2019
DOI: 10.1109/tvt.2018.2880834
|View full text |Cite
|
Sign up to set email alerts
|

Efficient, Secure, and Privacy-Preserving PMIPv6 Protocol for V2G Networks

Abstract: Abstract-To ensure seamless communications between mobile Electric Vehicles (EVs) and EV power supply equipment, support for ubiquitous and transparent mobile IP communications is essential in Vehicle-to-Grid (V2G) networks. However, it initiates a range of privacy-related challenges as it is possible to track connected EVs through their mobile IP addresses. Recent works are mostly dedicated to solving authentication and privacy issues in V2G networks in general. Yet, they do not tackle the security and priva… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 25 publications
(34 reference statements)
0
11
0
Order By: Relevance
“… Mobile IP standard: To manage the mobility between different entities in the vehicular network, researchers introduced several solutions in the literature, including terminal‐based Mobile IP 29 and its extensions (ie, Hierarchical MIP, Fast MIP). Additionally, the Proxy MIPv6 30 is a mobility management protocol that works in a centralized manner, also known as network‐based handover. It includes a local mobility anchor, referred to as LMA, to establish communication tunnels with the Mobility Access Gateways (MAGs), referred to as the core entity.…”
Section: Mobility Management In Heterogeneous Vehicular Networkmentioning
confidence: 99%
“… Mobile IP standard: To manage the mobility between different entities in the vehicular network, researchers introduced several solutions in the literature, including terminal‐based Mobile IP 29 and its extensions (ie, Hierarchical MIP, Fast MIP). Additionally, the Proxy MIPv6 30 is a mobility management protocol that works in a centralized manner, also known as network‐based handover. It includes a local mobility anchor, referred to as LMA, to establish communication tunnels with the Mobility Access Gateways (MAGs), referred to as the core entity.…”
Section: Mobility Management In Heterogeneous Vehicular Networkmentioning
confidence: 99%
“…The property of forward security, however, is ignored in [13]. Mahmoud Hashem et al designed an efficient and secure privacy-preserving IPv6 protocol to protect the communications in V2G networks [14]. This solution considers the traceability of EVs but it does not consider forward security.…”
Section: Related Workmentioning
confidence: 99%
“…Considering the [14] has a different system model with ours, the [12] and [23] treat the authenticator as a trusted party, and the [34] focus on group authentication, in this section, we still evaluate our scheme by comparing it with the three similar schemes [5] [26] [17]. We will analyze the computational overhead and communication overhead of the four schemes.…”
Section: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…For example, Odelu et al [2] proposed a secure authenticated key agreement scheme for SG, which provides privacy and session-key security under the Canetti-Krawczyk adversary model. Eiza et al [3] designed an efficient, secure and privacy-preserving proxy mobile IPv6 (PMIPv6) protocol to address the security and privacy concerns of mobile IP communications in V2G networks. In a similar direction, Wu et al [4] utilized elliptic curve cryptography (ECC) to propose a secure and lightweight agreement mechanism for SG.…”
Section: Introductionmentioning
confidence: 99%