During recent years the consideration of environmental issues is becoming increasingly important. For this reason, transportation sector is finding means to replace conventional fuel engines. Electric vehicles (EVs) are emerging as a valid alternative to internal combustion engines vehicles. Researchers are starting to design models for recharging batteries while the EV is in motion, namely Charge While Driving (CWD) methods. To begin a dynamic wireless charging session and during the whole process, the EV has to communicate with different entities in order to exchange information about its identity, the charging level, billing data and other depending on the architecture of the system. Considering the sensitivity of the exchanged information, the research community developed various authentication protocols to protect the communications. In order to provide full connection security, the intra-vehicle communication plays an important role. However, security is often not implemented due to the usage of legacy systems such as Controller Area Network (CAN) bus. Therefore, it is fundamental to develop secure solutions that however do not impact the behavior of traditional systems. In this work we review the main authentication protocols for CWD technology, and CAN bus covert channels available in the literature.
During recent years the consideration of environmental issues is becoming increasingly important. For this reason, transportation sector is finding means to replace conventional fuel engines. Electric vehicles (EVs) are emerging as a valid alternative to internal combustion engines vehicles. Researchers are starting to design models for recharging batteries while the EV is in motion, namely Charge While Driving (CWD) methods. To begin a dynamic wireless charging session and during the whole process, the EV has to communicate with different entities in order to exchange information about its identity, the charging level, billing data and other depending on the architecture of the system. Considering the sensitivity of the exchanged information, the research community developed various authentication protocols to protect the communications. In order to provide full connection security, the intra-vehicle communication plays an important role. However, security is often not implemented due to the usage of legacy systems such as Controller Area Network (CAN) bus. Therefore, it is fundamental to develop secure solutions that however do not impact the behavior of traditional systems. In this work we review the main authentication protocols for CWD technology, and CAN bus covert channels available in the literature.
Protocolli di autenticazione per la ricarica dei veicoli elettrici durante la guida e soluzioni covert channel su CAN bus
STEFANI, CLAUDIO
2022/2023
Abstract
During recent years the consideration of environmental issues is becoming increasingly important. For this reason, transportation sector is finding means to replace conventional fuel engines. Electric vehicles (EVs) are emerging as a valid alternative to internal combustion engines vehicles. Researchers are starting to design models for recharging batteries while the EV is in motion, namely Charge While Driving (CWD) methods. To begin a dynamic wireless charging session and during the whole process, the EV has to communicate with different entities in order to exchange information about its identity, the charging level, billing data and other depending on the architecture of the system. Considering the sensitivity of the exchanged information, the research community developed various authentication protocols to protect the communications. In order to provide full connection security, the intra-vehicle communication plays an important role. However, security is often not implemented due to the usage of legacy systems such as Controller Area Network (CAN) bus. Therefore, it is fundamental to develop secure solutions that however do not impact the behavior of traditional systems. In this work we review the main authentication protocols for CWD technology, and CAN bus covert channels available in the literature.File | Dimensione | Formato | |
---|---|---|---|
[PDF-A][FINAL] Claudio_Stefani___Cybersecurity_MsC_Thesis.pdf
accesso aperto
Dimensione
1.13 MB
Formato
Adobe PDF
|
1.13 MB | Adobe PDF | Visualizza/Apri |
The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License
https://hdl.handle.net/20.500.12608/46197