Securing the Electrified Future: A Systematic Review of Cyber Attacks, Intrusion and Anomaly Detection, and Authentication in Electric Vehicle Charging Infrastructure
Lukasz Pawlik (),
Jacek Lukasz Wilk-Jakubowski (),
Pawel Tomasz Grabski and
Grzegorz Wilk-Jakubowski
Additional contact information
Lukasz Pawlik: Department of Information Systems, Kielce University of Technology, 7 Tysiąclecia Państwa Polskiego Ave., 25-314 Kielce, Poland
Jacek Lukasz Wilk-Jakubowski: Department of Information Systems, Kielce University of Technology, 7 Tysiąclecia Państwa Polskiego Ave., 25-314 Kielce, Poland
Pawel Tomasz Grabski: Department of Automotive Engineering and Transport, Kielce University of Technology, 7 Tysiąclecia Państwa Polskiego Ave., 25-314 Kielce, Poland
Grzegorz Wilk-Jakubowski: Institute of Crisis Management and Computer Modelling, 28-100 Busko-Zdrój, Poland
Energies, 2025, vol. 18, issue 18, 1-43
Abstract:
The growing popularity of electric vehicles (EVs) necessitates a robust and secure charging infrastructure. This review article analyzes the current state of cybersecurity challenges within EV charging ecosystems, focusing on vulnerabilities affecting charging stations, communication protocols, and grid integration technologies such as vehicle-to-grid (V2G). Based on a systematic literature review, common cyber threats are categorized, including data manipulation, authentication bypass, infrastructure failures, and attacks on backend systems and the power grid. Furthermore, this paper synthesizes existing and emerging risk mitigation strategies, encompassing intrusion detection systems (IDS), secure communication protocols, authentication frameworks, and anomaly detection techniques utilizing machine learning and blockchain technologies. By analyzing literature published between 2017 and 2024, this study aims to provide a comprehensive overview of cybersecurity issues that are critical to ensuring the resilience and reliability of the evolving EV charging infrastructure. The scope of this review is centered specifically on cyber attacks, intrusion and anomaly detection, and authentication mechanisms within EV charging infrastructures, rather than on the broader cybersecurity domain.
Keywords: electric vehicles; charging infrastructure; cybersecurity; cyber attacks; intrusion detection; anomaly detection; power grids; green security; embedded systems (search for similar items in EconPapers)
JEL-codes: Q Q0 Q4 Q40 Q41 Q42 Q43 Q47 Q48 Q49 (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/1996-1073/18/18/4847/pdf (application/pdf)
https://www.mdpi.com/1996-1073/18/18/4847/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jeners:v:18:y:2025:i:18:p:4847-:d:1747620
Access Statistics for this article
Energies is currently edited by Ms. Cassie Shen
More articles in Energies from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().