Addressing Weak Authentication like RFID, NFC in EVs and EVCs using AI-powered Adaptive Authentication
By: Onyinye Okoye
Potential Business Impact:
Secures electric cars from hackers using smart AI.
The rapid expansion of the Electric Vehicles (EVs) and Electric Vehicle Charging Systems (EVCs) has introduced new cybersecurity challenges, specifically in authentication protocols that protect vehicles, users, and energy infrastructure. Although widely adopted for convenience, traditional authentication mechanisms like Radio Frequency Identification (RFID) and Near Field Communication (NFC) rely on static identifiers and weak encryption, making them highly vulnerable to attack vectors such as cloning, relay attacks, and signal interception. This study explores an AI-powered adaptive authentication framework designed to overcome these shortcomings by integrating machine learning, anomaly detection, behavioral analytics, and contextual risk assessment. Grounded in the principles of Zero Trust Architecture, the proposed framework emphasizes continuous verification, least privilege access, and secure communication. Through a comprehensive literature review, this research evaluates current vulnerabilities and highlights AI-driven solutions to provide a scalable, resilient, and proactive defense. Ultimately, the research findings conclude that adopting AI-powered adaptive authentication is a strategic imperative for securing the future of electric mobility and strengthening digital trust across the ecosystem. Keywords: weak authentication, RFID, NFC, ML, AI-powered adaptive authentication, relay attacks, cloning, eavesdropping, MITM attacks, Zero Trust Architecture
Similar Papers
Towards Trustworthy Agentic IoEV: AI Agents for Explainable Cyberthreat Mitigation and State Analytics
Cryptography and Security
Makes electric cars safer and charge smarter.
Federated Anomaly Detection and Mitigation for EV Charging Forecasting Under Cyberattacks
Machine Learning (CS)
Protects electric car chargers from hackers.
Secure Control of Connected and Autonomous Electrified Vehicles Under Adversarial Cyber-Attacks
Systems and Control
Keeps self-driving cars safe from hackers.