These management systems offer an array of valuable capabilities like remote monitoring, scheduling, and user billing.
It’s free, every week, in your inbox.
In the second scenario, attackers could get access to the users charging records and personal information.

This means that their data could be used for surveillance, blackmailing, identity theft, and payment fraud.
Both attacks destabilize the grid, which can lead to cascading failure.
They highlight that developers need to also incorporate initial security measures during the manufacturing of the charging stations.

you could find the researchs white paper onResearchGate.
Story byIoanna Lykiardopoulou
Ioanna is a writer at TNW.
With a background in the humanities, she has a soft spot for social impact-enabling technologies.

Also tagged with
