Feb. 10, 2022, 2:20 a.m. | Pol Van Aubel (1), Erik Poll (1) ((1) Digital Security group, Institute for Computing and Information Sciences, Radboud University)

cs.CR updates on arXiv.org arxiv.org

The field of electric vehicle charging involves a complex combination of
actors, devices, networks, and protocols. These protocols are being developed
without a clear focus on security. In this paper, we give an overview of the
main roles and protocols in use in the Netherlands. We describe a clear
attacker model and security requirements, show that in light of this many of
the protocols have security issues, and provide suggestions on how to address
these issues. The most important conclusion …

ev protocols security

Director, Cyber Risk

@ Kroll | South Africa

Security Engineer, XRM

@ Meta | New York City

Security Analyst 3

@ Oracle | Romania

Internship - Cyber Security Operations

@ SES | Betzdorf, LU

Principal Product Manager (Network/Security Management) - NetSec

@ Palo Alto Networks | Bengaluru, India

IT Security Engineer

@ Timocom GmbH | Erkrath, Germany