2019
DOI: 10.3390/electronics8010096
|View full text |Cite
|
Sign up to set email alerts
|

Certificate Based Security Mechanisms in Vehicular Ad-Hoc Networks based on IEC 61850 and IEEE WAVE Standards

Abstract: When equipped with an on-board wireless kit, electric vehicles (EVs) can communicate with nearby entities, e.g., road side units (RSUs), via a vehicle ad-hoc network (VANET). More observability enables smart charging algorithms where charging stations (CSs) are allocated to EVs based on their current state of charge, destination, and urgency to charge. IEEE 1609 WAVE standard regulates VANETs, while IEC 61850 is emerging as the smart grid communication standard. In order to integrate these two domains of energ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 36 publications
(22 citation statements)
references
References 25 publications
0
20
0
Order By: Relevance
“…Security is utmost important in PMU communication as PMU traffic travels through wide area communication network which is a public network. An eavesdropper may modify packets causing major loss to grid network [23]. IEC 61850-90-5 standard specifies message authentication and integrity as essential requirements whereas confidentiality as an optional requirement for PMU communication over WANs.…”
Section: Implementation Of R-gosv Toolboxmentioning
confidence: 99%
“…Security is utmost important in PMU communication as PMU traffic travels through wide area communication network which is a public network. An eavesdropper may modify packets causing major loss to grid network [23]. IEC 61850-90-5 standard specifies message authentication and integrity as essential requirements whereas confidentiality as an optional requirement for PMU communication over WANs.…”
Section: Implementation Of R-gosv Toolboxmentioning
confidence: 99%
“…A number of articles have been devoted to countermeasures against cyberattacks on VANET with a focus on authentication methods. For example, [21,22] provide overviews of threats and attacks that vehicle-to-network is exposed to, and offer solutions to protect car networks from malicious nodes and fake messages using authentication. In [23], the authors describe security and privacy issues that may affect large-scale V2N deployments and suggest solutions through the use of authentication methods.…”
Section: Related Workmentioning
confidence: 99%
“…Every automobile was assumed to be equipped with three important components, called the OBUs, sensors, and GPS. A total of 10 RSUs were spread over 1 km radius [40]. The total number of RSUs that were malicious were considered to be less than the number of non-malicious RSUs that were placed alongside the roadway in a network.…”
Section: Simulation Tool and Set-upmentioning
confidence: 99%