Browse > Article
http://dx.doi.org/10.13089/JKIISC.2012.22.5.1027

An Analysis of the Security Threats and Security Requirements for Electric Vehicle Charging Infrastructure  

Kang, Seong-Ku (The Attached Institute of ETRI)
Seo, Jung-Taek (The Attached Institute of ETRI)
Abstract
With response to the critical issue of global warming, Smart Grid system has been extensively investigated as next efficient power grid system. Domestically, Korean is trying to expand the usage of Electric Vehicles (EVs) and the charging infrastructure in order to replace the current transportation using fossil fuels holding 20% of overall CO2 emission. The EVs charging infrastructures are combined with IT technologies to build intelligent environments but have considerable number of cyber security issues because of its inherent nature of the technologies. This work not only provides logical architecture of EV charging infrastructures with security threats based on them but also analyses security requirements against security threats in order to overcome the adversarial activities to Smart Grid.
Keywords
EV Charging Infrastructure; Security Threats; Security Requirement;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 손홍관, "전기자동차 충전인프라와 스마트그리드," 대한전기학회, 전기의세계 59(4), pp 47-53, 2010년 4월
2 제주스마트그리드실증단지, "제주스마트그리드 실증단지," http://smartgrid.jeju.go.kr/contents/index.php?mid=0202
3 이현기, "전기자동차 충전인프라 개발현황과 전망," 전력전자학회 전력전자학회지, 15(6), pp 73-76, 2010년 12월
4 양승권, "전력망 연계 전기자동차 충전인프라 운영 시스템 개발 및 운용 전략," 대한전기학회, 대한전기학회 학술대회 논문집, pp 1120-1121, 2010년 7월
5 한승호, "전기자동차 보급과 충전인프라 구축", 대한전기협회, 전기저널 402, pp 28-31, 2010년 6월
6 손홍관, "전기자동차 충전인프라 구축현황," 대한전기협회, 전기저널 397, pp 20-26, 2010년 1월
7 ISO/IEC 15118-1, "Road vehicles-Vehicle to grid communication interface-Part 1:General information and use-case definition"
8 장성협, "신용카드가 복제돼 사용되고 있다!...어떻게?," 보안뉴스, 2010년 6월
9 NIST, "Guidelines for Smart Grid Cyber Security," NISTIR 7628, Aug. 2010
10 NIST, "Recommended Security Controls for Federal Information Systems," NIST Special Publication 800-53, Aug. 2009
11 UCAlug, NIST Cyber Security Coordination Task Group, "Security Profile for AMI," Jun. 2010
12 UCAlug, "AMI System Security Requirements," Dec. 2008
13 OPENmeter, Requirements of AMI, Jan. 2009
14 Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, and Tadayoshi Kohno, "Experimental Security Analysis of a Modern Automobile," IEEE Symposium on Security and Privacy, Oakland, CA, May. 2010.
15 Itron White Paper Advanced Metering Infrastructure, "Risk Analysis for Advanced Metering," http://metering. com/i/100934WP-01_Risk%20Analy sis_For_Advanced_Metering%5B1%5D. pdf