2019
DOI: 10.1016/j.adhoc.2018.08.015
|View full text |Cite
|
Sign up to set email alerts
|

Pairing-based authentication protocol for V2G networks in smart grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…In [26], Wang et al proposed a traceable privacy protection communication scheme in the V2G environment, but the security assumption of this scheme is too high for the aggregator; that is, the aggregator knows the true identity information of the EVs, which means that the aggregator can obtain the EVs' private information. Romana et al presented a group-based authentication protocol in V2G networks [34]. In this scheme, a group member EV is issued a temporal identity by the authentication server.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [26], Wang et al proposed a traceable privacy protection communication scheme in the V2G environment, but the security assumption of this scheme is too high for the aggregator; that is, the aggregator knows the true identity information of the EVs, which means that the aggregator can obtain the EVs' private information. Romana et al presented a group-based authentication protocol in V2G networks [34]. In this scheme, a group member EV is issued a temporal identity by the authentication server.…”
Section: Related Workmentioning
confidence: 99%
“…Considering the [14] has a different system model with ours, the [12] and [23] treat the authenticator as a trusted party, and the [34] focus on group authentication, in this section, we still evaluate our scheme by comparing it with the three similar schemes [5] [26] [17]. We will analyze the computational overhead and communication overhead of the four schemes.…”
Section: Performance Analysismentioning
confidence: 99%
“…At the same time, it hopes that the electric grid will feed the electric energy back when the load is at its peak. When the electric vehicle and the grid are in an energy interaction, they must establish real-time communication for the transmission of relevant information, such as the status of the electric vehicle and the load of the electric network [10]. Therefore, the main activity in vehicle-to-grid is actually the two-way interaction related to energy and information between EVs and the grid [8].…”
Section: Network Structure Of V2g In Smart Gridmentioning
confidence: 99%
“…Each transaction is vulnerable to a series of security threats in this scenario, such as singlepoint failure, denial of service attacks, and privacy leakage. Therefore, some schemes, such as [20][21][22], introduced blockchain technology for energy transactions because blockchains have the properties of decentralization, anonymity and immutability to provide an effective solution for V2G networks. Liu et al [23] proposed a cross-domain identity authentication scheme based on a blockchain, which utilizes the encryption algorithm SM9 to guarantee the security and privacy required by V2G networks.…”
Section: Introductionmentioning
confidence: 99%