Integrated Intelligent Energy
Received:
Revised:
Supported by:
Abstract: Under the dual drive of national policies and market demand, the construction of charging infrastructure in China has developed rapidly, with a large number of new charging stations and charging piles expected to be added by 2020. However, the widespread use of charging piles has also brought about network security issues. This paper explores the challenges of charging pile network security from the perspectives of boundary security, communication protocols, and operating system vulnerabilities. It also analyzes vulnerability exploitation techniques such as static symbol execution, code auditing, and fuzz testing. The paper also looks ahead to the future trends of charging pile network security and stresses the importance of complying with national laws, regulations, and standards, and implementing effective network security protection measures.
Key words: Charging piles, Network security, Vulnerability mining, Protection strategy, Security posture
/ Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.hdpower.net/EN/abstract/abstract5184.shtml