Published August 26, 2025 | Version v1
Conference paper Open

Evaluating 5G-enabled EV Charging Infrastructure's Resilience Through Stealthy Cyber-Attacks

  • 1. University of Thessaly
  • 2. ROR icon University of Peloponnese
  • 3. University of Thessaly & Sphynx Hellas

Description

The adoption of Electric Vehicles (EVs) over the last years has gained increased attention due to the technological, financial, and environmental gains they offer. However, it has also introduced a vast and exponentially growing threat landscape, which is also complex to analyze. The complexity is even increased when considering the current integration of EV chargers in 5G-oriented network slices and architectures. Hence, the threat landscape analysis becomes crucial to derive the Tactics, Techniques, and Procedures (TTPs) that are applicable to the EV-oriented ecosystem as well as their impact on the underlying charging infrastructure. This paper proposes a framework for conducting stealthy attack scenarios and validating their impact on the EV charging infrastructure. In the current version of the framework, two prominent attack types are included: the Denial of Charge when legitimate users are using the EV charging stations and the False Data Injection, tampering with the meter values during and at the end of the charging transaction. For these scenarios, we describe the testbed that is used to conduct the cyber-attacks, provide a detailed overview of the TTPs, and demonstrate their impact on the charging infrastructure.

Files

EV_security.pdf

Files (2.6 MB)

Name Size Download all
md5:b84da4cb9d32bc34d09eee33f7f9c2d8
2.6 MB Preview Download

Additional details

Funding

European Commission
XTRUST-6G - Extended zero-trust and intelligent security for resilient and quantum-safe 6G networks and services 101192749