2017
DOI: 10.1109/mwc.2016.1600039wc
|View full text |Cite
|
Sign up to set email alerts
|

Network Security and Privacy Challenges in Smart Vehicle-to-Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
51
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 113 publications
(51 citation statements)
references
References 10 publications
0
51
0
Order By: Relevance
“…where X * denotes the optimal input, and its corresponding PDF is f X * (x). According to (13) and (14), we have…”
Section: B Upper Bound On Secrecy Capacitymentioning
confidence: 99%
See 1 more Smart Citation
“…where X * denotes the optimal input, and its corresponding PDF is f X * (x). According to (13) and (14), we have…”
Section: B Upper Bound On Secrecy Capacitymentioning
confidence: 99%
“…According to [32], a lower bound of C B can be easily obtained as (12) in [29], and an upper bound of C E can be easily obtained as (13) in [29]. Then, submit (12) and (13) in [29] into (A.1), eq. (7) can be derived.…”
Section: Appendix a Proof Of Lower Bound (7) In Theoremmentioning
confidence: 99%
“…For example, a self-driving car is expected to generate about one gigabyte of data per second, and continuously offloading such an amount of data to the edge network is not realistic. Privacy is another concern that can prevent centralized ML for most sensor data collected by IoT devices, e.g., smart meters [82] or electric vehicles [83]. While local processing of IoT data is an alternative, often a single device is limited in terms of both available data and computation power.…”
Section: Learning At the Wireless Edgementioning
confidence: 99%
“…3) Security of V2G Technology: Similar to EV charging, V2G demands secure payment protection. Due to the nature of V2G service (e.g., regulation and peak load mitigation), V2G payment needs to be fast, anonymous, and secure [229]. From the EV's perspective, its identity and location data should be unlinkable to AGs; service-related information (e.g., battery status, service preference, etc.)…”
Section: Information Management For V2g Servicesmentioning
confidence: 99%
“…From the operators' perspective, they need to protect users' privacy and acquire appropriate data for efficient operation. [229] presents a novel network security architecture for secure V2G payment. The trade-off in terms of the operator is studied in [230], where the payment mechanism is a registration and data maintenance process based on blockchain.…”
Section: Information Management For V2g Servicesmentioning
confidence: 99%