Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

An Efficient and Secure Anonymous Authentication Scheme For V2G Networks

View through CrossRef
The vehicle-to-grid (V2G) network involves intelligent charge and discharge decisions are made based on user operational energy requirements. It is economically beneficial, and it has attracted the interest of power system and electric vehicle (EV) users. The vehicle can temporarily serve as a distributed energy storage system to reduce the peak load on the power grid by utilizing its battery capacity. There are many continues transactions between EV’s and grid, the security problems in these transactions block its progress. Information management capabilities enabled by a secured network, such as a reliable privacy-preserving payment systems are also supported by V2G. Many present V2G techniques such as bilinear pairing or elliptical curve to execute the authentication protocol, which results in significant computational costs. Moreover, in the existing V2G technique, the system master key is generated independently by a trusted third party, subjecting the system master key to leakage if the third party is compromised by the attacker. This approach uses the anti-super singular elliptic curve to create a lightweight authentication system for electric vehicles and smart grids.
Title: An Efficient and Secure Anonymous Authentication Scheme For V2G Networks
Description:
The vehicle-to-grid (V2G) network involves intelligent charge and discharge decisions are made based on user operational energy requirements.
It is economically beneficial, and it has attracted the interest of power system and electric vehicle (EV) users.
The vehicle can temporarily serve as a distributed energy storage system to reduce the peak load on the power grid by utilizing its battery capacity.
There are many continues transactions between EV’s and grid, the security problems in these transactions block its progress.
Information management capabilities enabled by a secured network, such as a reliable privacy-preserving payment systems are also supported by V2G.
Many present V2G techniques such as bilinear pairing or elliptical curve to execute the authentication protocol, which results in significant computational costs.
Moreover, in the existing V2G technique, the system master key is generated independently by a trusted third party, subjecting the system master key to leakage if the third party is compromised by the attacker.
This approach uses the anti-super singular elliptic curve to create a lightweight authentication system for electric vehicles and smart grids.

Related Results

Additional emissions of vehicle-to-grid technology considering China’s geographical heterogeneity
Additional emissions of vehicle-to-grid technology considering China’s geographical heterogeneity
Vehicle-to-Grid (V2G) technology is regarded as a promising distributed energy storage solution that can help address grid challenges arising from the integration of renewable ener...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
Bidirectional Charging and Vehicle-to-Grid (V2G) Integration in Smart EV Infrastructures
Bidirectional Charging and Vehicle-to-Grid (V2G) Integration in Smart EV Infrastructures
 Inclusive of the Vehicle-to-Grid (V2G) technology, bidirectional charging is a paradigm shift in moving toward sustainable and smart energy systems. The paper examines technical, ...
The V2G Technique and its Application in Distributed Generation
The V2G Technique and its Application in Distributed Generation
Traditional distributed power sources are usually natural energy sources, their output power is not stable and difficult to join up to the grid. Battery electric vehicles(BEV) base...
Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key
Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key
The security of Quantum Secure Direct Communication (QSDC) and its authentication procedure based on multiple stages is analyzed. The security analysis shows that the process of au...
Cross-SN: A Lightweight Authentication Scheme for a Multi-Server Platform Using IoT-Based Wireless Medical Sensor Network
Cross-SN: A Lightweight Authentication Scheme for a Multi-Server Platform Using IoT-Based Wireless Medical Sensor Network
Several wireless devices and applications can be connected through wireless communication technologies to exchange data in future intelligent health systems (e.g., the Internet of ...

Back to Top