SAE J 2931 7-2017 Security for Plug-In Electric Vehicle Communications.pdf
《SAE J 2931 7-2017 Security for Plug-In Electric Vehicle Communications.pdf》由会员分享,可在线阅读,更多相关《SAE J 2931 7-2017 Security for Plug-In Electric Vehicle Communications.pdf(65页珍藏版)》请在麦多课文档分享上搜索。
1、_ SAE Technical Standards Board Rules provide that: “This report is published by SAE to advance the state of technical and engineering sciences. The use of this report is entirely voluntary, and its applicability and suitability for any particular use, including any patent infringement arising there
2、from, is the sole responsibility of the user.” SAE reviews each technical report at least every five years at which time it may be revised, reaffirmed, stabilized, or cancelled. SAE invites your written comments and suggestions. Copyright 2017 SAE International All rights reserved. No part of this p
3、ublication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of SAE. TO PLACE A DOCUMENT ORDER: Tel: 877-606-7323 (inside USA and Canada) Tel: +1 724-776-497
4、0 (outside USA) Fax: 724-776-0790 Email: CustomerServicesae.org SAE WEB ADDRESS: http:/www.sae.org SAE values your input. To provide feedback on this Technical Report, please visit http:/standards.sae.org/J2931/7_201710 SURFACE VEHICLE INFORMATION REPORT J2931/7 OCT2017 Issued 2017-10 Security for P
5、lug-In Electric Vehicle Communications RATIONALE With the Smart Grids transformation of the electric system to a two-way flow of electricity and information, the information technology (IT) and telecommunications infrastructures have become critical to the energy sector infrastructure. Therefore, th
6、e management and protection of systems and components of these infrastructures must also be addressed by an increasingly diverse energy sector. To achieve this requires that security be designed in at the architectural level of the PEV, EVSE and other aspects of this SAE document. SAE INTERNATIONAL
7、J2931/7 OCT2017 Page 2 of 65 TABLE OF CONTENTS 1. SCOPE 6 1.1 Purpose . 6 2. APPLICABLE DOCUMENTS 6 2.1 SAE Publications . 6 2.2 ISO-IEC Publications 7 2.3 NIST Publications 7 2.4 Other Publications . 7 3. DEFINITIONS . 8 4. LOGICAL ARCHITECTURE AND INTERFACES OF THE PLUG-IN ELECTRIC VEHICLE . 10 4.
8、1 Logical Architecture Overview 10 4.2 Logical Interface Scenario 11 5. REQUIREMENTS . 16 5.1 General Considerations and Assumptions 16 5.2 Basic Requirements 17 5.3 Vehicle Owner Specific Requirements 20 5.3.1 Authentication . 20 5.3.2 Authorization . 20 5.3.3 Non-Repudiation . 20 5.3.4 Accountabil
9、ity 20 5.3.5 Data Integrity . 20 5.3.6 Confidentiality 20 5.3.7 Privacy. 20 5.3.8 Availability . 20 5.3.9 Smart Applications 21 5.3.10 Wireless Communications. 21 5.4 Vehicle Operator Specific Requirements 21 5.4.1 Authentication . 21 5.4.2 Authorization . 21 5.4.3 Non-Repudiation . 21 5.4.4 Account
10、ability 21 5.4.5 Data Integrity . 21 5.4.6 Confidentiality 21 5.4.7 Privacy. 21 5.4.8 Availability . 22 5.5 Vehicle Maintenance Personnel Specific Requirements 22 5.5.1 Authentication . 22 5.5.2 Authorization . 22 5.5.3 Non-Repudiation . 22 5.5.4 Accountability 22 5.5.5 Data Integrity . 22 5.5.6 Con
11、fidentiality 22 5.5.7 Privacy. 22 5.5.8 Availability . 23 5.6 Vehicle Passenger Specific Requirements . 23 5.6.1 Authentication . 23 5.6.2 Authorization . 23 5.6.3 Non-Repudiation . 23 5.6.4 Accountability 23 5.6.5 Data Integrity . 23 5.6.6 Confidentiality 23 5.6.7 Privacy. 23 5.6.8 Availability . 2
12、3 5.6.9 Locks and Controls . 23 5.6.10 Smart Applications 23 SAE INTERNATIONAL J2931/7 OCT2017 Page 3 of 65 5.7 Utility Specific Requirements 24 5.7.1 Authentication . 24 5.7.2 Authorization . 24 5.7.3 Non-Repudiation . 24 5.7.4 Accountability 24 5.7.5 Data Integrity . 24 5.7.6 Confidentiality 24 5.
13、7.7 Privacy. 24 5.7.8 Availability . 25 5.8 Energy Services Interface Specific Requirements 25 5.8.1 Authentication . 25 5.8.2 Authorization . 25 5.8.3 Non-Repudiation . 25 5.8.4 Accountability 25 5.8.5 Data Integrity . 25 5.8.6 Confidentiality 25 5.8.7 Privacy. 25 5.8.8 Availability . 26 5.9 Energy
14、 Management System Specific Requirements 26 5.9.1 Authentication . 26 5.9.2 Authorization . 26 5.9.3 Non-Repudiation . 26 5.9.4 Accountability 26 5.9.5 Data Integrity . 26 5.9.6 Confidentiality 26 5.9.7 Privacy. 26 5.9.8 Availability . 26 5.9.9 Firmware Updates . 27 5.10 Electric Vehicle Supply Equi
15、pment Specific Requirements 27 5.10.1 Authentication . 27 5.10.2 Authorization . 27 5.10.3 Non-Repudiation . 27 5.10.4 Accountability 27 5.10.5 Data Integrity . 27 5.10.6 Confidentiality 27 5.10.7 Privacy. 27 5.10.8 Availability . 27 5.10.9 Tamper Resistance . 28 5.11 End User Measurement Device Spe
16、cific Requirements . 28 5.11.1 Authentication . 29 5.11.2 Authorization . 29 5.11.3 Non-Repudiation . 29 5.11.4 Accountability 29 5.11.5 Data Integrity . 30 5.11.6 Confidentiality 30 5.11.7 Privacy. 30 5.11.8 Availability . 30 5.11.9 Tamper Resistance . 30 5.12 Vehicle Manufacturer Specific Requirem
17、ents . 30 5.12.1 Authentication . 30 5.12.2 Authorization . 30 5.12.3 Non-Repudiation . 30 5.12.4 Accountability 30 5.12.5 Data Integrity . 30 5.12.6 Confidentiality 30 5.12.7 Privacy. 30 5.12.8 Availability . 30 5.12.9 Supply Chain Security . 30 5.13 Public Key Infrastructure (PKI) Requirements 31
18、5.13.1 Certificates 31 SAE INTERNATIONAL J2931/7 OCT2017 Page 4 of 65 5.13.2 Private Keys 31 5.13.3 Root Certificate Authority (Root CA) . 31 5.13.4 Certificate Revocation . 31 5.13.5 Transport Layer Security (TLS) Protocol 31 5.13.6 Cipher Suites . 31 6. USE CASES 31 6.1 Use Cases Based on Charging
19、 Locations 31 6.2 Use Cases Based on Payments . 39 6.2.1 Anonymous Payment 39 6.2.2 Non-Anonymous Payment at EVSE . 40 6.2.3 Non-Anonymous Payment with Secondary Actor . 41 6.3 Use Cases Based on the Interaction between EVSE and the Customer Energy Management System (CEMS) 41 6.3.1 Facility Manageme
20、nt Dashboard 42 6.3.2 Tenant Notification 42 6.3.3 Equipment Maintenance Operation 43 6.3.4 Load Balancing . 43 6.3.5 Demand Response . 44 6.3.6 Best Price Charging 46 6.3.7 Charge Time Management . 46 6.3.8 Access Control 47 6.3.9 Manage Access Privileges 48 6.3.10 Fleet Management 49 6.3.11 Advanc
21、ed Diagnostics. 49 6.3.12 Vehicle to Building Storage and Regulation . 50 6.4 Use Case Based on the Location of the End Use Measurement Device (EUMD) . 51 6.5 Use Case Based on Wireless Charging 53 6.5.1 Wireless Charger Discovery . 53 6.5.2 Vehicle Alignment . 54 6.6 Other Use Cases . 55 6.6.1 Hack
22、ing of Electric Vehicle Firmware . 55 6.6.2 Hacking of Utility Backend Database Storing User Information 55 6.6.3 Hacking of Protocol Translation Module . 56 6.6.4 Hacking Wireless Communications 57 6.6.5 Hacking the EVSE Network 57 6.6.6 Hacking into the Firmware Responsible for DC Charging Protoco
23、l 58 7. NETWORK SECURITY . 58 7.1 Inadequate Integrity Checking 58 7.2 Inadequate Network Segregation . 59 7.3 Inappropriate Protocol Selection . 60 7.4 Insufficient Redundancy 60 7.5 Physical Access to the Device 60 8. SOFTWARE VULNERABILITIES . 61 8.1 Code Quality Vulnerability (CWE-398) 61 8.2 Au
24、thentication Vulnerability (CWE-287) 61 8.3 Authorization Vulnerability (CWE-284) . 61 8.4 Cryptographic Vulnerability (CWE-310) 62 8.5 Input and Output Validation (CWE-20 and CWE-116) 62 8.6 Logging and Auditing Vulnerability (CWE-778 and CWe-779) . 62 8.7 Sensitive Data Protection Vulnerability (C
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- SAEJ293172017SECURITYFORPLUGINELECTRICVEHICLECOMMUNICATIONSPDF

链接地址:http://www.mydoc123.com/p-1027707.html