Breaking News

HighPoint introduces Industry’s First Hardware Architecture for GPU-Direct NVMe Storage Panasonic Introduces the First Ultra-Telephoto Zoom Lens in the LUMIX S Series CORSAIR announces Vanguard Pro 96 and Vanguard 96 Gaming Keyboards Viltrox Spark Z3 TTL On-Camera Flash Transcend Launches Next-Gen microSD Express USD710S

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Charging Your Electric Car May Not be Secure

Charging Your Electric Car May Not be Secure

Enterprise & IT Jan 9,2018 0

Charging your electric car in the charging station in your neighborhood may expose your personal data, a cybersecurty researcher claims.

Mathias Dalheimer raised this issue at the thirty-fourth Chaos Communication Congress, in his talk about the vulnerabilities of the electric car infrastructure.

Charging station providers receive money in exchange for providing electrical energy. For those transactions, they need a built-in billing system. Before you can start charging your car, you need to identify yourself using your charging ID token, a special near-field-communication (NFC) card that is associated with your account.

The billing for electro mobility is normally carried out using the Open Charge Point Protocol, which regulates communications between billing management systems on one end and the electric charging point on the other end. The charging point sends a request identifying you to the billing system; billing management approves the request and lets the charging point know; and the station lets you start charging. Afterwards, the amount of electricity is calculated and sent back to the billing management system so that it can bill you at the end of the month.

Dalheimer probed different components of the system and found that all of them had some problems with security. The first is the ID tokens. They are made by third-party providers and most of them do not secure your data. They are very simple NFC cards that do not encrypt your ID or anything else they contain. The cards' problems continue. First, they're pretty easy to program, which Mathias demonstrated by copying his own card and successfully charging with the copy. It would be easy for a knowledgeable person to program a bunch of cards, hoping to hit on a working account number.

Because charging providers bill once per month, if a car owner's account is compromised in that way, they won't see that anything is amiss until the monthly bill arrives.

Most stations use the 2012 version of the OCPP protocol, which is already relatively old and is based on HTTP. Mathias demonstrated how easy it is to set up a man-in-the-middle attack by relaying the transaction.

Moreover, both stations that Mathias examined had USB ports. Plug in an empty flash drive - and logs and configuration data will be copied to the drive. From this data, it's easy to get the login and the password for the OCPP server and, for good measure, the token numbers of previous users - which, remember, is all you need to imitate them.

Even worse, if the data on the drive is modified and then the USB drive is inserted back into the charging point, the charging point will automatically update from it and consider the data on the drive its new configuration. And that opens a whole lot of new possibilities to the hackers.

To sum up, potential criminals could collect ID card numbers, imitate them and use them for transactions; rewire charging requests, basically disabling the charging point; gain root access to the station and then do whatever they like.

Tags: electric cars
Previous Post
CES: Razer Project Linda Transorms the Razer Phone into an Android Laptop
Next Post
CES: MediaTek Launches AI Platform

Related Posts

  • The future of the motoring industry

  • Ford Says Mustang Mach-E Can Add 119 Kilometres of Driving Range in 10 Minutes

  • Tesla Develops New Low-cost, Long-life Battery for Electric Cars: report

  • New Ford Mustang Mach-E to Have an Over-The-Air Update System

  • Tesla Delays The Release of Roadster Sports Car

  • NIO Enters Agreements for Investments in NIO China

  • China’s Xpeng P7 EV Has a 706km Range - Longer Than Tesla’s Model 3

  • Polestar 2 Electric Car Will Launch in the U.S. Starting from $60,000

Latest News

HighPoint introduces Industry’s First Hardware Architecture for GPU-Direct NVMe Storage
Enterprise & IT

HighPoint introduces Industry’s First Hardware Architecture for GPU-Direct NVMe Storage

Panasonic Introduces the First Ultra-Telephoto Zoom Lens in the LUMIX S Series
Cameras

Panasonic Introduces the First Ultra-Telephoto Zoom Lens in the LUMIX S Series

CORSAIR announces Vanguard Pro 96 and Vanguard 96 Gaming Keyboards
PC components

CORSAIR announces Vanguard Pro 96 and Vanguard 96 Gaming Keyboards

Viltrox Spark Z3 TTL On-Camera Flash
Cameras

Viltrox Spark Z3 TTL On-Camera Flash

Transcend Launches Next-Gen microSD Express USD710S
Cameras

Transcend Launches Next-Gen microSD Express USD710S

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

be quiet! Pure Base 501

be quiet! Pure Base 501

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed