2022
DOI: 10.1109/tiv.2022.3153658
|View full text |Cite
|
Sign up to set email alerts
|

EV-Auth: Lightweight Authentication Protocol Suite for Dynamic Charging System of Electric Vehicles With Seamless Handover

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(6 citation statements)
references
References 35 publications
0
6
0
Order By: Relevance
“…Our motivation arises from dual concerns within existing authentication protocols [8][9][10][11][12][13][14] for dynamic charging: computational efficiency and security vulnerabilities. The scheme [8,9] has a high computational overhead, while the schemes [10][11][12][13][14] reduce computational overhead but are vulnerable to common attacks. To address this, we propose a secure and efficient identity authentication scheme for electric vehicle dynamic charging scenarios.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…Our motivation arises from dual concerns within existing authentication protocols [8][9][10][11][12][13][14] for dynamic charging: computational efficiency and security vulnerabilities. The scheme [8,9] has a high computational overhead, while the schemes [10][11][12][13][14] reduce computational overhead but are vulnerable to common attacks. To address this, we propose a secure and efficient identity authentication scheme for electric vehicle dynamic charging scenarios.…”
Section: Motivationmentioning
confidence: 99%
“…However, their scheme is vulnerable to replay attacks and does not satisfy non-linkability. Babu et al [13] presented a lightweight authentication scheme that incorporates vehicle handover authentication. In this process, the vehicle initiates a handover request with a previously certified roadside unit to communicate with other RSUs under its assistance.…”
Section: Related Workmentioning
confidence: 99%
“…Figure 3b indicates that, as the value of γ increases, the sensitivity of EV to l t will rise. Based on the Sigmoid function, the expected value of EV drivers selecting the SS and MS mode in a specific time slot can be calculated by ( 14) and (15), respectively:…”
Section: Optimal Scheduling Strategy Considering Uncertaintymentioning
confidence: 99%
“…However, the battery capacity is strongly affected by temperature and lifespan. Drivers often worry about the EV's remaining power and the reachability of the BSS [14,15]. As a result, range anxiety seriously affects travel plans and driving experience.…”
Section: Introductionmentioning
confidence: 99%
“…The Internet of Things (IoT) has profoundly transformed our interaction with the environment, encompassing domains such as smart homes and industrial automation. Nevertheless, the widespread adoption of IoT devices has introduced novel security challenges, necessitating the development of lightweight and secure authentication protocols 1 . Conventional cryptographic solutions tend to be excessively resource-intensive and costly for IoT devices, which typically operate under resource constraints.…”
Section: Introductionmentioning
confidence: 99%