📊 Diagram: EVerest
Available Online
This model (converted to a data flow diagram) is available to view using the online editor!
Open In Online Editor🔗 Link to Original Paper/Article
Open Example Model in Example Models Bundles
📝 Short Description
The EVerest model is based on an industry-driven open source project for Electric Vehicle charging stations and contains security requirements, documentation, a software architecture, and code. The requirements are manually labeled and include labels for security objectives, security elements, and trace links.
🔤 Abbreviations
- EV: Electric Vehicle
- TPM: Trusted platform module
📖 Extensive Description (if possible)
🏷️ Label description
🗂️ Data Labels:
Status
- Encrypted: Data is encrypted
- Hashed: Data is hashed
- Sensitive: Data contains sensitive information
- Anonymized: Data is fully anonymized
- Signed: Data is signed
- Token: Data is a token
- Certificate: Data is a certificate used for signing
- PaymentInformation: Data is payment information
- Firmware: Data is firmware
🏷️ Node Labels:
Actor
- EndUser: Actions performed by the end user
- Engineer: Actions performed by system engineers
ActorStatus
- Authorized: Actor is authorized to access the component
Component
- API: Actions belonging to the API component
- EVSESecurity: Actions performed by the security component of the system
- PN532TokenProvider: Actions performed by the token provider
- Logs: Actions concerning logging
Location
- ChargingStation: Actions performed on Charging station
- TPM: Actions performed on the trusted platform module
- UpdateServer: Actions performed by the update server
- PaymentProvider: Actions performed by the payment provider
- Car: Actions performed on the car
- ChargingStationManagementSystem: Actions performed by the system responsible for the charging stations
- External: Actions performed by external entities
- LocalStorage: Actions in local storage
