vulnerabilities of ev battery packs to cyber attacks€¦ · [email protected] , [email protected]...
TRANSCRIPT
Leaf i3 e6
Mod
el S0 0.2 0.4 0.6 0.8 1
Total Time of Attack [hr]
AC-High+Lights+Power-Steering+WipersAC-Low+Power-Steering+WipersAC-HighAC-LowWipersPower SteeringLightsFan
0
6
12
18
Fra
ctio
n o
f T
ota
l R
an
ge
Lost
[%
]
0
6
12
18
0
3
6
9
0
2
4
6
Charging at WorkCharging at Home
Oslo
San Francisco
Beijing
Delhi
Phoenix1
1.5
2
2.5
3
3.5
R* (
in 4
00
da
ys)
T = 40oC
0 1 2 3 4 5 6Power [kW]
10.8
11
11.2
11.4
11.6
%D
am
age
to V
ital
Cap
aci
ty
AC-High+Lights+Power-Steering+WipersAC-Low+Power-Steering+WipersAC-HighAC-LowWipersPower SteeringLightsFan
0 10 20 30 40
Ambient Temperature [oC]
0
2
4
6
8
10
12
% D
am
ag
e to
Vit
al
Ca
pa
city
39.8 39.9 4010.5
11
11.5
T = 40oC
0 5 10 15 20 25Total Time of Attack [days]
0
5
10
15
% D
am
ag
e to
Vit
al
Ca
pa
city
18 18.5 1910
10.5
11
Baseline LoadAttack Load
Home Work Home
Attack
(a)
-20
0
20
40
60
Po
wer
[k
W]
AttackAttack
(b)
Baseline LoadAttack Load
0:00 4:00 9:00 14:00 19:00 23:59Time-of-day [24-hour clock]
-20
0
20
40
60
Po
wer
[k
W]
Jan
Feb
Mar
Ap
r
May
Ju
n
Ju
l
Au
g
Sep
Oct
Nov
Dec
Months
-10
0
10
20
30
40
Aver
age
Tem
per
atu
re [
oC
]
PhoenixSan FranciscoOsloBeijingDelhi
Vulnerabilities of EV Battery Packs to Cyber AttacksShashank Sripad*, Sekar Kulandaivel^, Vyas Sekar^, Venkat Viswanathan*
*Department of Mechanical Engineering, ^Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213.
✉ [email protected] , [email protected]
INTRODUCTION RESULTS
FUTURE WORK
Pictorial illustration of an attack scenario
Parametric analysis of the different variables
• Modern Automobiles are entirely controlled by electronic circuits which expose them to cyber threats.
• Large-scale EV adoption is underway.
• There are unique and critical risks involved with EV batteries which could be the target of cyber attacks.
Short-term impact on available range
• Auxiliary component-based attacks cause significant short-term damage by depleting the available range and potential long-term impact by enhancing the side reactions.
• Inclusion of the charging infrastructure would facilitate a more comprehensive understanding of the risks and impact.
• Our analysis highlights the importance of developing phenomenological models of the degradation process and safety models along similar lines will be used in future work.
• The use of metrics like ∆R has implications on other areas like V2G scenarios.
• Leveraging safety models to quantify the risk of events like thermal runaway in cyber attack scenarios.
Comparison of the permanent damage in different locations
Attack workloads and environmental conditions