2019
DOI: 10.1016/j.comnet.2019.02.002
|View full text |Cite
|
Sign up to set email alerts
|

SURVIVOR: A blockchain based edge-as-a-service framework for secure energy trading in SDN-enabled vehicle-to-grid environment

Abstract: Electric vehicles (EVs) have transformed the smart transportation sector by providing diverse energy management solutions to the smart grid. Energy trading among EVs and charging stations (CS) in a vehicle-to-grid (V2G) environment is one of the popular verticals in smart grid. However, processing the energy trading decisions at remote control centers lead to an increase in delay and network overhead. Apart from these issues, the security concerns while trading the energy in such an environment remain persiste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
88
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 216 publications
(88 citation statements)
references
References 27 publications
0
88
0
Order By: Relevance
“…The authors selected the meters as miner nodes whose power capacity is more than a threshold value and used these nodes to validate the requests raised by other smart meters. In [28], the authors presented a blockchain-based edge-service framework for secure energy trading in vehicle-to-grid ecosystem. The authors used the concept of approver nodes for secure energy trading, which were responsible for validating the transactions and were selected amongst all the nodes based on a utility function.…”
Section: Related Workmentioning
confidence: 99%
“…The authors selected the meters as miner nodes whose power capacity is more than a threshold value and used these nodes to validate the requests raised by other smart meters. In [28], the authors presented a blockchain-based edge-service framework for secure energy trading in vehicle-to-grid ecosystem. The authors used the concept of approver nodes for secure energy trading, which were responsible for validating the transactions and were selected amongst all the nodes based on a utility function.…”
Section: Related Workmentioning
confidence: 99%
“…The packet received ratio was analyzed using statistical measures considering the factors mentioned above and the large scale of the applications [ 29 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 ]. For example, the mean values were considered effective for real-time traffic applications, but event-based applications would prefer median and mode values.…”
Section: Simulation and Performance Evaluationmentioning
confidence: 99%
“…Figure 6 e shows that the proposed system maintained its stability and achieved an improved packet collection rate compared with the existing system. This work tries to reveal that compared to the existing application-oriented algorithms [ 30 , 31 , 39 , 40 , 41 , 42 , 43 , 44 ], RSC performs better in the event-based and time-critical applications.…”
Section: Simulation and Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to prevent security threats such as forgery of energy trading data in previous researches, a system which adopts a blockchain [8] or a method of setting a consumption pattern suitable for a specific situation in consideration of parameters such as user's preference or household appliances . In this study, previous studies [7][8] [9][10] [11] are effective, but they have limitations on user privacy issues. IoT (Internet of Things) Because there is a limitation of computing and storage space of devices, data collected through devices are stored in a single cloud and processed.…”
Section: Introductionmentioning
confidence: 99%