
Fraunhofer ITWM expert finds security vulnerabilities in electric charging stations
Electrical vehicle owners generally use a charging card to pay for the electricity they have used for recharging their electric vehicles. These charging cards use an ID number stored on the card which is linked to the user’s bank account for payment. Dalheimer found that it is easily possible to debit the charging costs to the insecure cards of other users by cloning the charging card.
Mathias Dalheimer explains: “It is pretty easy to clone a charging card. There are insufficient safeguards for communication between charging stations and the billing back-end. Card numbers are transmitted directly to operators – often without any encryption at all. Simple equipment can be sued to intercept these transmissions and obtain customers’ card numbers.”
It would be difficult to prove unauthorised use, particularly as the charges are often billed weeks after the costs are incurred.
Mathias Dalheimer is a member of the Chaos Computer Club (CCC) and he presented the security issue at the club’s annual conference, which led to several operators taking steps to secure their systems. He is looking to set up a consortium of experts that will systematically tackle these types of events.
More information
https://www.fraunhofer.de/en.html
Related news
Intel denies processors are flawed amid security issues
Maxim renews secure-authentication IC line with its own PUF technology
IoT reference design promises end-to end security, from Avnet Silica
Realtime prevention of JavaScript cyberattacks, by Rohde & Schwarz
