Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
IEEE Security and Privacy
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
IEEE Transactions on Parallel and Distributed Systems
A semantics-based multi-agent framework for vehicular social network development
Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Security concerns of a plug-in vehicle
ISGT '12 Proceedings of the 2012 IEEE PES Innovative Smart Grid Technologies
Footprint: Detecting Sybil Attacks in Urban Vehicular Networks
IEEE Transactions on Parallel and Distributed Systems
Location Privacy for Vehicle-to-Grid Interaction through Battery Management
ITNG '12 Proceedings of the 2012 Ninth International Conference on Information Technology - New Generations
A content centric approach to dissemination of information in vehicular networks
Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Proof of concept of a security based on lifetime of communication's pseudonyms for the VANETs
Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Hi-index | 0.00 |
The technology, security and privacy requirements of the electric vehicle (EV) in the smart grid (SG) context, especially when the EV acts as mobile power storage, have gained much attention from the research community and market recently. This role of the EV is motivated by the increase in capacity of the power storages in the EV. In this paper, first we present different situations that an EV can be in the SG context and their privacy issues. Then, we provide two authentication schemes, first one between the EV and a trusted SG server directly, and second one via a non-trusted third party entity with a robust privacy-preserving agenda. Our analysis shows that our mechanisms are secure and robust enough to make sure the privacy of the customers is fully preserved, and at the same time, are efficient since they consume very limited resources.