Integrated Intelligent Energy ›› 2025, Vol. 47 ›› Issue (11): 96-105.doi: 10.3969/j.issn.2097-0706.2025.11.009

• Power Data Security • Previous Articles    

Research on cybersecurity challenges and protection of charging piles in digital and intelligent power grids

LI Zhuoqun1(), JIN Yuan1(), PENG Fengwei2(), ZHANG Xiangyu2(), DAI Hanqi1(), ZHANG Xian1(), YUAN Xiaoxi1, GONG Gangjun2,*()   

  1. 1. Electric Power Science Research Institute of State Grid Beijing Electric Power Company,Beijing 100075,China
    2. Beijing Engineering Research Center of Energy and Electric Power Information Security,North China Electric Power University,Beijing 102206,China
  • Received:2025-02-18 Revised:2025-04-15 Published:2025-04-28
  • Contact: GONG Gangjun E-mail:lizhuoqun0809@126.com;18600105056@163.com;2567745437@qq.com;zz15805236101@163.com;daihanqi@bj.sgcc.com.cn;zhangxian@bj.sgcc.com.cn;gong@ncepu.edu.cn
  • Supported by:
    Science and Technology Project of State Grid Beijing Electric Power Company(52022323000X)

Abstract:

With the deep integration of energy internet and new-generation information technologies, digital and intelligent power grids have become a core direction for the transformation and upgrading of power systems. Driven by both national policies and market demands, the construction of charging infrastructure in China is developing rapidly, with significant increases in charging and battery swapping stations, as well as charging piles, projected by 2025. However, the extensive application of charging piles in digital and intelligent power grids brings cybersecurity issues. The cybersecurity challenges of charging piles are discussed from the aspects of boundary security, communication protocols, and operating system vulnerabilities. Furthermore, the effects of vulnerability mining methods such as static symbolic execution, code auditing, and fuzz testing on the cybersecurity of charging piles are analyzed. Future trends of charging pile cybersecurity in digital and intelligent power grids are forecasted. Additionally, the importance of complying with national laws, regulations, and standards and implementing effective measures for cybersecurity protection is emphasized.

Key words: charging pile, cybersecurity, vulnerability mining, protection strategy, security posture, boundary security, communication protocol, digital and intelligent power grids, energy internet

CLC Number: