Article3147: Unterschied zwischen den Versionen
Pc9792 (Diskussion | Beiträge) (Die Seite wurde neu angelegt: „{{Publikation Erster Autor |ErsterAutorNachname=Bao |ErsterAutorVorname=Kaibin }} {{Publikation Author |Rank=1 |Author=Hristo Valev }} {{Publikation Author |Rank=…“) |
Sc7759 (Diskussion | Beiträge) |
||
(Eine dazwischenliegende Version von einem anderen Benutzer wird nicht angezeigt) | |||
Zeile 4: | Zeile 4: | ||
}} | }} | ||
{{Publikation Author | {{Publikation Author | ||
− | |Rank= | + | |Rank=2 |
|Author=Hristo Valev | |Author=Hristo Valev | ||
}} | }} | ||
{{Publikation Author | {{Publikation Author | ||
− | |Rank= | + | |Rank=3 |
|Author=Manuela Wagner | |Author=Manuela Wagner | ||
}} | }} | ||
{{Publikation Author | {{Publikation Author | ||
− | |Rank= | + | |Rank=4 |
|Author=Hartmut Schmeck | |Author=Hartmut Schmeck | ||
}} | }} | ||
{{Article | {{Article | ||
− | |Referiert= | + | |Referiert=True |
|Title=A threat analysis of the vehicle-to-grid charging protocol ISO 15118 | |Title=A threat analysis of the vehicle-to-grid charging protocol ISO 15118 | ||
|Year=2017 | |Year=2017 | ||
Zeile 28: | Zeile 28: | ||
|Projekt=IILSE, KASTEL | |Projekt=IILSE, KASTEL | ||
|Forschungsgruppe=Effiziente Algorithmen | |Forschungsgruppe=Effiziente Algorithmen | ||
+ | }} | ||
+ | {{Forschungsgebiet Auswahl | ||
+ | |Forschungsgebiet=Energieinformatik | ||
+ | }} | ||
+ | {{Forschungsgebiet Auswahl | ||
+ | |Forschungsgebiet=Sicherheit | ||
}} | }} |
Aktuelle Version vom 21. Dezember 2017, 09:22 Uhr
A threat analysis of the vehicle-to-grid charging protocol ISO 15118
A threat analysis of the vehicle-to-grid charging protocol ISO 15118
Veröffentlicht: 2017 September
Journal: Computer Science - Research and Development
Referierte Veröffentlichung
Kurzfassung
This work performs a security analysis of the vehicle-to-grid charging protocol ISO 15118 and presents various scenarios of how to compromise the availability of the charging service or the integrity, authenticity, or confidentiality of the communication on a protocol level. Furthermore, it analyzes processes related to the authentication, transfer of information, and the certification hierarchy for vulnerabilities, which could be used by an adversary to gain unfair advantage over the charging process and use it for his own self-interest, mostly harming legitimate users or other participants.
ISSN: 1865-2042
DOI Link: 10.1007/s00450-017-0342-y