1. Introduction
The motivation and literature review of the secure control of electric vehicles are summarized as follows. The global transportation system is rapidly changing due to environmental concerns, energy efficiency goals, and new technologies. Electric vehicles (EVs) are leading this transformation by increasingly using smart digital systems to improve their performance and integration with broader infrastructures. Smart digital systems are central to EV development, enabling real-time data acquisition, intelligent control, advanced diagnostics, and easy connection with smart grids and transportation networks.
The Internet of Things (IoT) has transformed EV component monitoring and management. Embedded sensors and controllers enable continuous data collection, which is handled on EVs and in the cloud, leading to predictive maintenance, remote diagnostics, and performance optimization. These capabilities enhance user experience and system reliability [
1]. Artificial Intelligence (ML) and Artificial Intelligence (AI) have been progressively used to optimize energy management, forecast battery condition, and analyze driver behavior, contributing to extended battery life and improved vehicle range [
2].
Vehicle-to-Everything (V2X) communication represents another crucial advancement, enabling real-time information sharing among EVs, infrastructure, and the power grid. This allows for adaptive routing, traffic coordination, and demand-side energy management, ultimately improving operational efficiency and grid stability [
3]. Additionally, digital twin technology is increasingly significant, providing real-time simulation and virtual prototyping for predictive performance analysis and fault detection without physical testing [
4].
The expanding use of networked control systems (NCSs) to connect EV components (sensors, actuators, controllers) presents new reliability and security challenges. NCSs are preferred for their lower costs, flexibility, simplicity of installation, and dependability. However, they are exposed to cyber threats due to the open nature of communication channels. Wireless networks used in NCSs, while enabling remote control and feedback as illustrated in
Figure 1, are particularly susceptible to cyberattacks such as False Data Injection (FDI) and Denial-of-Service (DoS) attacks. These threats can degrade system performance or cause instability by disrupting control signals [
5].
DoS attacks are sophisticated cyber-physical threats that disrupt sensors and actuator data in embedded systems by injecting malicious signals into control loops. EV system functionality depends heavily on reliable sensor data and real-time communication between Electronic Control Units (ECUs). As a result of using protocol vulnerabilities or injecting harmful inputs, DoS attacks can impair critical EV functions such as torque control, regenerative braking, and motor speed regulation [
6,
7].
EV drive systems depend on a well-matched relationship between inverter operations and motor control.
Figure 2 demonstrates an effective DoS attack can result in instability, energy inefficiency, or hardware failure. The nature of these attacks makes them difficult to detect, often bypassing conventional software-based security methods. With the beginning of V2X communication and cloud integration, the EV attack surface has expanded significantly. Therefore, understanding and mitigating DoS attacks is essential for ensuring secure motor control and protecting power electronic components [
8]. Therefore, researchers are developing advanced intrusion detection systems (IDS) and secure control frameworks to detect anomalies and enhance system resilience. These approaches are essential in enhancing EV systems against false signals and maintaining operational integrity [
9,
10].
Several recent studies have explored fault-tolerant and resilient control frameworks to mitigate DoS effects; however, most rely on assumptions of known disturbance profiles or constant attack patterns. Conventional controllers, such as PID or model predictive control, often lack of stability under unpredictable, stochastic cyber disturbances and are vulnerable to delayed or lost feedback [
11].
The digitalization of EVs creates numerous cybersecurity risks, as EVs increasingly depend on complex networks of sensors, controllers, and communication modules. Components such as Battery Management Systems (BMS), V2X modules, and cloud interfaces are at risk of unauthorized access and DoS attacks. These threats can compromise safety-critical systems, including braking, steering, and energy management, posing risks to passengers and the public [
12].
Note that compromised EVs can act as entry points for broader cyberattacks targeting smart grids, charging infrastructure, and transportation networks. The increase in Vehicle-to-Grid (V2G) technology further intensifies these risks, potentially disrupting the grid or exposing sensitive user data. Therefore, implementing robust cybersecurity architectures, real-time intrusion detection systems, and secure communication protocols is essential to mitigate these vulnerabilities [
13].
Cybersecurity is vital for protecting individual EVs and for enabling their integration into smart transport and energy systems. Active research and the implementation of standardized security measures is essential in maintaining system integrity, user trust, and public safety.
The EV drive system consists of electric motors, power electronic converters, energy storage units, and control subsystems, operating to deliver reliable propulsion and optimized energy consumption. Among the several motor technologies, Induction Motors (IMs) and Brushless DC (BLDC) motors are the most widely used due to their robust performance characteristics. IMs are robust and cheap in high-power applications, while BLDC motors offer higher efficiency, compact form, and better torque control, making them suitable for light-duty EVs and two-wheelers [
14].
Using new materials like silicon carbide (SiC) and gallium nitride (GaN) in the power converters of EVs has enhanced inverter performance by enabling higher switching frequencies, reduced thermal losses, and improved power density. These advancements contribute directly to increased driving range and system efficiency [
15,
16].
The accurate functioning of EVs depends on the communication protocols that coordinate interactions among sensors, controllers, actuators, and external infrastructure. In-vehicle communication protocols, such as Controller Area Network (CAN), Local Interconnect Network (LIN), and FlexRay, enable deterministic, real-time data exchange critical for motor control, regenerative breaking, and battery management [
17]. Meanwhile, V2X technologies, including V2G, Vehicle-to-Infrastructure (V2I), and Vehicle-to-Vehicle (V2V) communication, are being increasingly implemented to support advanced functions such as traffic optimization, energy coordination, and safety assurance in connected EV ecosystems [
18]. The collaboration between advanced motor technologies and intelligent communication protocols forms the backbone of modern, energy-optimized, and connected EV platforms.
EVs are becoming more connected and using more software, which means they are more at risk of cyberattacks. One of the most critical attacks is the DoS attack, which targets the communication network inside the EV, like the CAN bus. Although many safety-critical functions are logically separated from infotainment or non-critical systems, they are often connected via shared communication backbones such as CAN, FlexRay, or Ethernet. These protocols, particularly CAN, lack inherent encryption and authentication mechanisms, which make them vulnerable to message injections, spoofing, or flooding. A well-timed DoS attack targeting the CAN bus can delay or block transmission of control signals, indirectly affecting critical functions such as motor torque control, regenerative braking, or inverter operation. By overwhelming or stopping communication pathways, a DoS attack can harm essential vehicle operations, such as powertrain control, battery management, and braking. This can make the EV perform badly or lead to dangerous situations [
19].
Besides DoS attacks, there are other serious threats like Man-in-the-Middle (MitM) attacks, where someone secretly listens in, and attacks where fake messages are sent (spoofing) or old messages are used again to cause trouble (replay attacks), particularly within V2X communication channels. These types of attacks can compromise authentication, disrupt vehicle-to-infrastructure coordination, and impair traffic safety [
20]. Additionally, telematics systems, On-Board Diagnostics (OBD-II) ports, and over-the-air (OTA) update mechanisms can be developed by malicious actors to inject unauthorized code or disable critical services.
Research has proposed various anomaly detection and encryption-based techniques to secure in-vehicle networks; however, these often act after an attack has occurred rather than preemptively enhancing system-level resilience. Control approaches that do not explicitly model input uncertainties due to DoS attacks cannot ensure stability during transient disconnections or erratic packet loss.
Since EVs are turning into software-based systems, the need for comprehensive cybersecurity frameworks becomes necessary. This means having different kinds of security levels, such as encrypted communications, intrusion detection systems, secure firmware updates, and continuous system monitoring to maintain vehicle reliability and user trust [
21].
Some weaknesses have been found in different parts of EVs, which, if used, can compromise vehicle functionality and user safety. The main one is the in-vehicle CAN bus network, which lacks inherent support for encryption or authentication. Attackers can inject large volumes of high-priority but invalid messages to monopolize the CAN bus, preventing legitimate control messages from reaching the motor controller. This form of DoS attack has been validated in testbeds and commercial EV models and can result in unexpected motor behavior, such as failure to accelerate, irregular torque delivery, or controller shutdown due to safety triggers. Even when drive control ECUs are technically isolated, the use of shared network gateways or insufficient access control in diagnostic tools creates indirect pathways for compromise. These vulnerabilities become especially critical as more EVs integrate V2X communication, which opens attack surfaces beyond the physical vehicle. This limitation allows attackers to inject malicious messages or manipulate control signals, potentially affecting critical functions like acceleration or braking [
19].
Public EV charging stations are not always secure either. Stations that operate with outdated firmware or unsecured communication protocols are subject to manipulation, enabling energy theft, billing fraud, or service denial [
22,
23]. For example, the Open Charge Point Protocol (OCPP), widely used in EV charging, has been shown to transmit unencrypted messages, exposing it to interception or replay attacks [
24].
Another area of concern is the V2G interface. Without robust security measures, attackers may send unauthorized control commands to the grid or extract sensitive user data. Furthermore, OTA update systems designed to streamline software maintenance can serve as attack vectors if not safeguarded by strong encryption and authentication mechanisms. These security gaps highlight the urgent need for industry-standardized cybersecurity solutions. Implementing secure communication protocols, real-time intrusion detection, and resilient system architectures is essential to protect the integrity and safety of EV systems against evolving cyber threats.
The
paper structure is as follows:
Section 2 provides essential context through a Background and Literature Review. It covers the basics of EV drive systems and their communication, common cyber threats to modern EVs, and an analysis of known vulnerabilities.
Section 3 then defines the problem, introducing models for Vector-Control Induction Motors and DoS attacks.
Section 4 details the methodology, focusing on linearizing the IM model and the design of the ellipsoid tracker and
Hꚙ controller.
Section 5 presents the results from various test scenarios. The Discussion section addresses the challenges in securing EV drive systems against cyber threats and suggests future research and technological advancements. Finally, the paper concludes with a summary of its key findings.
This research addresses the critical challenge of ensuring the dependable and secure operation of EV vector-controlled induction motor drive systems when subjected to parametric uncertainty and DoS attacks. The DoS attack is formulated as an external disturbance, necessitating effective attenuation of its impact. The primary control objective is to steer the system’s state towards and maintain it within an invariant set, specifically an ellipsoid centered at the origin. Minimizing the volume of this invariant ellipsoid serves as a guarantee of system stability and a means of mitigating the effects of external disturbances. Given the limitations of existing methods, this paper introduces an ellipsoidal-set-based robust control strategy that actively constrains system behavior within a bounded invariant set, offering preemptive security and stability guarantees even under stochastic cyber disruptions and physical uncertainty.
The key contributions of this paper are as follows:
The use of the ellipsoidal-set technique to improve the system’s robustness against inherent uncertainties and offer security against DoS cyberattacks.
The creation of a robust and secure invariant-set control approach based on the state-input and disturbance matrices’ quadratic boundedness of uncertainty.
Unlike prior use of ellipsoidal methods in autonomous navigation, our contribution applies to the robust and secure control of EV induction motor drives under cyberattacks, a novel and distinct use case.
4. Simulation Verification
The nonlinear nature of the induction motor model, as described by Equation (5), demands linearization at a specific operating point. This linearization process was performed using the MATLAB command jacobian (version 2023b). Subsequently, the system’s
A-matrix in Equation (3) is derived under two distinct operating scenarios: (i) a light-load condition, assuming no variation in the rotor resistance (R
r = 100% of its nominal value), yielding the state matrix denoted as A1; and (ii) a heavy -load condition, incorporating a parameter variation in the rotor resistance (R
r = 150% of its nominal value), corresponds to A2. Substituting in (2), the resulting linearized continuous-time state matrices are
The corresponding discrete-time matrices, with sampling time Ts = 0.002 s, are calculated. The average matrix (between the extremities, light and heavy loads) for the discrete-time system is
The uncertainty in matrix A can be modelled in the norm-bounded form as follows.
is obtained using the singular value decomposition as [
25]
Solving Theorem 2, the proposed control is
The performance analysis of the EV induction motor drive is conducted using the MATLAB 2023b software package. A block diagram representation of the developed controller is illustrated in
Figure 2. The system model incorporating the proposed controller was evaluated under typical operating conditions, encompassing step variations in the load torque and the presence of a DoS attack. The vector-controlled induction motor drive system, integrated with the proposed tracking mechanism, was assessed across two different scenarios: one without and one with the DoS attack. These scenarios involved deterministic load torque disturbances and parameter variations, specifically rotor resistance variation. Within each scenario, a three-stage DoS attack was simulated using a Bernoulli stochastic variable with a probability of 0.8. The temporal characteristics of the DoS attacks are listed in
Table 3. The efficacy of the proposed tracking controller was benchmarked against that of
Hꚙ controllers in each scenario to ascertain its relative performance.
To capture the dynamic effects of DoS attacks, three distinct temporal instances were selected: during a torque step-up (t = 5 s), at steady-state operation (t = 20 s), and during a torque step-down (t = 32 s). The Bernoulli model used a probability of 0.8, representing frequent control packet loss. These scenarios simulate realistic cyberattack patterns and their interaction with transient and steady-state dynamics in the EV drive system.
4.1. Scenario 1: Deterministic Load Torque Disturbance
To validate the sufficiency of the proposed control approach under DoS attack conditions and realistic vehicle assumptions, extensive simulations are carried out with varying load disturbances and stochastic DoS profiles, mimicking real EV operational scenarios.
4.1.1. Case 1: Without DoS Attack
A step up-and-down load torque disturbance is examined with random occurrence at 5 and 30 s,
Figure 4a. The deviation of induction motor speed response without attack under load torque disturbances is depicted in
Figure 4b. The proposed tracker and
Hꚙ controller with the up-and-down load torque step changes demonstrate the superiority of the suggested method over the
Hꚙ controller in terms of percentage overshoot, settling time, rise time, and steady-state error.
4.1.2. Case 2: With DoS Attack
The system’s response to a step-up-and-down load torque disturbance is investigated under the influence of DoS attacks as depicted in
Figure 5a and
Figure 6a. The DoS attacks profile is illustrated in
Figure 5b and
Figure 6b. The transient response of the EV induction motor speed with the proposed tracker and under these combined load torque disturbances and DoS attacks is presented in
Figure 5c.
Figure 6c shows the performance of the
Hꚙ controller under simultaneous DoS attacks and step changes in load torque, revealing its limited ability to effectively manage these concurrent disturbances.
Figure 7 provides a detailed examination of the controller’s behavior under varying attack timings and load torque disturbances, highlighting the slow response and significant overshoots exhibited by the
Hꚙ controller. Conversely, the proposed tracking controller demonstrates superior disturbance rejection capabilities compared to the
Hꚙ controller in the presence of these disturbances.
4.2. Scenario 2: Robustness Against Parameter Variation (Rotor Resistance Variations)
To further establish robustness, the controller is tested under varying rotor resistance values representing parameter drift, combined with DoS-induced input dropout. This joint disturbance scenario reflects realistic stress conditions experienced by EV motor drives.
4.2.1. Case 1: Without DoS Attack
This case presents a comparative analysis of the proposed tracker and the
Hꚙ controller. The robustness of the suggested tracker is evaluated on the EV induction motor drive system under parametric uncertainty, specifically ±50% variations in rotor resistance (
Rr).
Figure 8a illustrates the multi-step changes in the load. The speed error responses of the EV vector-controlled induction motor drive system, employing both the proposed tracker and the
Hꚙ controller, are shown in
Figure 8b for a 50%
Rr. Similarly,
Figure 8c,d depict the speed error responses of the induction motor drive system utilizing the proposed tracker and the
Hꚙ controller at 100%
Rr and 150%
Rr, respectively. The proposed tracker demonstrates rapid and robust responses across the tested rotor resistance variations (50%, 100%, and 150%) and during the step changes in the load torque.
4.2.2. Case 2: Under DoS Attack
This case undertakes a comparative analysis of the proposed tracking controller against an
Hꚙ controller. The robustness of the proposed tracker is rigorously evaluated within the context of an EV induction motor drive system operating under conditions of parametric uncertainty, specifically considering ±50% variations in
Rr, and subjected to a Denial-of-Service (DoS) attack and multi-step change in load torque. The temporal profiles of the multi-step load variations and the instances of the DoS attack are presented in
Figure 9a,b,
Figure 10a,b, and
Figure 11a,b. The dynamic response of the EV induction motor drive’s speed error under a +50%
Rr perturbation is illustrated in
Figure 9c–h.
Figure 9c,d,h delineates the performance of the proposed controller during three discrete DoS attack intervals, while
Figure 9f–h depicts the corresponding response of the
Hꚙ controller under identical DoS attack scenarios. Analogous speed error responses for rotor resistance variations of 100%
Rr and 150%
Rr are provided in
Figure 10c–e and
Figure 10f–h, and
Figure 11c–e and
Figure 11f–h, respectively. The proposed tracking demonstrates rapid and robust performance when subjected concurrently to variations of 50% and 100%
Rr, multi-step load changes, and a DoS attack. Moreover, the proposed tracker demonstrates comparatively superior performance to the
Hꚙ controller under simultaneous variations in the three rotor resistance parameters and the application of a DoS attack when these disturbances are simultaneously applied.
It was observed that the impact of DoS attacks varied significantly with their timing and the operating condition of the system. Attacks occurring during torque transients caused more pronounced speed deviations and overshoots compared to those at steady state. Additionally, system degradation was more severe under high rotor resistance variations, revealing a compounded vulnerability when cyber and physical disturbances co-occur. These results emphasize the necessity for integrated robust control that anticipates both the intensity and timing of cyberattacks.