Share This Article:

Replay Attack and Defense of Electric Vehicle Charging on GB/T 27930-2015 Communication Protocol

Full-Text HTML XML Download Download as PDF (Size:585KB) PP. 20-30
DOI: 10.4236/jcc.2019.712003    55 Downloads   121 Views


The GB/T 27930-2015 protocol is the communication protocol between the non-vehicle-mounted charger and the battery management system (BMS) stipulated by the state. However, as the protocol adopts the way of broadcast communication and plaintext to transmit data, the data frame does not contain the source address and the destination address, making the Electric Vehicle (EV) vulnerable to replay attack in the charging process. In order to verify the security problems of the protocol, this paper uses 27,655 message data in the complete charging process provided by Shanghai Thaisen electric company, and analyzes these actual data frames one by one with the program written by C++. In order to enhance the security of the protocol, Rivest-Shamir-Adleman (RSA) digital signature and adding random numbers are proposed to resist replay attack. Under the experimental environment of Eclipse, the normal charging of electric vehicles, RSA digital signature and random number defense are simulated. Experimental results show that RSA digital signature cannot resist replay attack, and adding random numbers can effectively enhance the ability of EV to resist replay attack during charging.

Cite this paper

Li, Y. , Wang, Y. , Wu, M. and Li, H. (2019) Replay Attack and Defense of Electric Vehicle Charging on GB/T 27930-2015 Communication Protocol. Journal of Computer and Communications, 7, 20-30. doi: 10.4236/jcc.2019.712003.

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.