Charging stations vulnerable to hacking says Fraunhofer researcher

Charging stations vulnerable to hacking says Fraunhofer researcher

Technology News |
By Nick Flaherty

Electrical vehicle owners generally use a charging card to pay for the electricity they have used for recharging their electric vehicles. These charging cards use an ID number stored on the card which is linked to the user’s bank account for payment. Mathias Dalheimer, at ITMW found that it is easily possible to debit the charging costs to the insecure cards of other users by cloning the charging card.

“It is pretty easy to clone a charging card,” he said. “There are insufficient safeguards for communication between charging stations and the billing back-end. Card numbers are transmitted directly to operators – often without any encryption at all. Simple equipment can be sued to intercept these transmissions and obtain customers’ card numbers.”

It would be difficult to prove unauthorised use, particularly as the charges are often billed weeks after the costs are incurred.

Dalheimer is a member of the Chaos Computer Club (CCC) and he presented the security issue at the club’s annual conference, which led to several operators taking steps to secure their systems. He is looking to set up a consortium of experts that will systematically tackle these types of events.

More information

Related news

Intel denies processors are flawed amid security issues

Maxim renews secure-authentication IC line with its own PUF technology

IoT reference design promises end-to end security, from Avnet Silica

Realtime prevention of JavaScript cyberattacks, by Rohde & Schwarz

If you enjoyed this article, you will like the following ones: don't miss them by subscribing to :    eeNews on Google News


Linked Articles