2018
DOI: 10.1109/access.2018.2812176
|View full text |Cite
|
Sign up to set email alerts
|

LNSC: A Security Model for Electric Vehicle and Charging Pile Management Based on Blockchain Ecosystem

Abstract: The Internet of Energy (IoE) provides an effective networking technology for distributed green energy, which allows the connection of energy anywhere at any time. As an important part of the IoE, electric vehicles (EVs), and charging pile management are of great significance to the development of the IoE industry. Previous work has mainly focused on network performance optimization for its management, and few studies have considered the security of the management between EVs and charging piles. Therefore, this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
140
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 279 publications
(164 citation statements)
references
References 26 publications
0
140
0
Order By: Relevance
“…TrustChain protocol [40] Overlay attack -Every transaction is embedded with a Time-Stamp to mark the uniqueness Wang et al's protocol [41] Double-spending attack -Multi signatures and anonymous encrypted message propagation streams Aitzhan and Svetinovic's protocol [22] -Time-Stamp and the Proof-of-Work mechanism Wang et al's protocol [41] Modification attack -Elliptic curve encryption is used to calculate the hash functions LNSC protocol [10] -The attribute signature and the MAC BSeIn protocol [39] Collusion attack -Blockchain-based incentive mechanism He et al's protocol [42] Whitewashing attack -Lower priorities are given to the agents of new identities TrustChain protocol [40] Quantum attack -Lattice-based signature scheme Yin et al's protocol [43] Man-in-the-middle attack -Elliptic curve encryption is used to calculate the hash functions LNSC protocol [10] -Secure mutual authentication BSeIn protocol [39] Sybil attack -An immutable chain of temporally ordered interactions is created for each agent TrustChain protocol [40] et al [20] introduced a monitoring system on Smart Grid, named GridMonitoring, for ensuring transparency, provenance, and immutability. The GridMonitoring system is based on four layers, namely, 1) Registration and authentication layer, 2) Smart meter, 3) Processing and consensus nodes, and 4) Data processing on the smart grid network.…”
Section: Internet Of Energymentioning
confidence: 99%
See 2 more Smart Citations
“…TrustChain protocol [40] Overlay attack -Every transaction is embedded with a Time-Stamp to mark the uniqueness Wang et al's protocol [41] Double-spending attack -Multi signatures and anonymous encrypted message propagation streams Aitzhan and Svetinovic's protocol [22] -Time-Stamp and the Proof-of-Work mechanism Wang et al's protocol [41] Modification attack -Elliptic curve encryption is used to calculate the hash functions LNSC protocol [10] -The attribute signature and the MAC BSeIn protocol [39] Collusion attack -Blockchain-based incentive mechanism He et al's protocol [42] Whitewashing attack -Lower priorities are given to the agents of new identities TrustChain protocol [40] Quantum attack -Lattice-based signature scheme Yin et al's protocol [43] Man-in-the-middle attack -Elliptic curve encryption is used to calculate the hash functions LNSC protocol [10] -Secure mutual authentication BSeIn protocol [39] Sybil attack -An immutable chain of temporally ordered interactions is created for each agent TrustChain protocol [40] et al [20] introduced a monitoring system on Smart Grid, named GridMonitoring, for ensuring transparency, provenance, and immutability. The GridMonitoring system is based on four layers, namely, 1) Registration and authentication layer, 2) Smart meter, 3) Processing and consensus nodes, and 4) Data processing on the smart grid network.…”
Section: Internet Of Energymentioning
confidence: 99%
“…• Key attack: This attack is defined in the context of a system combining electric vehicles and charging piles, as follows: "If the private key of an electric vehicle that has been used for longtime leaks, the attacker can impersonate this electric vehicle to deceive others" [10].…”
Section: A Identity-based Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The use cases include those that require limited business logic but place security as the foremost consideration, such as in e-voting [70], timestamping of research manuscripts [91], preservation of government documentation [61]. Other cases emphasize payment as the key proposition, such as electricity trading in micro grids [185], machine-to-machine micropayment [140], and electric vehicle charging payment [202].…”
Section: ) Bitcoinmentioning
confidence: 99%
“…Reference [140] is a system that enables Bitcoin-based micro-payment for a smart cable connected with a smart socket to pay for electricity. Reference [202] describes a system for Bitcoin payment between electric vehicles and the grid, leveraging the lightening network [254] scalability solution for Bitcoin blockchain. Other than using Bitcoin, there are also many use cases leveraging application-specific crypto token for payments, e.g., [134] presents a scenario of autonomous agents performing collaborative services which uses the blockchain application's internal crypto token for payments.…”
Section: H Crypto Token Systemsmentioning
confidence: 99%