Show simple item record

dc.contributor.authorΚουρτζέλλης, Παναγιώτης
dc.date.accessioned2022-03-30T11:57:50Z
dc.date.available2022-03-30T11:57:50Z
dc.date.issued2020-10
dc.identifier.other4766
dc.identifier.urihttps://dspace.uowm.gr/xmlui/handle/123456789/2446
dc.description125 σ., έγχρ. εικ., 30 εκ. + 1 οπτική δισκέτα λέϊζερ Η/Υ (4 3/4 ίν.)en_US
dc.description.abstractOne of the biggest problems of modern society is considered the air pollution, which has led to the discovery of alternative energy sources in combination with other factors, such as the reduction of natural resources due to their unbridled and uncontrolled exploitation. The interim solution of using catalysts to reduce pollution proved insufficient, because it simply limited the problem without leading to its final solution. The electric vehicle ensures zero emissions and frees users from dependence on liquid fuels, the sharp rise in prices and all kinds of shortages due to crises. The various vehicles, on a case-by-case basis, are equipped with the corresponding fuels to power their engines from each of the refueling stations. Therefore, to charge electric vehicles, charging point stations are needed to supply electricity. Their supply, as mentioned, requires their connection to some kind of electricity network infrastructure. The large area of the electricity grid offers many options for potential charging facilities. This thesis examines threats and cyber-attacks in the charging process and the targeting Battery Management System (BMS) and other parts of the car’s electronics’ system. More specifically, this thesis will examine whether the charging station hardware can be hacked in order to send these erroneous signals (either locally or remotely) and how the charging stations can be made tamper-proof and how cyber-attacks can be detected. Charging Point Stations have many functions, such as, providing and controlling the energy to the Electric Vehicle (EV) using the Electric Vehicle Supply Equipment (EVSE) component, collecting the measurements from the meter for each charge of an Electric Vehicle, identifying and authorizing EV users via user authentication component, enabling remote capabilities (e.g., adjustment of the maximum current allowed) to the Charge Point via the local Controller component over the Wide Area Network (WAN). The protection of the national electric grid should become a priority for all the organization/entities that are getting engaged in the EV ecosystem. The output of this thesis is aiming at increasing the cyber security of a standard EV charging enterprise’s platform through the integration of Machine Learning (ML) techniques for identifying anomalies in the charging patterns, and therefore minimize the exposure both enterprises’ database and the stability of the electric grid. The thesis covers both the Information and Communications Technology (ICT) and the electric engineering domain on an effort towards increasing the cyber security on what is called Energy Internet. In the implementation part of this thesis, we will use dataset in CSV format obtained from a standard EV charging enterprise’s database to apply anomaly based algorithm, in order to discover if any abnormal functions of charging happens. Many different evaluation methods will be applied in order to ensure high quality to the findings of the ML techniques. The applied evaluation methods will contain qualitative (visual inspection, manual investigation) metrics offering a validation framework wide enough to cover different aspects of cyber security in the area of EV smart charging.en_US
dc.description.sponsorshipΕπιβλέπων Καθηγητής: Σαρηγιαννίδης Παναγιώτηςen_US
dc.language.isoenen_US
dc.publisherΚουρτζέλλης Παναγιώτηςen_US
dc.relation.ispartofseriesαριθμός εισαγωγής;4766
dc.subjectelectric vehicles, electric vehicles smart charging, electric vehicle supply equipment, anomaly detection, machine learning, unsupervised algorithms, supervised algorithmsen_US
dc.titleΤεχνικές ανίχνευσης και απόκρισης κυβερνοαπειλών για ηλεκτρικά οχήματα εξωτερικής τροφοδοσίαςen_US
dc.title.alternativeCyber threat Detection and Response Techniques for Plug-in Electrical Vehiclesen_US
dc.typeThesisen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record