{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T03:50:44Z","timestamp":1772769044999,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,30]]},"DOI":"10.1145\/3616392.3623424","type":"proceedings-article","created":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:06:55Z","timestamp":1698624415000},"page":"31-38","update-policy":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Securing the Electric Vehicle Charging Infrastructure: An In-Depth Analysis of Vulnerabilities and Countermeasures"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/orcid.org\/0009-0005-4374-0636","authenticated-orcid":false,"given":"Gerald","family":"Vailoces","sequence":"first","affiliation":[{"name":"Ontario Tech University, Oshawa, ON, Canada"}]},{"ORCID":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/orcid.org\/0009-0008-3596-333X","authenticated-orcid":false,"given":"Alexander","family":"Keith","sequence":"additional","affiliation":[{"name":"Ontario Tech University, Oshawa, ON, Canada"}]},{"ORCID":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/orcid.org\/0000-0002-2833-6900","authenticated-orcid":false,"given":"Abdulaziz","family":"Almehmadi","sequence":"additional","affiliation":[{"name":"University of Tabuk, Tabuk, Saudi Arabia"}]},{"ORCID":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/orcid.org\/0000-0002-5960-6942","authenticated-orcid":false,"given":"Khalil","family":"El-Khatib","sequence":"additional","affiliation":[{"name":"Ontario Tech University, Oshawa, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2023,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132340.3132346"},{"key":"e_1_3_2_1_2_1","first-page":"1","author":"Alcaraz C.","year":"2017","unstructured":"Alcaraz, C., Lopez, J., and Wolthusen, S. Ocpp protocol: Security threats and challenges. IEEE Transactions on Smart Grid PP (02 2017), 1--1.","journal-title":"IEEE Transactions on Smart Grid PP (02"},{"key":"e_1_3_2_1_3_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Baker R.","year":"2019","unstructured":"Baker, R., and Martinovic, I. Losing the car keys: Wireless PHY-Layer insecurity in EV charging. In 28th USENIX Security Symposium (USENIX Security 19) (Santa Clara, CA, Aug. 2019), USENIX Association, pp. 407--424."},{"key":"e_1_3_2_1_4_1","first-page":"1","volume":"33","author":"Bao K.","unstructured":"Bao, K., Valev, H., Wagner, M., and Schmeck, H. A threat analysis of the vehicle-to-grid charging protocol iso 15118. Computer Science - Research and Development 33 (02 2018), 1--10.","journal-title":"Research and Development"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPIES48661.2020.9243152"},{"key":"e_1_3_2_1_6_1","unstructured":"ChargePoint Inc. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.chargepoint.com\/about\/news\/chargepointstatement- iso-15118-white-paper. ChargePoint News 2023. Retrieved February 20 2023 from https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.chargepoint.com\/about\/news\/chargepoint-statementiso- 15118-white-paper."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/GreenTech.2019.8767141"},{"key":"e_1_3_2_1_8_1","volume-title":"Retrieved","author":"GreenFlux Assets B.V.","year":"2023","unstructured":"GreenFlux Assets B.V. Open protocols. Retrieved February 15, 2023 from https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.greenflux.com\/spotlights\/open-protocols\/."},{"key":"e_1_3_2_1_9_1","volume-title":"Retrieved","author":"Haaf P.","year":"2023","unstructured":"Haaf, P. Plug and charge - an essential step towards seamless e-mobility, 2020. Retrieved January 23, 2023 from https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.capgemini.com\/insights\/expertperspectives\/ plug-and-charge-an-essential-step-towards-seamless-e-mobility\/."},{"key":"e_1_3_2_1_10_1","volume-title":"Ev charging: Mapping out the cyber security threats and solutions for grids and charging infrastructure. UtiliNet Europe","author":"Hille C.","year":"2018","unstructured":"Hille, C., and Allhoff, M. Ev charging: Mapping out the cyber security threats and solutions for grids and charging infrastructure. UtiliNet Europe (2018)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2989275.2989283"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3390\/en15113931"},{"key":"e_1_3_2_1_13_1","volume-title":"Retrieved","author":"Kaspersky","year":"2023","unstructured":"Kaspersky. Remotely controlled ev home chargers - the threats and vulnerabilities, 2018. Retrieved February 20, 2023 from https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/securelist.com\/remotelycontrolled- ev-home-chargers-the-threats-and-vulnerabilities\/89251\/."},{"key":"e_1_3_2_1_14_1","first-page":"3515","volume-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2022), CCS '22, Association for Computing Machinery","author":"K\u00f6hler S.","unstructured":"K\u00f6hler, S., Baker, R., Strohmeier, M., and Martinovic, I. Demo: End-to-end wireless disruption of ccs ev charging. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2022), CCS '22, Association for Computing Machinery, p. 3515--3517."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2989275.2989282"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3416014.3424601"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9798072"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3129676.3129693"},{"key":"e_1_3_2_1_19_1","volume-title":"The basics of plug & charge","author":"Multin M.","year":"2020","unstructured":"Multin, M. The basics of plug & charge, 2020. Retrieved February 3, 2023 from https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.switch-ev.com\/blog\/basics-of-plug-and-charge."},{"key":"e_1_3_2_1_20_1","volume-title":"What is iso 15118","author":"Multin M.","year":"2021","unstructured":"Multin, M. What is iso 15118, 2021. Retrieved February 1, 2023 from https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.switch-ev.com\/blog\/what-is-iso-15118."},{"key":"e_1_3_2_1_21_1","volume-title":"Open charge point protocol 2.0.1. Retrieved","author":"Open Charge Alliance","year":"2023","unstructured":"Open Charge Alliance. Open charge point protocol 2.0.1. Retrieved February 8, 2023 from https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.openchargealliance.org\/protocols\/ocpp-201\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITSI56531.2022.9970949"},{"key":"e_1_3_2_1_23_1","volume-title":"Retrieved","author":"Research","year":"2023","unstructured":"Research and Markets. Electric vehicle charging station global market report 2022: Demand for quicker and more efficient charging drives growth, Jan. 2022. Retrieved January 25, 2023 from https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.businesswire.com\/news\/home\/20230123005419\/en\/Electric- Vehicle-Charging-Station-Global-Market-Report-2022-Demand-for-Quickerand- More-Efficient-Charging-Drives-Growth-ResearchAndMarkets.com."},{"key":"e_1_3_2_1_24_1","volume-title":"Retrieved","author":"Sibanda I.","year":"2023","unstructured":"Sibanda, I. Security weaknesses exposed in ev systems. Retrieved March 28, 2023 from https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.rsaconference.com\/library\/Blog\/security-weaknessesexposed- in-ev-systems."},{"key":"e_1_3_2_1_25_1","volume-title":"Kaspersky, 2018","author":"Sklyar D.","year":"2023","unstructured":"Sklyar, D. Chargepoint home security research. Kaspersky, 2018. Retrieved February 20, 2023 from https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/media.kasperskycontenthub.com\/wpcontent\/ uploads\/sites\/43\/2018\/12\/13084354\/ChargePoint-Home-securityresearch_ final.pdf."},{"key":"e_1_3_2_1_26_1","volume-title":"Retrieved","author":"Stykas V.","year":"2023","unstructured":"Stykas, V. Smart car chargers, 2021. Retrieved February 15, 2023 from https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.pentestpartners.com\/security-blog\/smart-car-chargers-plugn- play-for-hackers\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656346.2656348"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC48107.2020.9148231"},{"key":"e_1_3_2_1_29_1","first-page":"163","volume":"01","author":"Varriale R.","year":"2022","unstructured":"Varriale, R., Crawford, R., and Jaynes, M. Risks of Electric Vehicle Supply Equipment Integration Within Building Energy Management System Environments: A Look at Remote Attack Surface and Implications. Springer International Publishing, 01 2022, pp. 163--173.","journal-title":"Remote Attack Surface and Implications. Springer International Publishing"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656346.2656353"},{"key":"e_1_3_2_1_31_1","volume-title":"Retrieved","author":"Wood J.","year":"2023","unstructured":"Wood, J. Electric vehicles: The 3 main factors holding back sales, October 2022. Retrieved January 15, 2023 from https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.weforum.org\/agenda\/2022\/10\/evsales- charging-infrastructure-transport-sector-sustainable."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2989275.2989285"}],"event":{"name":"MSWiM '23: Int'l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems","location":"Montreal Quebec Canada","acronym":"MSWiM '23","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"]},"container-title":["Proceedings of the Int'l ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications"],"original-title":[],"link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3616392.3623424","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/3616392.3623424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:38:19Z","timestamp":1755823099000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3616392.3623424"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,30]]},"references-count":32,"alternative-id":["10.1145\/3616392.3623424","10.1145\/3616392"],"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1145\/3616392.3623424","relation":{},"subject":[],"published":{"date-parts":[[2023,10,30]]},"assertion":[{"value":"2023-10-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}