Impact of Electric Vehicles Botnets on the Power Grid

AI-generated keywords: Electric Vehicles Fast Charging Direct Current Cyber Attacks Botnet Power Grid

AI-generated Key Points

  • Increased adoption of Electric Vehicles (EVs) has led to a demand for Fast Charging Direct Current (FCDC) stations
  • EVs and charging stations are vulnerable to cyber attacks
  • The paper examines the vulnerability of the EV charging process
  • A botnet consisting of compromised EVs and FCDC stations can be used to launch cyber attacks on the power grid
  • These attacks aim to increase the load on the grid at specific times, causing disruptions and compromising its stability
  • The impact of these attacks on distribution networks and transmission networks is investigated through different scenarios and parameters
  • Addressing cybersecurity vulnerabilities in EV charging infrastructure is critical
  • Protecting against potential cyber threats is essential for reliable and secure operation of EVs and FCDC stations within an interconnected power grid system.
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Omniyah Gul M Khan, Ehab El-Saadany, Amr Youssef, Mostafa Shaaban

5 pages, conference
License: CC BY 4.0

Abstract: The increased penetration of Electric Vehicles (EVs) in the transportation sector has increased the requirement of Fast Charging Direct Current (FCDC) stations to meet customer's speedy charging requirements. However, both charging stations and EVs connection to the communication infrastructure as well as the power grid makes it vulnerable to cyber attacks. In this paper, the vulnerability of the EV charging process is initially studied. We then show how a botnet of compromised EVs and FCDC stations can be utilized to launch cyber attacks on the power grid resulting in an increase in the load at a specific time. The effect of such attacks on the distribution network in terms of line congestion and voltage limit violations is investigated. Moreover, the effect of the botnet of the transmission network is also studied.

Submitted to arXiv on 16 Mar. 2021

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2103.09153v1

The increased adoption of Electric Vehicles (EVs) in the transportation sector has led to a growing demand for Fast Charging Direct Current (FCDC) stations to meet the need for quick charging. However, the connection of both EVs and charging stations to the communication infrastructure and power grid exposes them to potential cyber attacks. In this paper, the vulnerability of the EV charging process is thoroughly examined and how a botnet consisting of compromised EVs and FCDC stations can be used to launch cyber attacks on the power grid is explored. Specifically, these attacks aim to increase the load on the grid at specific times, causing disruptions and potentially compromising its stability. The impact of such attacks on both distribution networks in terms of line congestion and voltage limit violations as well as transmission networks are investigated by analyzing different scenarios and parameters including various attack strategies and network configurations. This paper highlights the critical need for addressing cybersecurity vulnerabilities in EV charging infrastructure emphasizing that protecting against potential cyber threats is essential to ensure reliable and secure operation of both EVs and FCDC stations within an increasingly interconnected power grid system.
Created on 09 Jul. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.