EV Charging Station security demonstrator
TeskaLabs is proud to announce the availability of EV Charging Station security demonstrator. This is a result of our research project. The Meili project was part of the UK Government and its partners Zenzic and InnovateUK 1.2 million British pounds programme to develop a cohesive understanding of the challenges and potential solutions to addressing digital resilience and cyber security within Connected and Automated Mobility.
With the number of electric vehicles and charging stations growing rapidly, possible attacks on charging infrastructure have become a growing threat to energy suppliers and traffic infrastructure.
Charging infrastructure is particularly vulnerable becasue there many entry areas for potential attacks. In general, charging points are unmanned and often located in remote areas, leaving their physical protections compromised. Moreover, connection to back-end servers that store sensitive customer data introduces even more severe threats and challenges into cybersecurity protection.
Specifically, the EV Charging Station security demonstrator extends C-ITS, which is a wireless (ETSI G5-ITS or LTE/5G) communication between vehicles and road-side infrastructure, into the intra-vehicle wired communication; the well-known CAN bus. The Demonstrator illustrates the communication between an electric vehicle and the charger, that happens over the CAN bus.
In response to recent Covid-19 restrictions, TeskaLabs extended the Demonstrator with user interface accessible over Internet (Web UI) to enable remote access to the demonstrator installation.
TeskaLabs has demonstrated that C-ITS security standards can be applied on a much broader spectrum of vehicle communication technologies and use cases, e.g. securing communication between the electric vehicle and the charger.
For more information on the EV Charging Station security demonstrator, please contact us at info@teskalabs.com
Are you interested in security for connected vehicles? Visit this page
Most Recent Articles
- A beginner-friendly intro to the Correlator for effective cybersecurity detection
- Inotify in ASAB Library
- From State Machine to Stateless Microservice
- Entangled ways of product development in the area of cybersecurity #3 - LogMan.io
- Entangled ways of product development in the area of cybersecurity #2 - BitSwan
You Might Be Interested in Reading These Articles
TeskaLabs delivers C-ITS PKI for C-Roads in Greece
We are proud to announce that, TeskaLabs recently launched a cybersecurity solution – known as PKI – as a service for C-Roads pilot in Greece.
Published on January 15, 2022
C-ITS: The European Commission is updating the list of the Root Certificates
23rd April 2021 marks the release of the fifth edition of the European Certificate Trust List (ECTL). This was released by the Joint Research Centre of the European Commission (EC JRC), and is used in Cooperative Intelligent Transport Systems (C-ITS). It is otherwise known as the L0 edition release, intended for use primarily in test and pilot deployments. Currently these activities are primarily European and focus on fields such as intelligent cars and road infrastructure.
press
automotive
c-its
v2x
security
Published on May 06, 2021
Future of the Automotive Mobility and Data Security
Mobility has always been at the cutting edge of human innovation and technological advancement. This is unlikely to change in the foreseeable future. Already, mobility as we know it is seeing significant disruption thanks to the entry of nontraditional players who are leveraging the power of computing devices and the Internet. But few things are likely to have a bigger impact on mobility than the enormous volumes of data that will be generated as a result.
Published on February 10, 2019