Security Analysis of EV Infrastructure Protocols

dc.contributor.advisorNeetesh Saxen
dc.contributor.authorSAMAR AHMED ALI ALGHAMDI
dc.date2022
dc.date.accessioned2022-06-04T19:33:12Z
dc.date.available2022-04-12 05:36:01
dc.date.available2022-06-04T19:33:12Z
dc.description.abstractThis dissertation assesses the security of current communication protocols within the vehicle charging infrastructure. Although each protocol works in a unique way, all protocols work for the same purpose, so each protocol also has unique security vulnerabilities and thus requires unique security solutions and recommendations to strengthen its security and facilitate the safe operation of its functions. A variety of security vulnerabilities within protocols affecting communications in vehicle charging infrastructure have been revealed. These vulnerabilities are used by hackers to gain unauthorized access to these vehicles with the purpose of increasing the cost of powering them or jeopardizing their owners' privacy. In the future, electric charging stations will be widely available and will use communication protocols which make security breaches possible. In this dissertation, the security vulnerabilities of each protocol are discussed and evaluated, and the security requirements which must be met in each communication are outlined. A proposed set of security improvements designed to overcome all current security vulnerabilities is offered.
dc.format.extent57
dc.identifier.other110732
dc.identifier.urihttps://drepo.sdl.edu.sa/handle/20.500.14154/66293
dc.language.isoen
dc.publisherSaudi Digital Library
dc.titleSecurity Analysis of EV Infrastructure Protocols
dc.typeThesis
sdl.degree.departmentCybersecurity
sdl.degree.grantorCardiff University
sdl.thesis.levelMaster
sdl.thesis.sourceSACM - United Kingdom

Files

Copyright owned by the Saudi Digital Library (SDL) © 2024