The Infrastructure Investment and Jobs Act authorizes $7.5 billion to help meet the goal of installing 500,000 stations by the year 2030. Half of all new vehicles sold in the US will be electric by the year 2030. The number of vulnerabilities goes up with the number of stations.
Over the past several years, hackers have been attacking the electrical system. Europe-based wind power companies have suffered attacks that focused on stopping the flow of electrons. The results can include service disruptions affecting customers and revenue reductions for the providers.
Any and all system vulnerabilities are used by hackers to their fullest advantage. It is the same problem for the consumer as it is for the commercial enterprise. Concerns about weak control systems are added to the stresses caused by hacker disruptions. Ron fears that the existing data acquisition hardware is primate.
AdvertisementIt's not reliable and doesn't handle simple faults well. It is not accessible on the internet for the majority of the time. It's frightening how primitive some of these systems are.
Stations connected to a central control unit are located at the center of EV infrastructure. Stations collect sensitive data such as payment data, location data, and demographic data that might include email addresses sensitive data is collected on the apps, including location data and online behavior history, since a mobile app is used to access the station.
Thomas Russell of the National Cybersecurity Center said that the data can be used to find patterns of daily routines and location data. Operators can monitor usage and reliability in real time but being network means being vulnerable.
The EV management system is the most vulnerable part of an electric vehicle charging station. Vendors who own these stations need to keep in touch with them over the internet to process payments, perform maintenance, and make their services available to EV. This could expose their stations to attackers.
EVCSMSes arevulnerable in many ways. Many are developed with poor security practices that allow attackers to compromise the system. He thinks that this is similar to many modern internet of things devices that have poor design security. The EV management system is very similar to others.