Public Plug-in Electric Vehicles + Grid Data: Is a New Cyberattack Vector Viable?

High-wattage demand-side appliances such as Plug-in Electric Vehicles (PEVs) are proliferating. As a result, information on the charging patterns of PEVs is becoming accessible via smartphone applications, which aggregate real-time availability and historical usage of public PEV charging stations. Moreover, information on the power grid infrastructure and operations has become increasingly available in technical documents and real-time dashboards of the utilities, affiliates, and the power grid operators. The research question that this study explores is: Can one combine high-wattage demand-side appliances with public information to launch cyberattacks on the power grid? To answer this question and report a proof of concept demonstration, the study scrapes data from public sources for Manhattan, NY, USA using the electric vehicle charging station smartphone application and the power grid data circulated by the U.S. Energy Information Administration, New York Independent System Operator, and the local utility in New York. It then designs a novel data-driven cyberattack strategy using state-feedback based partial eigenvalue relocation, which targets frequency stability of the power grid. The study establishes that while such an attack is not possible at the current penetration level of PEVs, it will be practical once the number of PEVs increases.

[1]  Roderick Currie Hacking the CAN Bus: Basic Manipulation of a Modern Automobile Through CAN Bus Reverse Engineering , 2020 .

[2]  Chen Chen,et al.  Cyber-Constrained Optimal Power Flow Model for Smart Grid Resilience Enhancement , 2019, IEEE Transactions on Smart Grid.

[3]  Raju Gottumukkala,et al.  Cyber-physical System Security of Vehicle Charging Stations , 2019, 2019 IEEE Green Technologies Conference(GreenTech).

[4]  Masoud Abbaszadeh,et al.  Hierarchical Location Identification of Destabilizing Faults and Attacks in Power Systems: A Frequency-Domain Approach , 2019, IEEE Transactions on Smart Grid.

[5]  Mihalis Yannakakis,et al.  REACT to Cyber Attacks on Power Grids , 2019, IEEE Transactions on Network Science and Engineering.

[6]  Richard M. Pratt,et al.  Vehicle Charging Infrastructure Security , 2019, 2019 IEEE International Conference on Consumer Electronics (ICCE).

[7]  W. Hager,et al.  and s , 2019, Shallow Water Hydraulics.

[8]  Hongtao Sun,et al.  A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[9]  Yue Xu,et al.  Petri Net-based Power CPS Network Attack and Impact Modeling , 2018, 2018 5th IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS).

[10]  Lamia Ben Azzouz,et al.  Cyber security issues of Internet of electric vehicles , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).

[11]  Graham Watson,et al.  DOE/DHS/DOT Volpe Technical Meeting on Electric Vehicle and Charging Station Cybersecurity Report , 2018 .

[12]  Mihalis Yannakakis,et al.  Power Grid State Estimation Following a Joint Cyber and Physical Attack , 2018, IEEE Transactions on Control of Network Systems.

[13]  Golshan Madraki,et al.  Cyber-Physical Resilience of Electrical Power Systems Against Malicious Attacks: a Review , 2018 .

[14]  Athanasios V. Vasilakos,et al.  Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems , 2018, IEEE Transactions on Smart Grid.

[15]  Carlos Murguia,et al.  On Reachable Sets of Hidden CPS Sensor Attacks , 2017, 2018 Annual American Control Conference (ACC).

[16]  H. Vincent Poor,et al.  BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid , 2018, USENIX Security Symposium.

[17]  Hamed Mohsenian-Rad,et al.  Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes , 2017, IEEE Transactions on Smart Grid.

[18]  Yi Zhou,et al.  Understanding the Mirai Botnet , 2017, USENIX Security Symposium.

[19]  Parimal Saraf,et al.  Power system damping analysis on large power system networks: An entergy case study , 2017, 2017 IEEE Power & Energy Society General Meeting.

[20]  Zhao Yang Dong,et al.  The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.

[21]  Siddharth Garg,et al.  IoT-enabled distributed cyber-attacks on transmission and distribution grids , 2017, 2017 North American Power Symposium (NAPS).

[22]  Haibo He,et al.  Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..

[23]  S. Ahmed,et al.  Electric vehicle technology as an exploit for cyber attacks on the next generation of electric power systems , 2016, 2016 4th International Conference on Control Engineering & Information Technology (CEIT).

[24]  Tin Yu Wu,et al.  Multilayered Impact Evaluation Model for Attacking Missions , 2016, IEEE Systems Journal.

[25]  Abdullah Abusorrah,et al.  Bilevel Model for Analyzing Coordinated Cyber-Physical Attacks on Power Systems , 2016, IEEE Transactions on Smart Grid.

[26]  Manimaran Govindarasu,et al.  Stealthy cyber attacks and impact analysis on wide-area protection of smart grid , 2016, 2016 North American Power Symposium (NAPS).

[27]  Flavio D. Garcia,et al.  Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems , 2016, USENIX Security Symposium.

[28]  Lalitha Sankar,et al.  Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks , 2016, IEEE Transactions on Smart Grid.

[29]  Craig A. Smith,et al.  The Car Hacker's Handbook: A Guide for the Penetration Tester , 2016 .

[30]  Dong Hoon Lee,et al.  A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN , 2015, IEEE Transactions on Intelligent Transportation Systems.

[31]  D. Lowe-Wincentsen Alternative Fuels Data Center , 2013 .

[32]  Balarko Chaudhuri,et al.  Partial Pole Placement with Controller Optimization , 2012, IEEE Transactions on Automatic Control.

[33]  Vijay Modi,et al.  Spatial distribution of urban building energy consumption by end use , 2012 .

[34]  W. Marsden I and J , 2012 .

[35]  Lisa Turner,et al.  Applications of Second Order Cone Programming , 2012 .

[36]  Zuyi Li,et al.  Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.

[37]  J. Steinbruner,et al.  Beyond Nuclear Deterrence: Transforming the U.S.-Russian Equation , 2011 .

[38]  Shwetak N. Patel,et al.  Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.

[39]  Fred Denny,et al.  Distribution System Modeling and Analysis , 2001 .

[40]  Hadi Saadat,et al.  Power System Analysis , 1998 .

[41]  P. Kundur,et al.  Power system stability and control , 1994 .

[42]  S. Liberty,et al.  Linear Systems , 2010, Scientific Parallel Computing.

[43]  H. H. Happ,et al.  Power System Control and Stability , 1979, IEEE Transactions on Systems, Man, and Cybernetics.