||
Zeile 28: | Zeile 28: | ||
|Projekt=IILSE, KASTEL | |Projekt=IILSE, KASTEL | ||
|Forschungsgruppe=Effiziente Algorithmen | |Forschungsgruppe=Effiziente Algorithmen | ||
+ | }} | ||
+ | {{Forschungsgebiet Auswahl | ||
+ | |Forschungsgebiet=Energieinformatik | ||
+ | }} | ||
+ | {{Forschungsgebiet Auswahl | ||
+ | |Forschungsgebiet=Sicherheit | ||
}} | }} |
Aktuelle Version vom 21. Dezember 2017, 09:22 Uhr
A threat analysis of the vehicle-to-grid charging protocol ISO 15118
A threat analysis of the vehicle-to-grid charging protocol ISO 15118
Veröffentlicht: 2017 September
Journal: Computer Science - Research and Development
Referierte Veröffentlichung
Kurzfassung
This work performs a security analysis of the vehicle-to-grid charging protocol ISO 15118 and presents various scenarios of how to compromise the availability of the charging service or the integrity, authenticity, or confidentiality of the communication on a protocol level. Furthermore, it analyzes processes related to the authentication, transfer of information, and the certification hierarchy for vulnerabilities, which could be used by an adversary to gain unfair advantage over the charging process and use it for his own self-interest, mostly harming legitimate users or other participants.
ISSN: 1865-2042
DOI Link: 10.1007/s00450-017-0342-y