2020
DOI: 10.1109/access.2020.3005400
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Anonymous Communication Scheme for Charging Information in Vehicle-to-Grid

Abstract: With electric vehicle's charging information, the utilities can increase the efficiency and reliability of Vehicle-to-Grid (V2G) while the electric vehicle consumers can better manage their energy consumption and costs. However, since charging information are commonly transmitted via public network or wireless link, their communications lack trusted third party for identity authentication and key distribution, and are constantly exposed to traffic analysis attacks. In this paper, we propose a secure and anonym… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 34 publications
(37 reference statements)
0
1
0
Order By: Relevance
“…This information poses a threat to privacy and could be exploited for criminal purposes such as burglary. To address this issue, various privacy-preserving [1], [9], [52], secure communication solutions [53], [54], and secure federated learning approaches [55] have been proposed in the literature. However, our focus in this paper is solely on using RL techniques for electricity theft detection, and we do not address privacy and secure communication concerns.…”
Section: ) Data-driven Methodsmentioning
confidence: 99%
“…This information poses a threat to privacy and could be exploited for criminal purposes such as burglary. To address this issue, various privacy-preserving [1], [9], [52], secure communication solutions [53], [54], and secure federated learning approaches [55] have been proposed in the literature. However, our focus in this paper is solely on using RL techniques for electricity theft detection, and we do not address privacy and secure communication concerns.…”
Section: ) Data-driven Methodsmentioning
confidence: 99%
“…To settle the authentication, communication message confidentiality, and identity privacy secrecy during the communication of EVs in V2G networks, a trusted computing-based solution for secure V2G communication is proposed in [148,149]. Authentication techniques, which were introduced to key distributions without trusted third parties in [150], improve the security of public network communication by decomposition and random forwarding. Based on software-defined networking (SDN) technology, a communication network architecture is established between the data layer and the control layer, and EVs for V2G applications [151].…”
Section: V2gmentioning
confidence: 99%