Zelle, Daniel (2024)
Protecting Data Communication for the Next Generation Electric Vehicles.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00028037
Ph.D. Thesis, Primary publication, Publisher's Version
Text
PHD_Zelle_72024.pdf Copyright Information: CC BY 4.0 International - Creative Commons, Attribution. Download (14MB) |
Item Type: | Ph.D. Thesis | ||||
---|---|---|---|---|---|
Type of entry: | Primary publication | ||||
Title: | Protecting Data Communication for the Next Generation Electric Vehicles | ||||
Language: | English | ||||
Referees: | Waidner, Prof. Dr. Michael ; Kargl, Prof. Dr. Frank ; Krauß, Prof. Dr. Christoph | ||||
Date: | 3 September 2024 | ||||
Place of Publication: | Darmstadt | ||||
Collation: | xiv, 236 Seiten | ||||
Date of oral examination: | 10 July 2024 | ||||
DOI: | 10.26083/tuprints-00028037 | ||||
Abstract: | This dissertation focuses on the cybersecurity of modern electric vehicles (EVs), specifically their communication protocols. The research highlights IT security risks, such as the manipulation of driving behavior, data breaches during the charging process, and threats to the stability of the power grid from EV charging. A threat and risk analysis (TARA) is conducted to identify the critical points of attack in vehicle communication. We present an innovative approach to automating the assessment of the attack surface, which will accelerate the TARA process and reduce errors. The assessment reveals high risks in internal vehicle communication as well as in charging communication. To secure internal communication via the CAN bus, we propose the BusCount protocol as a secure communication solution for protecting automotive networks. This approach provides clear advantages over existing solutions in protecting against replay and delay attacks. Furthermore, we investigate securing modern automotive Ethernet using TLS and validate various communication scenarios. We assess the potential performance impacts of different ciphers on typical automotive hardware and compare them to the industry’s requirements. Security gaps were identified in the widespread SOME/IP protocol in service-oriented communication via automotive Ethernet. We developed two possible protocol extensions to secure SOME/IP. This work also addresses potential manipulation of the power grid and data protection issues during the charging process to ensure the security of the EV charging infrastructure. We show how to reduce the transmission of personal data during the charging process and propose an extension for the existing Plug & Charge protocols. Our proposed solution utilizes a Direct Anonymous Attestation (DAA) scheme for anonymous charging. In summary, this work contributes to advancing EV cybersecurity by identifying critical aspects through a risk assessment and proposing ways to secure internal Controller Area Network (CAN) and automotive Ethernet communication. Additionally, this work addresses security and privacy issues related to the EV charging infrastructure. These findings and solutions provide a solid foundation for creating a more secure environment for EVs in the rapidly evolving automotive industry. |
||||
Alternative Abstract: |
|
||||
Status: | Publisher's Version | ||||
URN: | urn:nbn:de:tuda-tuprints-280374 | ||||
Classification DDC: | 000 Generalities, computers, information > 004 Computer science | ||||
Divisions: | 20 Department of Computer Science > Security in Information Technology | ||||
Date Deposited: | 03 Sep 2024 09:20 | ||||
Last Modified: | 04 Sep 2024 06:03 | ||||
URI: | https://tuprints.ulb.tu-darmstadt.de/id/eprint/28037 | ||||
PPN: | 521062071 | ||||
Export: |
View Item |