Cybersecurity Enhancement in Electric Vehicle Systems using Principal Component Analysis (PCA)

Authors

  • Dr V Seedha Devi Associate Professor, Department of Information Technology, Jaya Engineering College, Anna University, Chennai, Tamil Nadu, India Author
  • Priyadharshini R, Vaishnavi P S, Shalini M UG Student, Department of Information Technology, Jaya Engineering College, Anna University, Chennai, Tamil Nadu, India Author

DOI:

https://doi.org/10.15662/IJRAI.2026.0903007

Keywords:

EVSE, Cybersecurity, Intrusion Detection System, PCA, Dimensionality Reduction, Random Forest, SMOTE, CICEVSE2024, HMAC-SHA256

Abstract

The increasing deployment of Electric Vehicle Supply Equipment (EVSE) introduces significant cybersecurity vulnerabilities in EV charging networks. Traditional Intrusion Detection System (IDS) is computationally intensive and cannot be used in resource-limited EVSE environments. The paper suggests a lightweight, PCA based, cybersecurity framework to detect and monitor real-time cyber-attack in EVSE systems. The dataset is CICEVSE2024 (464,165 samples, 74 features of two real EVSE charging stations) on which four dimensionality reduction strategies are tested: Baseline (74 features), Standard PCA (3 components), Randomized PCA (2 components), and Mini-Batch Sparse PCA (4 components). Three machine learning classifiers, namely, Random Forest, Bagging, and ANN (MLP) are also trained on the reduced features sets. The framework proposed has F1-scores of 87.7-92.1% with AUC-ROC values of 0.943-0.978, and inference time that is 3-5x lower than those of baseline models. Random Forest using standard PCA provides the best accuracy-efficiency trade-off (F1=89.9% inference 0.235 s). An implementation is the Flask-based Security Operations Centre (SOC) dashboard which supports HMAC-SHA256 authenticated multi-station support, automated email/SMS alerting, and GPS location-aware reporting, which is validated as a deployable prototype.

References

1. Alauthman, M., sharari Alkasassbeh, M., Alateef, S., Al-Qerem, A. and Almomani, A., 2025. Automotive and Autonomous Vehicle Cybersecurity. In Complexities and Challenges for Securing Digital Assets and Infrastructure (pp. 353-376). IGI Global Scientific Publishing.

2. Basnet, M. and Ali, M.H., 2023. Deep reinforcement learning-driven mitigation of adverse effects of cyber-attacks on electric vehicle charging station. Energies, 16(21), p.7296.

3. Bishal, K.C., Aryal, K. and Paudel, S., 2025. Ensemble-based Intrusion Detection System for Electric Vehicles Charging Stations using Machine Learning. Journal of Applied Artificial Intelligence, 6(2), pp.1-14.

4. Buedi, E.D., Ghorbani, A.A., Dadkhah, S. and Ferreira, R.L., 2024, July. Enhancing ev charging station security using a multi-dimensional dataset: Cicevse2024. In IFIP Annual Conference on Data and Applications Security and Privacy (pp. 171-190). Cham: Springer Nature Switzerland.

5. Dasari, D.R. and Gottumukkala, H., 2024. An efficient intrusion detection system in iov using improved random forest model. International Journal of Transport Development and Integration, 8(4).

6. Ghiasi, M., Niknam, T., Wang, Z., Mehrandezh, M., Dehghani, M. and Ghadimi, N., 2023. A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future. Electric Power Systems Research, 215, p.108975.

7. Graham, P., 2024. Electric vehicle projections 2024: Update to the 2022 projections report.

8. Hossen, M.S., Sarker, M.T., Al Qwaid, M., Ramasamy, G. and Eng, N., 2025. AI-driven framework for secure and efficient load management in multi-station EV charging networks. World Electric Vehicle Journal, 16(7), p.370.

9. Janwiri, K.A., 2024. EV Charging Station Attack Detection Using Machine Learning.

10. Kumar, A.G. and Dahiya, S., 2025, March. Machine Learning for Advancing Electric Vehicles Security Leveraging CICEVSE2024. In 2025 International Russian Smart Industry Conference (SmartIndustryCon) (pp. 240-245). IEEE.

11. Makhmudov, F., Kilichev, D., Giyosov, U. and Akhmedov, F., 2025. Online machine learning for intrusion detection in electric vehicle charging systems. Mathematics, 13(5), p.712.

12. Miskin, S.V., Chandaragi, P. and Wali, U.V., 2023, December. Intrusion detection system for electric vehicle charging station. In 2023 3rd International Conference on Mobile Networks and Wireless Communications (ICMNWC) (pp. 1-7). IEEE.

13. Pandey, S., 2026. Deep Learning and Machine Learning for Enhanced Anomaly Detection in EVSE systems (Doctoral dissertation, Dublin, National College of Ireland).

14. PAPAIOANNOU, I., ANDREADOU, N., DE, P.A., MOUNTRAKI, A., GEORGAKAKI, A. and PIELA, K., 2025. Clean Energy Technology Observatory: Electricity Grids in the European Union-2025 Status Report on Technology Development, Trends, Value Chains and Markets.

15. Paul, R. and Paul Selvan, M., 2024. A hybrid deep learning-based intrusion detection system for EV and UAV charging stations. Automatika: časopis za automatiku, mjerenje, elektroniku, računarstvo i komunikacije, 65(4), pp.1558-1578.

16. Pawlik, L., Wilk-Jakubowski, J.L., Grabski, P.T. and Wilk-Jakubowski, G., 2025. Securing the Electrified Future: A Systematic Review of Cyber Attacks, Intrusion and Anomaly Detection, and Authentication in Electric Vehicle Charging Infrastructure. Energies, 18(18), p.4847.

17. Poudel, S., Baugh, J.E., Abouyoussef, M., Takiddin, A., Ismail, M. and Refaat, S.S., 2026. Bidirectional GNN-Based Intrusion Detection of Malware Injection Attacks in EV Charging Stations. IEEE Transactions on Intelligent Transportation Systems.

18. Terruggia, R., Maldarella, A., Dondossola, G. and Webber, G., 2025. Enhancing the Detection of Cyber-Attacks to EV Charging Infrastructures Through AI Technologies. Electronics, 14(21), p.4321.

19. Vatin, N.I. and Sundari, R., 2024. Securing electric transportation networks: A machine learning-driven cyber threat detection. In MATEC Web of Conferences (Vol. 392, p. 01184). EDP Sciences.

20. Zhou, X., Wu, Y., Lin, J., Xu, Y. and Woo, S., 2025. A Stacked Machine Learning-Based Intrusion Detection System for Internal and External Networks in Smart Connected Vehicles. Symmetry, 17(6), p.874.

21. Seedha Devi, V., Mahalakshimi, P. V., & Anitha, A. (2026). Automated skin disease analysis and detection using AI-powered mobile application. International Journal of Research and Applied Innovations (IJRAI), 9(3), 531–539. https://doi.org/10.15662/IJRAI.2026.0903004

22. Pandi Prabha, S., & Rengarajan, A. (2025, February). Decentralized Resource Allocation Model Using Multi-agent Reinforcement Learning for Cloud Environment. In International Conference on Universal Threats in Expert Applications and Solutions (pp. 71-82). Singapore: Springer Nature Singapore.

23. Alangaram, S., Udaykiran, M., Rajkumar, K., & Yogeeswaran, T. (2026). Enhancing customer churn prediction and retention for e-commerce. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 9(3), 803–813. https://doi.org/10.15662/IJARCST.2026.0903003

24. Saravanan, M., Sivaganesan, S., & Rajamani, V. Performance analysis of Very Sparse Matrix Converter fed Three Phase cage Induction Drive using Conventional Space Vector Modulation.

25. Socrates, S., Shanmugapriya, M., Murugeshwari, B., & Angalaeswari, S. (2024). Efficient Design for Implantable Device Constant Current Induction Doubly Fed Generating Incorporating Grid Connectivity. In Intelligent Solutions for Sustainable Power Grids (pp. 382-392). IGI Global Scientific Publishing.

26. MATHEW, A. (2025). BEYOND THE BURNER: THE SYSTEMIC RISKS OF DISPOSABLE EMAIL ECOSYSTEMS.

27. Santhoshini, G., & Anbazhagan, K. (2014, February). An object based software tool for software measurement. In International Conference on Information Communication and Embedded Systems (ICICES2014) (pp. 1-5). IEEE.

28. Alangaram, S., Kiswar, M., Ajay, B., & Ezhilkumaran, P. (2026). Socialflow AI: Voice to social media scheduler. International Journal of Research and Applied Innovations (IJRAI), 9(3), 540–547. https://doi.org/10.15662/IJRAI.2026.0903005

29. Rajasekar, M., Nahar, G., Jagatheeswaran, S., Chinthamani, S. A. M., Mohammed, S. H., & Al-Hilali, A. (2024, May). The Roadmap to Classify Malware Using ML Algo Through IOT Based SN. In 2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 127-130). IEEE.

30. Raghul, K., Rajasolan, P., Rohinth, S., & Tharun, P. (2026). AI knowledge sharing web portal. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 9(3), 814–823. https://doi.org/10.15662/IJARCST.2026.0903004

31. Narayanan, L. K., Loganayagi, S., Hemavathi, R., Jayalakshmi, D., & Vimal, V. R. (2024, March). Machine learning-based predictive maintenance for industrial equipment optimization. In 2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies (pp. 1-5). IEEE.

32. Sangeetha, D., Dharan, K. D., Krishna, A. C., & Karthikeyan, C. (2026). Speech and text conversion system for sign language using ML. International Journal of Computer Technology and Electronics Communication (IJCTEC), 9(3), 1000–1007. https://doi.org/10.15680/IJCTECE.2026.0903003

33. Rajasekar, M. (2024). Real-Time Predictive DevOps Intelligence for Risk-Aware Digital Business Processes in Cloud and SAP Ecosystems. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 7(4), 10713-10718.

34. Anbazhagan, K., SUGUMAR, D., Mahendran, M., & Natarajan, R. (2012). An efficient approach for statistical anonymization techniques for privacy preserving data mining. International Journal of Advanced Research in Computer and Communication Engineering, 1(7), 482-485.

35. Chowdary, P. B. K., Udayakumar, R., Jadhav, C., Mohanraj, B., & Vimal, V. R. (2024). An Efficient Intrusion Detection Solution for Cloud Computing Environments Using Integrated Machine Learning Methodologies. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 15(2), 14-26.

36. Seedha Devi, V., Kaavya, S., Deepika, B., Jayashree, D., & Nithikaa, L. (2026). AI-driven voter authentication and fraud detection system. International Journal of Computer Technology and Electronics Communication (IJCTEC), 9(3), 1008–1017. https://doi.org/10.15680/IJCTECE.2026.0903004

37. Mathew, A. (2021). Obfuscation Techniques for Magecart Detection and Prevention. International Journal of Computer Science and Mobile Computing, 10(2), 39-44.

38. Alangaram, S., Yuvaraj, G., Srivatsan, M. J., & Sathish, R. (2026). An IoT-based smart helmet for real-time rider safety monitoring and emergency response system. International Journal of Research in Production Engineering, Technology and Management (IJRPETM), 9(3), 1021–1030. https://doi.org/10.15662/IJRPETM.2026.0903003

39. Kaliappan, S., Ragunthar, T., Ali, M., & Murugeshwari, B. (2024). Implementation of Virtual High Speed Data Transfer in Satellite Communication Systems Using PLC and Cloud Computing. In AI Approaches to Smart and Sustainable Power Systems (pp. 274-286). IGI Global Scientific Publishing.

40. Naresh, D., Anand, P., Harish, M., Vamshi, A., Kethan, A., Nirmala, B., & Saravanan, M. (2026). Face Recognition Door Lock System with IoT &AI. International Journal of Computer Technology and Electronics Communication, 9(2), 526-534.

41. Prabha, S. P., & Rengarajan, A. (2025). ENHANCING CLOUD RESOURCE ALLOCATION WITH VISION TRANSFORMER, DEEP REINFORCEMENT LEARNING, AND IMPROVED SHRIKE OPTIMIZATION ALGORITHM. Corrosion Management ISSN: 1355-5243, 35(2), 233-245.

42. Raghul, K., Thamaraikannan, R., Sunil Kumar, S., & Siva, B. (2026). Plastitrack: A community-driven plastic waste collection and redemption platform. International Journal of Research and Applied Innovations (IJRAI), 9(3), 548–557. https://doi.org/10.15662/IJRAI.2026.0903006

Downloads

Published

2026-05-09

How to Cite

Cybersecurity Enhancement in Electric Vehicle Systems using Principal Component Analysis (PCA). (2026). International Journal of Research and Applied Innovations, 9(3), 558-568. https://doi.org/10.15662/IJRAI.2026.0903007