An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
On the Anonymity of Home/Work Location Pairs
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Security and Privacy Challenges in the Smart Grid
IEEE Security and Privacy
Secure wireless communication platform for EV-to-Grid research
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Secure vehicular communication systems: design and architecture
IEEE Communications Magazine
V2GPriv: vehicle-to-grid privacy in the smart grid
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Hi-index | 0.00 |
Charging battery-electric vehicles can pose a significant load to the power grid. Letting a central instance control vehicle charging processes can reduce the grid load and allows for vehicles to be used as distributed grid resources. It is commonly assumed that vehicle owners are willing to reveal their driving patterns to the control instance. As we show, current privacy-preserving technologies can be used to construct an architecture that reduces the need to reveal such sensitive information. Yet, we identify limitations to such an approach and demonstrate how an adversary can use information inherent to the context to decrease vehicle owner privacy. As a concrete case, we discuss an adversary algorithm based on travel times and show how to obtain anonymity sets for individual vehicles. This allows us to make an important step towards understanding and quantifying privacy achievable in practice.