2016
DOI: 10.1109/tifs.2016.2532840
|View full text |Cite
|
Sign up to set email alerts
|

Authentication Scheme for Flexible Charging and Discharging of Mobile Vehicles in the V2G Networks

Abstract: Abstract-Navigating security and privacy challenges is one of the crucial requirements in the Vehicle-to-Grid (V2G) network. Since Electric Vehicles (EV) need to provide their private information to aggregators/servers when charging/discharging at different charging stations, privacy of the vehicle owners can be compromised if the information is misused, traced, or revealed. In a wide V2G network, where vehicles can move outside of their home network to visiting networks, security and privacy becomes even more… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
65
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 69 publications
(65 citation statements)
references
References 27 publications
0
65
0
Order By: Relevance
“…However, the smart grid needs to work in both modes until the migration is completed. An example of operating in both modes is when the vehicle's charging and discharging is performed in the distributed network, whereas only the vehicle's discharging is allowed in the centralized network [1,9]. The V2G system requires the distributed and centralized networks to charge and discharge the battery of the vehicle at a charging station along with a secure payment system to support these operations.…”
Section: Unique V2g Challenges and Characteristicsmentioning
confidence: 99%
See 3 more Smart Citations
“…However, the smart grid needs to work in both modes until the migration is completed. An example of operating in both modes is when the vehicle's charging and discharging is performed in the distributed network, whereas only the vehicle's discharging is allowed in the centralized network [1,9]. The V2G system requires the distributed and centralized networks to charge and discharge the battery of the vehicle at a charging station along with a secure payment system to support these operations.…”
Section: Unique V2g Challenges and Characteristicsmentioning
confidence: 99%
“…Liu et al [9] proposed a role-dependent scheme using hybrid cryptographic primitives (e.g., ring signature, fair blind signature, and proxy re-encryption) in which a battery vehicle interacts with the power grid in different roles, that is, energy demand (i.e., as a consumer), energy storage, and energy supply (i.e., as a generator). Saxena et al [1] proposed a scheme using a dynamic accumulator based on a bilinear pairing that handles dynamic connect and disconnect for a number of vehicles from a charging station, and performs secure vehicle operations in the centralized and distributed V2G networks under home area and visited area scenarios.…”
Section: Specific Security Mechanisms For the V2gmentioning
confidence: 99%
See 2 more Smart Citations
“…All vehicles in traffic jam must pay for charging even if they do not want to charge. Saxena and Choi proposed a bilinear pairing based authentication scheme for flexible charging in vehicle-to-grid networks [23]. However, their proposed scheme is not compatible with our environment as they considered a wired charging which vehicles need to be connected to for a relatively longer time period.…”
Section: Literature Reviewmentioning
confidence: 99%