skip to main content
10.1145/3659211.3659221acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdeimConference Proceedingsconference-collections
research-article

Information security assessment method of electric vehicle charging pile based on game theory and combinatorial weighting method of VIKOR method

Published: 29 May 2024 Publication History

Abstract

To quantitatively analyze the information security status of the electric vehicle charging station system and reveal its potential security vulnerabilities and risk points, this study combines game theory and VIKOR methods, and adopts a subjective and objective weighting method to develop a plan and process for evaluating the information security risk of the electric vehicle charging station system. The research first constructs the asset safety value framework and threat level indicator system for the electric vehicle charging pile system. Then, the charging station system is divided into electric vehicle charging stations, operation management platforms, user assets, as well as the communication links and data between them. Through on-site investigations and questionnaires, expert opinions are collected for quantitative processing. The subjective and objective weighting method combining game theory and VIKOR method was used to calculate the asset security value and threat weights. On this basis, the weighted sum and multiplication method is used to calculate the risk values of various assets, effectively identifying the weak links and safety risks of the charging pile system, and proposing corresponding safety prevention measures and suggestions

References

[1]
SUN Zhou, PAN Ming yu, CHEN Zhen, etal. Research and design of automatic penetration testing system for electric vehicle charging piles[J].Electric Power, 2019, 52(1): 57-62, 109.
[2]
ZHAO Lili, LIU Zhong xi, SUN Guo qiang, etal.Cost analysis of the false data injection attack based on nonlinear state estimation[J].Power System Protection and Control, 2019, 47(19) : 38-45.
[3]
HUANG Yuji e, TANG Zuo qi. Information security risk assessment based on improved Bayesian network model[J].Computer and Modernization, 2018(4): 95-99, 126.
[4]
FRIES S, FALK R . Electric vehicle charging infrastructure-security considerations and approaches[C]// INTERNET 2012.Evolving Internet. Venice: IARIA, 2012: 58-64.
[5]
YILMAZ M, KREIN P T. Review of battery charger topologies, charging power levels, and infrastructure for plug-in electric and hybrid vehicles [J]. IEEE Transactions on Power Electronics, 2013, 28(5): 2151-2169.
[6]
FLEISCHHAMMER M, WALDMANN T, BISLE G, Interaction of cyclic ageing at high-rate and low temperatures and safety in lithium-ion batteries[J]. Journal of Power Sources, 2015, 274: 432-439.
[7]
Information Technology-Security Techniques—Information Security Management Systems-Requirements: ISO/IEC27001-2005[S], 2005.
[8]
BROCKWELL PJ, DAVIS RA. Theory and Methods of Time Series[M].Beijing: world publishing corporation, 2015.
[9]
Information Security Technology Information Security Risk Assessment Specification: GB/T209842007[S]. Beijing: Standards Press of China, 2007.
[10]
Information Security Technology Information Security Risk Management Guidelines: GB/Z24364-2009 [S]. Beijing: Standards Press of China, 2009.
[11]
Information Security Technology - Implementation Guidelines for Information Security Risk Assessment: GB/T315092015 [S]. Beijing: Standards Press of China, 2016.
[12]
Information Technology Security Technology Information Security Risk Management: GB/T31722-2015[S].Beijing: Standards Press of China, 2016.
[13]
LIANG Zhiqiang, LIN, Dan sheng. Information security risk assessment mechanism research based on power system [J]. Netinfo Security, 2017(4) : 86-90.
[14]
Yang Xiao ning, Li Xiao e. Analysis of the Practice of Information Security Risk Assessment in Power Supply Enterprises[J].Electric power informatization, 2010, 8(2): 26-30.
[15]
LIU Nian, ZHANG Jianhua, ZHANG Hao.Information asset identification for network-based substation automation systems [J]. Automation of Electric Power Systems, 2009, 33(13): 53-57.
[16]
LIU Liu. SCADA services oriented security evaluation for electric power communication networks[D]. Beijing: North China Electric Power University, 2013.
[17]
QI We i gang, PENG Ning duo, HUANG Hui ping. Defense strategy selection based on static Bayesian game for enhancing the cyber security of the SCADA system[J].Communications Technology, 2017, 50(9): 2037-2044.
[18]
GUO Ying, LV We i peng. Development overview for construction of electric vehicle charging facilities[J] .Science Mosaic, 2013(11) : 60-63.
[19]
WANG Y, HONG Z, LIJ, etal. Challenges and future trends for embedded security in electric vehicular communications[C]//IEEE International Conference on Asic. IEEE, 2016.
[20]
GUO Lei, WANG Kew en, WE NFu shuan, etal. Review and prospect of charging facility planning of electric vehicles[J] .Journal of Electric Power Science and Technology, 2019, 34(3): 56-70
[21]
GUAN Jia yu, JIANGXi ubo, LIU Lijun. Optimal allocation of charging stations considering stochastic charging behavior and low carbon efficiency of electric vehicles [J]. Journal of Electric Power Science and Technology, 2019, 34(4): 93-100.
[22]
WANG Lifang. Classification Evaluation of Urgency of Disaster Point Emergency Material Demand Based on Combination Weighting and Improved TOPSIS Method [J]. Safety and Environmental Engineering, 2017, 24(6):94-100.
[23]
JIANG Fucai, ZHOU Congcong, MA Quandang. Risk Assessment for the Inland River Pilotage Based on the Set Pair Analysis Model Via Integrated Bestow [J]. Journal of Safety and Environment, 2021, 21(3):990-996.
[24]
WEI Jiuchuan, XU Yuyang, XIE Daolei, The risk Assessment of Water Bursting Based on Combination Rule of Distance Function [J]. China Mining Magazine, 2021, 30(4):162-167.

Index Terms

  1. Information security assessment method of electric vehicle charging pile based on game theory and combinatorial weighting method of VIKOR method

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    BDEIM '23: Proceedings of the 2023 4th International Conference on Big Data Economy and Information Management
    December 2023
    917 pages
    ISBN:9798400716669
    DOI:10.1145/3659211
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 May 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    BDEIM 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 16
      Total Downloads
    • Downloads (Last 12 months)16
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media