2020 International Symposium on Networks, Computers and Communications (ISNCC) 2020
DOI: 10.1109/isncc49221.2020.9297199
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-aware Authentication Scheme for Electric Vehicle In-motion Wireless Charging

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 9 publications
0
10
0
Order By: Relevance
“…Hamouid et al 74 proposed another privacy‐aware protocol for EV dynamic charging systems which hides the location of the EV during the entire charging process. Their protocol also provides eminent features such as anonymity, fast authentication between EV and CP with single message exchange without involvement of CSP, and prevents double spending.…”
Section: Taxonomy Of Security Protocols For Ev Dynamic Charging Systemmentioning
confidence: 99%
See 3 more Smart Citations
“…Hamouid et al 74 proposed another privacy‐aware protocol for EV dynamic charging systems which hides the location of the EV during the entire charging process. Their protocol also provides eminent features such as anonymity, fast authentication between EV and CP with single message exchange without involvement of CSP, and prevents double spending.…”
Section: Taxonomy Of Security Protocols For Ev Dynamic Charging Systemmentioning
confidence: 99%
“…Table 12 summarizes the security characteristics of various authentication protocols. When compared to other protocols, 67,68,70,71,74,76 Rabieh et al's 73 protocol lacks certain security characteristics. Additionally, only Roman et al's 71 protocol has been fully validated as secure using a commonly used method known as the automated validation of internet security protocols and applications (AVISPA).…”
Section: Comparison Of Security Protocols In Ev Dynamic Charging Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…To address the issue of EV location privacy, an anonymous authentication scheme is proposed by the authors in [42] using verifiable encryption, authenticated pairwise-keys and coin hash chains. The EV identity is preserved by using pseudonyms instead of its real identity, and a hash chain is used for verification purposes.…”
Section: Ev Authentication In Dwc Systemsmentioning
confidence: 99%