ISO 15118 Manual - V2G Clarity

ISO 15118 Manual

For your "Aha" moments. Sound, comprehensive, and clear.

ISO 15118 Manual cover

 

The ISO 15118 Manual is for beginner and experts alike, being in-depth and comprehensible at the same time. 

You will be guided through all the steps that are necessary to carry out a complete charging session between an electric vehicle and a charging station, focussing on the convenient Plug & Charge feature.

Document structure ISO 15118

 

Learn about the ISO 15118 document family as well as IEC 62196 and IEC 61851 (including PWM signaling) on which ISO 15118 relies for the complete charging process to be carried out.

Get an overview of a typical ISO 15118 charging procedure for AC and DC charging with regards to the necessary messages to be exchanged. Delve right into the use cases related to these charging procedures.

Digital signature explained

 

Fully understand the mechanisms applied on transport layer and on application layer to secure the communication between EV and charging station with regards to confidentiality, integrity and authenticity: Elliptic curve cryptography, ECDH key agreement, ECDSA signatures, X.509 certificates, Public-Key-Infrastructures (PKI), TLS handshake, OCSP, ...

Detailed examples of creating and verifying XML-based digital signatures on the basis of an AuthorizationRequest and CertificateInstallationResponse message.

PKI structure ISO 15118

 

Public-Key-Infrastructures (PKIs) are a system for the creation, storage, distribution and revocation of digital certificates. You will learn about the motivations behind creating the ISO 15118 specific PKI structure, the different types of certificates to be applied as well as the non-functional PKI requirements coming with it.

AC message sequence til CertificateUpdate

 

The convenience feature Plug&Charge which enables an extremely user-friendly charging experience is based on the authentication and authorization through a digital contract certificate. This contract certificate as well as the corresponding private key need to be installed into the EV by means of a provisioning process.

You will be guided through the complete certificate installation process - one of the most challenging parts of ISO 15118 - step by step.

AuthorizationRequest signature

 

After the provisioning process has been completed, the EV is able to authenticate and authorize itself by using the newly installed contract certificate - without any further interaction needed by the user.

I will show you how this procedure is carried out, how replay attacks are avoided and what messages are exchanged during this communication phase.

PMaxSchedule, SalesTariff and ChargingSchedule

 

The EV and the charging station exchange some charging parameters and technical restrictions for the charging process before the charging loop can be entered.

You will also learn about the concept of renegotiating a charging schedule and influencing the charging process through so-called PMaxSchedules and SalesTariffs, information which can reflect the current grid situation.

DC charging session example

 

This masterclass on ISO 15118 finishes with an extensive chapter that will run you through a complete exemplary DC charging session.

This includes code listings of real request and response messages exchanged between an EV, a charging station and an IT backend which operates the charging station using the Open Charge Point Protocol (OCPP) - currently a world-wide commonly used communication protocol between charging stations and managing IT backend systems.

 

2018

Finally, we will take a look into the future and see what will change with edition 2 of ISO 15118 and what new features will be introduced, such as wireless charging and communication or bi-directional power transfer.

As you see, the book covers a lot of ground, providing you with all the information you need to master the Vehicle-2-Grid communication technology.

Ready to get into it?

The ebook is the perfect basis. But in order to become a real V2G Master,
you need to fully understand Plug & Charge.

  CHECK OUT THE VIDEO TUTORIAL

Free Extract

Convince yourself before you buy

ISO 15118 Manual preview

Go ahead and get a peek into each of my chapters.

You get lifetime updates for FREE - be it errors corrected, or new sections added. You for sure don't want to miss out on that unique offer.

Convince yourself that this is the quality and in-depth information you need to leverage your business and market positioning with regards to this future-proof charging technology.

Just subscribe to my newsletter, and you will receive valuable content on ISO 15118 as well as related topics and get access to my free extract.

SUBSCRIBE

Errata and Updates

Your feedback is highly appreciated and needed to keep this manual at its position as THE standard reference on ISO 15118.

If you spot an error somewhere in the ebook or do not understand a passage, please let me know.

The first version has been published in February 2017.

As paragraphs might be rewritten or sections added upon updating the ISO 15118 Manual, the respective page or section which the first column refers to might have changed in the new version. 

Section (Page)

Errata / Addenda

Manual updated

3.3 (52)Deleted the following sentence in the section about the ECDH key exchange as it is not correct:
"The ephemeral public key is calculated based on the static public key of the to-be-updated contract certificate respectively OEM provisioning certificate."
Not yet
5.3 (81)

Corrected the steps of the mobility operator (MO) for encrypting the private key of the contract certificate which needs to be installed in the electric vehicle.

Wrong:

The MO encrypts the private key by

  1. computing a so-called DHpublickey (ephemeral Diffie-Hellman public parameter) from the OEM provisioning certificate’s public key as input for the ECDH protocol,
  2. applying this ECDH protocol to generate a shared secret which then serves as input to a key derivation function in order to derive the 128 bit session key, and
  3. using this symmetric session key for applying the AES-CBC-128 symmetric cipher on the contract certificate’s private key.


Correct:

The MO encrypts the private key by

  1. generating an ephemeral key pair from the ECC domain parameters of the named curve "secp256r1" (the public key part is the above mentioned DHpublickey),
  2. generating a shared secret which is computed using the domain parameters of the named curve "secp256r1", the private key part of the ephemeral key pair generated in the previous step, and the OEM provisioning certificate’s public key,
  3. using this shared secret as input for an agreed-upon key derivation function in order to derive the 128 bit session key, and
  4. using this symmetric session key for applying the AES-CBC-128 symmetric block cipher on the contract certificate’s private key.

The MO needs to delete this ephemeral key pair as soon as the private key belonging to the contract certificate has been encrypted and the Dhpublickey has been sent to the CPS along with other contract data for signature purposes.

Not yet
2.4 (42)Caption for figure 2.10 "DC message sequence" was missing.June 9, 2017
3.1 (48)Explained Elliptic Curve Cryptography (ECC) in more detail and corrected the following sentence: "The '256' in that named curve indicates that the keys must be 256 bits long.".
As a public ECC key represents a point on an elliptic curve with X and Y coordinates, it encompasses two 256 bit values.
June 9, 2017
8 (109)Added information on the format of the "vendorId" in OCPP (Open Charge Point Protocol) DataTransfer.req call messages. Corrected the format of vendorId in example messages.June 9, 2017
8.2 (123-126)As Nikos Papadopoulos (Allego) - thanks! -  pointed out, there was an error on page 124 (step 4 of section 8.2) stating that a SHA-256 would produce a 256 bytes hash. But since SHA-256 generates hashes of 256 bits length, we get 256 bits for the issuerNameHash and issuerKeyHash. Furthermore, steps 3 to 6 of the sequence diagram regarding the communication steps from PaymentDetailsReq to CableCheckRes have been rewritten. Reason: Not only the contract certificate itself but the entire contract certificate chain needs to be checked with an OCSP request for a positive authorization. More information has been added for clarification. June 9, 2017
Annex A (158 ff)Certificate profiles needed a little update:

The Domain Component of the EVSE Leaf Cert must be set to "CPO".
The Domain Component of the Leaf Prov Cert must be set to "CPS".
The Domain Component of the OEM Prov Cert Cert must be set to "OEM".
The Domain Component of the Priv. Env. SECC Cert must be set to "PE" (according to upcoming Edition 2 of ISO 15118-2).
June 9, 2017