Vol. 19, No. 2, February 28, 2025
10.3837/tiis.2025.02.011,
Download Paper (Free):
Abstract
The automobile sector has seen significant transformation and improvement due to the swift advancement of Electric Vehicles (EVs). There are many benefits to this change, such as lower emissions, lower costs, and less maintenance. However, because EVs rely so heavily on advanced technology and depend on their components, they also present significant cybersecurity issues. By being aware of potential cyber threats, manufacturers may better understand the need to implement robust security procedures to safeguard EVs and their infrastructure. In this work, the attack graph of the EV system is constructed and analyzed. Using Architectural analysis and design language (AADL), the system model that encapsulates the elements, connectivity, vulnerabilities, and threats is systematically characterized and encoded. To create the system’s attack graph, the encoded model is validated over the security
parameter of interest using the JKind model checker. The resulting graph can help systems architects identify possible vulnerabilities and where to deploy defenses to ensure complete protection against cyberattacks.
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Cite this article
[IEEE Style]
M. Ibrahim and A. Ebdah, "Security Analysis of Electrical Vehicle Systems," KSII Transactions on Internet and Information Systems, vol. 19, no. 2, pp. 572-588, 2025. DOI: 10.3837/tiis.2025.02.011.
[ACM Style]
Mariam Ibrahim and Abdallah Ebdah. 2025. Security Analysis of Electrical Vehicle Systems. KSII Transactions on Internet and Information Systems, 19, 2, (2025), 572-588. DOI: 10.3837/tiis.2025.02.011.
[BibTeX Style]
@article{tiis:102090, title="Security Analysis of Electrical Vehicle Systems", author="Mariam Ibrahim and Abdallah Ebdah and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2025.02.011}, volume={19}, number={2}, year="2025", month={February}, pages={572-588}}