2022
DOI: 10.3390/jsan11020028
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV

Abstract: The use of Electric Vehicles (EVs) is almost inevitable in the near future for the sake of the environment and our plant’s long-term sustainability. The availability of an Electric-Vehicle-Charging Station (EVCS) is the key challenge that owners are worried about. Therefore, we suggest benefiting from individual EVs that have excess energy and are willing to share it with other EVs in order to maximize the availability of EVCSs without the need to rely on the existing charging infrastructure. The Internet of E… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 48 publications
0
7
0
Order By: Relevance
“…A cloud user, on the other side, should be a legal entity in the network. Whenever a cloud consumer transmits messages to one or more VCs, his or her identification must be verified [25,26].…”
Section: Security and Privacy Requirementsmentioning
confidence: 99%
“…A cloud user, on the other side, should be a legal entity in the network. Whenever a cloud consumer transmits messages to one or more VCs, his or her identification must be verified [25,26].…”
Section: Security and Privacy Requirementsmentioning
confidence: 99%
“…A network's privacy is intricately connected to information related to a specific individual resource, be that a device, personally identifiable information (PII), a service, etc. [4]. Nevertheless, there are instances where meticulous collection of personal data is necessary for specific use cases or compliance with legal obligations.…”
Section: An Overview Of Published Articlesmentioning
confidence: 99%
“…SK is a 256-bit binary number randomly selected by the random number generator, which is encrypted by Elliptic Curve Cryptography-Secp256k1 (one-way encryption function) to generate PK; PK is then used for Keccak-256 hash operation. The last 20bytes is the user's account address (Almuhaideb and Algothami, 2022; Valdivia and Balcell, 2022).…”
Section: The Proposed Schemementioning
confidence: 99%