Safeguarding the Future of Mobility: Cybersecurity Issues and Solutions for Infrastructure Associated with Electric Vehicle Charging
##plugins.themes.bootstrap3.article.main##
The development of an ecosystem that balances consumer convenience and security is imperative given the expanding market for electric vehicles (EVs). The vast amount of data that EV charging station management systems (EVCSMSs) give is powered by the Internet of Things (IoT) ecosystem. Intrusion Detection Systems (IDSs), which track network traffic to spot potentially dangerous data exchanges in IT and IoT contexts, are constantly improving in terms of efficacy and accuracy. Intrusion detection is becoming a major topic in academia because of the acceleration of IDS development caused by machine learning and deep learning techniques. The goal of the research presented in this paper is to use a machine-learning-based intrusion detection system with low false-positive rates and high accuracy to safeguard the ecosystem of EV charging stations (EVCS).
Downloads
Introduction
Countries are swiftly implementing EV charging stations, which are becoming more and more common in smart cities [1]. IoT is used by these stations to make life easier and provide operators with more control. But because they are online all the time, they are vulnerable to cyberattacks. These attacks can affect the entire EVCS ecosystem, which includes consumers, EVCSs, and the electrical grid. Reliable charging stations are essential, but quick infrastructure development is required to guarantee long-term growth. The EVCS ecosystem’s communication protocols regulate communication, yet these elements are susceptible to hackers. International standards for communication between electric cars and charging stations, ISO 15118 and ISO/SAE 21434, specify procedures for safe and effective transactions. ISO/SAE 21434 offers recommendations for cybersecurity in road vehicles, guaranteeing safe systems, networks, and components to guard against cyberattacks and guarantee passenger safety, whereas ISO 15118 concentrates on communication protocols.
EVCS charging stations are being transformed into intelligent systems using the Internet of Things (IoT), allowing user accounting and remote monitoring. This enables consumers to plan their EV charging according to the cost of electricity at night. This poses difficulties, though, because EVCS that are outfitted with IoT technology may be targeted by criminals. Malicious traffic is detected by intrusion detection systems; however, it can be challenging to discern between malicious and regular traffic due to the complex tactics utilized by attackers. Because of the constant connection required to serve customers and the volume of data transferred between nodes, IoT network security is given priority over IT network security [2].
With machine learning techniques like Naive Bayes, Logistic Regression, and Decision Trees being widely utilized to detect network-based threats, artificial intelligence (AI) has been included into intrusion detection systems (IDSs) for Internet of Things (IoT) devices. To increase accuracy and lessen the consequences of feature selection, deep learning techniques are being researched. However, sixteen well-known EVCSMS used by businesses in the US and Europe were found to have serious zero-day vulnerabilities, which resulted in power outages and illegal access. Compared to other elements of the EV ecosystem, EVCSs have gotten less scholarly attention. According to a study in [3], which measured the seriousness of potential vulnerabilities in operational EVCSs, there is a significant risk in live systems used for EV charging that could have an impact on consumers and the power grid. To lessen the impact of such attacks, the study’s conclusion included a list of preventative measures that should be applied to susceptible systems. With machine learning techniques like Naive Bayes (NB), Logistic Regression (LR), and Decision Tree (DT) being widely used for detecting network-based threats, artificial intelligence (AI) has been included into Intrusion Detection Systems (IDS) for Internet of Things (IoT) systems.
A study by Thakkar and Lohiya [4] highlighted security concerns and hazards related to the application of machine learning and deep learning algorithms in IoT intrusion detection systems. By merging DNN and Long Short-Term Memory (LSTM) neural network learning techniques, they created a deep learning-based intrusion detection system (IDS) to identify denial-of-service (DoS) threats within the EVCS. The Random Forest algorithm was the focus of the authors’ comparison of different machine learning techniques using the IoT-23 dataset in [5]. In line with earlier research, they discovered that the Random Forest method had the best accuracy (99.5%).
One useful resource for confirming Internet of Things (IoT) security is the IoT-23 Dataset [6], which was produced using actual commercial IoT network data. This dataset, which was released in 2020 by Avast Software of Prague and the Stratosphere Lab of the Czech Republic, consists of three benign and twenty malicious traffic samples from Internet of Things devices. Malicious traffic from various IoT network assaults is represented by the dataset, which has labels for every potential result.
The usage of machine learning and deep learning to identify abnormalities is growing, but selecting the best algorithm is essential for identifying attacks in real time and stopping harmful communications. Machine learning classifiers are vulnerable to zero-day attacks since they need to be accurate even with small amounts of data. In supervised learning, regularization approaches like L1 and L2 can help solve the overfitting problem [7] and perform better than unsupervised learning algorithms for the same task. Data must be randomized to prevent overfitting, and a reshuffled dataset is run through the Filtered Classifier and Decision Table classifiers to preserve uniformity.
Building and utilizing a basic majority classifier that produces decisions based on several attributes for every instance is the task of decision table classifier rules. Depending on the assignment, the quantity and kinds of qualities can change. The efficacy of the algorithm and calculation time are impacted by the Filtered Classifier’s removal of unnecessary data. Prior to more complex techniques like classification and clustering, attribute selection is carried out. The sequential selection of attributes is divided into two phases: ranking, which determines the relative weight of qualities using statistics or information theory, and subset generation, which assesses both determined and possible subsets [8].
With China and the US dominating the world in both production and adoption rates, the EV industry has grown remarkably [9]. Government initiatives to encourage clean fuel vehicles and decarbonization initiatives are among the main forces behind the adoption of electric vehicles. Customers are moving toward EVs because of countries like the Netherlands and France announcing prohibitions on the sale of fossil fuel vehicles [10]. Furthermore, range anxiety, a significant obstacle to the adoption of electric vehicles, has been lessened by developments in battery and charging technologies [11]. Long-distance driving has become more practical for electric vehicle users thanks to the widespread availability of high-capacity batteries and rapid charging stations, like those installed by Electrify America in the US and Ionity in Europe [12], [13].
Alongside these developments, though, there have been worries raised over the cybersecurity of the infrastructure used for charging electric vehicles. Concerns over possible assaults have been raised by recent investigations that found security vulnerabilities in the hardware and applications used for charging electric vehicles. For instance, remote attackers may be able to interfere with the charging of electric vehicles due to flaws in Schneider Electric’s EVlink chargers and the ChargePoint Home smartphone software [14], [15]. Strong cybersecurity precautions are necessary because vulnerabilities in web apps for electric vehicle charging systems have also been exploited. These vulnerabilities are being addressed, and efforts are underway to standardize cybersecurity procedures for infrastructure used for charging electric vehicles.
Depending on their energy source, electric vehicles (EVs) are divided into three categories: battery electric vehicles (BEVs), plug-in hybrid electric vehicles (PHEVs), and hybrid electric vehicles (HEVs). BEVs only use an electrochemical battery that is charged by the grid via EV charging stations (EVCSs) in homes or businesses. On the other hand, PHEVs use an electrochemical battery in addition to an internal combustion engine (ICE) that runs on fossil fuels, enabling the two power sources to alternate. These cars frequently have 12- or 24-volt auxiliary power systems that run extra loads and controls. To develop electronics that could be used in electric car applications, such as batteries or infrastructure for charging stations, a variety of technologies and materials have been researched [16]–[29]. In addition to batteries, some EVs have supercapacitors to speed up energy transfer during regenerative breaking and ignition. Batteries are still the main energy storage component in EVs, nevertheless, because of their lower energy density. Developing effective cybersecurity measures to protect EVs and the larger transportation ecosystem requires an understanding of the EV cyber layers and the dangers they pose.
Procedure
This paper aims to analyze a cybersecurity dataset [30] to predict whether an attack occurs, using logistic regression and random forest models. The program processes the data, trains the models, evaluates their performance, and visualizes the results through various plots, including confusion matrices, ROC curves, and feature importance charts. It also generates a filtered correlation heatmap to understand the relationships between selected features. Explanations of model are described below:
● Logistic Regression: This is a statistical model used for binary classification problems. It estimates the probability that a given input point belongs to a certain class. We chose logistic regression because it is simple, interpretable, and effective for binary classification tasks.
● Random Forest: This ensemble learning method constructs multiple decision trees and merges them with a more accurate and stable prediction. We used random forest because it handles large datasets well, reduces overfitting, and provides insights into feature importance.
These models were chosen to provide a balance between simplicity and complexity, offering both interpretability and robust performance on the classification task. Detailed Overview of the Program is given below:
● Loading the Dataset: The dataset is loaded from a CSV file using pandas.
● Data Preprocessing: Unnecessary columns are dropped, and features and the target variable are separated.
● One-Hot Encoding: Categorical features are one-hot encoded to convert them into a numerical format suitable for machine learning models.
● Data Splitting: The dataset is split into training and testing sets to evaluate the models’ performance on unseen data.
● Model Training and Evaluation: Logistic Regression and Random Forest models are trained, evaluated, and their performance metrics are printed.
● Visualization:
– Confusion Matrix: Displays the number of correct and incorrect predictions.
– ROC Curve: Shows the trade-off between true positive rate and false positive rate.
– Feature Importances: For Random Forest, the relative importance of each feature is plotted.
● Correlation Heatmap: Visualizes the correlation between selected features to understand their relationships.
● Confusion Matrix Description: This confusion matrix (Fig. 1) shows the actual versus predicted classifications.
● Interpretation: Each cell represents the number of predictions for each combination of true and predicted class labels. High values on the diagonal indicate good model performance.
● ROC Curve Description: A graphical plot (Fig. 2) that illustrates the diagnostic ability of a binary classifier.
● Interpretation: The area under the ROC curve (AUC) represents the degree of separability achieved by the model. Higher AUC values indicate better performance.
● Feature Importances Description: This bar plot (Fig. 3) shows the top features contributing to the model’s predictions.
● Interpretation: Features with higher importance scores have a greater impact on the model’s decisions. This insight helps in understanding which features are most influential.
● Correlation Heatmap Description: A heatmap (Fig. 4) that displays the correlation coefficients between selected features.
● Interpretation: Values closer to 1 or −1 indicate strong positive or negative correlations, respectively. This helps in identifying redundant features or understanding feature relationships.
Fig. 1. Confusion matrix from random forest algorithm.
Fig. 2. ROC curve from random forest algorithm.
Fig. 3. Feature importance from random forest algorithm.
Fig. 4. Correlation heatmap.
Conclusion
The logistic regression and random forest models provided insightful results on predicting cyber-attacks. While logistic regression offers interpretability and simplicity, random forest gives robust performance and valuable insights into feature importances. Visualizations, including confusion matrices, ROC curves, and feature importance plots, effectively demonstrated model performance and the significance of various features. The correlation heatmap further aided in understanding feature relationships. Overall, the chosen models and visualization techniques provided a comprehensive analysis of the data set highlighting the critical factors in predicting cyber-attacks.
References
-
Suriya N, Shankar SV. A novel ensembling of deep learning based intrusion detection system and scroll chaotic countermeasures for electric vehicle charging system. J Intell Fuzzy Syst. 2022;43: 4789–801.
DOI |
Google Scholar
1
-
El Houda ZA, Brik B, Khoukhi L. Why should I trust your ids?: an explainable deep learning framework for intrusion detection systems in internet of things networks. IEEE Open J Commun Soc. 2022;3:1164–76.
DOI |
Google Scholar
2
-
Nasr T, Torabi S, Bou-Harb E, Fachkha C, Assi C. Power jacking your station: in-depth security analysis of electric vehicle charging station management systems. Comput Secur. 2022;112:102511.
DOI |
Google Scholar
3
-
Thakkar A, Lohiya R. A review on machine learning and deep learning perspectives of ids for IoT: recent updates, security issues, and challenges. Arch Comput Methods Eng. 2021;28:3211–43.
DOI |
Google Scholar
4
-
Stoian N-A. Machine learning for anomaly detection in IoT Networks: malware analysis on the IoT-23 Data Set. Bachelor’s Thesis, University of Twente, Enschede, The Netherlands; 2020.
Google Scholar
5
-
Thamaraiselvi D, Mary S. Attack and anomaly detection in IoT networks using machine learning. Int J Comput Sci Mob Comput. 2020;9:95–103.
DOI |
Google Scholar
6
-
Ying X. An overview of overfitting and its solutions. Journal of Physics: Conference Series. Bristol, UK: IOP Publishing; 2019, vol. 1168, pp. 022022.
DOI |
Google Scholar
7
-
Handa A, Semwal P. Evaluating performance of scalable fair clustering machine learning techniques in detecting cyber-attacks in industrial control systems. In Handbook of Big Data Analytics and Forensics. Berlin/Heidelberg, Germany: Springer, 2022, pp. 105–16.
DOI |
Google Scholar
8
-
Global EV Outlook 2020. 2020. Available from: https://webstore.iea.org/download/direct/3007?fileName=Global_EV_Outlook_2020.pdf.
Google Scholar
9
-
Innovation outlook: smart charging for electric vehicles. 2019. Available from: https://www.irena.org/publications/2019/May/Innovation-Outlook-Smart-Charging.
Google Scholar
10
-
Capuder T, Spriä DM, Zoriiä D, Pandˇ zi H. Review of challenges and assessment of electric vehicles integration policy goals: integrated risk analysis approach. Int J Electr Power Energy Syst. 2020 Jul;119:105894.
DOI |
Google Scholar
11
-
The Power of 350 kW. Accessed: May 15, 2020. Available from: https://ionity.eu/en/design-and-tech.html.
Google Scholar
12
-
Find charging fast. Accessed: May 15, 2020. Available from: https://www.electrifyamerica.com.
Google Scholar
13
-
Remotely controlled EV home chargers—the threats and vulnerabilities. 2018. Available from: https://securelist.com/remotely-controlledev-home-chargers-the-threats-and-vulnerabilities/89251/.
Google Scholar
14
-
Schneider electric EVLink parking. 2018. Available from: https://us-cert.cisa.gov/ics/advisories/ICSA-19-031-01.
Google Scholar
15
-
Akanda MRK. Catalogue of potential magnetic topological insulators from materials database. IOSR J Appl Phys (IOSR-JAP). 2023;15(3):22–8.
Google Scholar
16
-
Akanda MRK. Scaling of voltage controlled magnetic anisotropy based skyrmion memory and its neuromorphic application. Nano Express. 2022;10:2. Available from: https://iopscience.iop.org/article/10.1088/2632-959X/ac6bb5/pdf.
DOI |
Google Scholar
17
-
Rakibul Karim Akanda MD, Lake RK. Magnetic properties of nbsi2n4, vsi2n4, and vsi2p4 monolayers. Appl Phys Lett. 2021;119:052402. doi: 10.1063/5.0055878.
DOI |
Google Scholar
18
-
Rakibul Karim Akanda MD, Park IJ, Lake RK. Interfacial dzyaloshinskii-moriya interaction of antiferromagnetic materials. Phys Rev B. 2020;102:224414. Available from: https://journals.aps.org/prb/abstract/10.1103/PhysRevB.102.224414.
DOI |
Google Scholar
19
-
Akanda MRK. Catalog of magnetic topological semimetals. AIP Adv. 2020;10:095222. doi: 10.1063/5.0020096.
DOI |
Google Scholar
20
-
Akanda MRK, Khosru QDM. Fem model of wraparound cntfet with multi-cnt and its capacitance modeling. IEEE Trans Electron Devices. 2013;60:97–102. Available from: https://ieeexplore.ieee.org/abstract/document/6375797.
DOI |
Google Scholar
21
-
Yousuf A, Akanda MRK. Ping Pong Robot with Dynamic Tracking Paper presented at 2023 ASEE Annual Conference & Exposition, Baltimore, Maryland. 2023, June. Available from: https://peer.asee.org/43897.
Google Scholar
22
-
Akanda MRK, Khosru QDM. Analysis of output transconductance of finfets incorporating quantum mechanical and temperature effects with 3d temperature distribution. ISDRS. 2011:1–2. Available from: https://ieeexplore.ieee.org/abstract/document/6135292.
DOI |
Google Scholar
23
-
Akanda MRK, Islam R, Khosru QDM. A physically based compact model for finfets on-resistance incorporating quantum mechanical effects. ICECE 2010. 2010;2010:203–5. Available from: https://ieeexplore.ieee.org/abstract/document/5700663.
DOI |
Google Scholar
24
-
Islam MS, Akanda MRK. 3d temperature distribution of sic mesfet using green’s function. ICECE. 2010;2010:13–6. Available from: https://ieeexplore.ieee.org/abstract/document/5700541.
DOI |
Google Scholar
25
-
Islam MS, Akanda MRK, Anwar S, Shahriar A. Analysis of resistances and transconductance of sic mesfet considering fabrication parameters and mobility as a function of temperature. ICECE. 2010;2010:5–8. Available from: https://ieeexplore.ieee.org/abstract/document/5700539.
DOI |
Google Scholar
26
-
Rakibul Karim Akanda MD, Park IJ, Lake RK. Interfacial dzyaloshinskii-moriya interaction of collinear antiferromagnetic mnpt and nio on w, re, and au. APS March Meeting. 2021. Available from: https://ui.adsabs.harvard.edu/abs/2021APS.MARE40004A/abstract.
Google Scholar
27
-
Akanda RK. 3-D model of wrap around CNTEFT with multiple CNT channel and analytical modeling of its capacitances. Dep Electr Electron Eng (EEE). 2013.
Google Scholar
28
-
Akanda MDRK. Magnetic Properties of Ferromagnetic and Antiferromagnetic Materials and Low-Dimensional Materials. University of California, Riverside ProQuest Dissertations Publishing; 2021, pp. 28651079.
Google Scholar
29
-
Moustafa N, Slay J. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In 2015 Military Communications and Information Systems Conference (MilCIS). Springer, 2015, pp. 1–6. doi: 10.1109/Mil-CIS.2015.7348942.
DOI |
Google Scholar
30