Information Security Protection Design of Electric Vehicles Charging Station

Article Preview

Abstract:

Information security is fundamental to ensuring the normal operation of charging station. Based on CAN bus and 3G wireless network, this paper discusses current threats for communication network, builds a protection structure of information security, and proposes an overall information security protection framework. The firewall mainly includes digital signature authentication which combines SHA-1 message digest algorithm and ELGamal public key cipher system. Firewall-IDS (Intrusion Detection System) interactive modules and host information security protection modules is also designed. This paper lays a basic foundation for security construction of charging station’s communication network.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

681-686

Citation:

Online since:

March 2015

Export:

Price:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] M. Wolf, A. Weimerskirch, and C. Paar, Secure In-Vehicle Communication[J]. Embedded Securityin Cars-Securing Current and Future Automotive IT Applications, (2006).

DOI: 10.1007/3-540-28428-1_6

Google Scholar

[2] WU Xin-min. Intrusion Detection System Based on 3G Network Security System[J]. Communication Technology, 2010, 06(43): 98-100.

Google Scholar

[3] Ericsson, G. N. Cyber Security and Power System Communication-Essential Parts of a Smart Grid Infrastructure[J]. Power Delivery, 2010, 25(3): 1501-1507.

DOI: 10.1109/tpwrd.2010.2046654

Google Scholar

[4] WANG Lin. Security Protection and Reinforcement Technology of Regional Scheduling SCADA/EMS[J]. Fujian Electric Power and Electrical Engineering, 2006, 26(3): 35-37.

Google Scholar

[5] YAN Hui, LI Geng-yin, ZHAO Lei, etc. Development of Supervisory Control System for Electric Vehicle Charging Station[J]. Power System Technology, 2009, 33(12): 15-19.

Google Scholar

[6] LEI Wei-jun. Research on Security Mechanism of the 3G and Application Security of the Mobile Terminals[J]. Electronic Design Engineering, 2013, 14(21): 93-95.

Google Scholar

[7] ZHANG Zhen-quan, LUO Xin-min, QIChun. The Comparison ofMD5andSHA-1 Digital Signature Algorithms and their Optimum Realization Using AVR[J]. Network Security Technology & Application, 2005, 07(23): 64-67.

Google Scholar

[8] LIU Hai-peng. The Application and Research on the Interaction between Firewall and IDS in Distribution Automation System[D]. North China Electric Power University, (2012).

Google Scholar

[9] MO Piao. Research on Information Security of Charging Station for Electric Vehicle[D]. North China Electric Power University, (2011).

Google Scholar