With the implementation of UK regulations on smart charging posts for electric vehicles, cyber security aspects are important and need to be taken into account

Will Cyber Security Become More And More Important In The EV Charger?

Facebook
Twitter
LinkedIn

Electric vehicles are an exciting breakthrough in smart mobility to improve the air quality we breathe. They are expected to make up 30% of the cars on the roadway by 2030. Although it can save us from relying on fossil fuels for transportation and electricity systems, charging millions of EV batteries would require management to avoid overburdening the electricity grid.

The Electric Vehicles (Smart Charging Points) Regulations 2021, in addition to the safety requirements regulations in Schedule 1, have been implemented in the UK on 30 June 2022. The safety requirements regulations in Schedule 1 will come into force on 30 December 2022. The regulation requires all EV charging stations in the UK to have smart features and must meet regulatory requirements involving off-peak charging, randomised delay, Measuring system, security privacy, etc.

EV Smart Charging Functionality

The new regulation stipulates that the relevant charge point has smart functionality is its ability to send and receive information through the communication network, responding to signals or other information it receives by increasing or decreasing the amount of power flowing through the charge point and changing the timing of the power flowing through the charge point. Also provided are response DSR services and at least one user interface.

 

We can briefly understand that smart charging is the communication and data sharing between EVs, EV charge points, and charging applications, thus enabling users to better monitor charging conditions.

 

Smart and Vehicle-to-Grid (V2G) chargers can take the edge off this problem as it balances electricity demand and supply across a green electricity system, thus minimizing consumer costs. These managed chargers allow control over the time, speed, and direction of charging. However, like any new technology, EV charging infrastructure is as vulnerable to cyber security threats as any other connected device.

Smart and Vehicle-to-Grid (V2G) chargers can take the edge off this problem as it balances electricity demand and supply across a green electricity system, thus minimizing consumer costs.

The EV Charging Station Is The Potential Target For Cyber-Security Attack 

Although our EV has safe algorithms implemented and security protocols, there might be security breaches within the Evs charging stations when we plug our EV in to charge it. Sometimes, it can endanger our privacy by stealing personal and payment information and our security by gaining access to home networks or the entire electric grid infrastructure by manipulating it.

 

Smart chargers connect Evs to the power grid using a charging device or application with a data connection to control commands between different entities in the EV ecosystem. Given a link between vehicles and the power grid, EV charging stations exchange information and are access points for hackers to steal private information.

 

Therefore, the EV sector needs to implement a secure system to permit consumers and operators to trust smart charging systems. EV ecosystem actors must be mindful of building privacy into the product from its design phase and ensure security throughout.

Safety Measures for Electric Vehicle Charging Point

For the safe use of charging point, personal data, and charging application, the regulation state that we need to know the following, which is exactly what our Joint Tech EVC33 product has.

Joint Tech EVC33 is equipped with the cyber security features required by the EV Smart Charging Point Regulation

Password and Software

The password configured for the charging point is unique and that password cannot be reset to the default password that applies to that the relevant charging point and other charging points.

 

The charging point contains software with sufficient encryption to prevent cyber attacks on security updates. Verification is performed by reference to the source and content of the data, and the software is updated only after successful verification, and provide notifications about software updates.

Sensitive Security Parameters and Secure Communication

The security credentials stored on the relevant charge point are protected by strong security measures and their software does not use hard-coded security credentials. At the same time, communications from the charge point are encrypted.

Data Inputs and Ease of Use

Data from the user interface, applications, and communication networks are verified, and if they cannot be verified, they need to be handled in a secure manner.

 

At the same time, the owner is able to operate the charge point simply and easily, whether in terms of charging settings, viewing charging messages, or even deleting any personal data.

Protection against Attack and Security Log

The charge point configuration includes a tamper-resistant boundary to protect the internal components of the charge point from use or attempted use of the associated charge point by means other than the user interface.

 

The associated charge point contains a security log that records events related to the security of the associated charge point, including breaches of the tamper-resistant boundary, tampering with the associated charge point and unauthorized access to the associated charge point.

There are many security measures for EV smart charging points, such as passwords, software, boundary, security logs, etc.

Recommendations And Guidance

Before mass uptakes of Evs, regulations regarding EV charging infrastructure have been under development to ensure privacy and protection of the ecosystem.

 

Encryption of data communications and anonymization must be mandatory to comply with data protection laws.

 

Devices should have proper memory and computational power to reduce insecure ecosystems or pricey hardware updates.

 

Publicly exposed devices must protect against remote attacks through encrypted communications .

 

Attack databases should be consulted, and security frameworks such as NIST should be adopted to manage security risks and provide guidance on preventing and detecting them.

 

Security assurance, certifications, and compliance testings are necessary for EV supply equipment.

Conclusion

The evolution of cyber security for the EV charging ecosystem is a big game between attackers and secure systems, combined with compliance with local and international policies. Cyber security requirements must be acknowledged starting from the charging point, including the customer, the EV, the charging station operator, and electric companies involved in incorporating EVs into the grid. Moreover, working tightly with security experts is also important to ensure the processes and devices are properly protected.

More to explorer

nema 14 15 outlet

What is NEMA 14 15 Outlet

NEMA 14 15 plugs are electrical plugs that are used to connect electrical devices to an electrical outlet. They are part of the NEMA standard for plugs.

top 5 amazon ev charger

The 5 Most Popular Amazon EV Charger?

There you have it, the 5 best Amazon EV charger on the market today. Each of the products shared comes with its unique features, pros and cons.

joint dual ev charger

Importance Of Dual EV Charger

It is common to find two or more people owning an electric vehicle in the family,so how to charge two ev at home at the same time – using a dual EV charger.

Leave a Reply

Your email address will not be published. Required fields are marked *

Tell us what you most want to know!

We have a wealth of content about products and the latest news.

* Our team will reply to you in 24 hours.

* Our team will reply to you in 24 hours.