Cybersecurity in vehicle-to-grid (V2G) systems: A systematic review
Mohammad A. Razzaque,
Shafiuzzaman K. Khadem,
Sandipan Patra,
Glory Okwata and
Md. Noor-A-Rahim
Applied Energy, 2025, vol. 398, issue C, No S0306261925010943
Abstract:
Integrating electric vehicles (EVs) into the smart grid networks through vehicle-to-grid (V2G) systems offers transformative potential for energy optimisation and grid stability. However, this bidirectional energy exchange introduces significant cybersecurity challenges, including vulnerabilities to spoofing, denial-of-service attacks, and data manipulation, which threaten the integrity and reliability of the V2G system. Despite the growing body of research on V2G cybersecurity, existing studies often adopt fragmented approaches, leaving gaps in addressing the entire ecosystem, including users, EVs, charging stations, and energy market and trading platforms. This paper presents a systematic review of recent advancements in V2G cybersecurity, employing the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) framework for detailed searches across three journal databases and includes only peer-reviewed studies published between 2020 and 2024 (June). We identified and reviewed 134 V2G cybersecurity studies and found five important insights into existing V2G cybersecurity research. First, most studies (104 of 134) focused on protecting V2G systems against cyber threats, while only seven studies addressed the recovery aspect of the CRML (Cybersecurity Risk Management Lifecycle) function. Second, existing studies have adequately addressed the security of EVs and EVCS (EV charging stations) in V2G systems (113 and 81 of 134 studies, respectively). However, none have focused on the linkage between the behaviour of EV users and the cybersecurity of V2G systems. Third, physical access, control-related vulnerabilities, and user behaviour-related attacks in V2G systems are not addressed significantly. Furthermore, existing studies overlook vulnerabilities and attacks specific to AI (artificial intelligence) and blockchain technologies. Fourth, blockchain, AI, encryption, control theory, and optimisation are the main technologies used, and finally, the inclusion of quantum safety within encryption and AI models and AI assurance (AIA) is in a very early stage; only two and one of 134 studies explicitly addressed quantum safety and AIA through explainability. By providing a holistic perspective, this study identifies critical research gaps and outlines future directions for developing robust end-to-end cybersecurity solutions to safeguard V2G systems and support global sustainability goals.
Keywords: Elective vehicles (EV); Smart grid; Autonomous vehicles; Cybersecurity; Blockchain; Artificial intelligence; Vulnerabilities; Attacks; Quantum-safe; AI assurance (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
http://www.sciencedirect.com/science/article/pii/S0306261925010943
Full text for ScienceDirect subscribers only
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:eee:appene:v:398:y:2025:i:c:s0306261925010943
Ordering information: This journal article can be ordered from
http://www.elsevier.com/wps/find/journaldescription.cws_home/405891/bibliographic
http://www.elsevier. ... 405891/bibliographic
DOI: 10.1016/j.apenergy.2025.126364
Access Statistics for this article
Applied Energy is currently edited by J. Yan
More articles in Applied Energy from Elsevier
Bibliographic data for series maintained by Catherine Liu ().