Abstract
V2G networks face various types of attacks, which can threaten the vehicle owners’ privacy and the integrity of exchanged messages, such as impersonating EVs, illegally modifying their messages, or threatening the owner’s privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
M. Mustafa, N. Zhang, G. Kalogridis, and Z. Fan, “Smart Electric Vehicle Charging: Security Analysis,” in Proc. IEEE PES ISGT, USA, February 2013.
H. Guo, Y. Wu, H. Chen, and M. Ma, “A Batch Authentication Protocol for V2G Communications,” in Proc. NTMS, France, February 2011.
H. Guo, Y. Wu, H. Chen, F. Bao, and M. Ma, “UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 707–714, December 2011.
H. Tseng, “On the Security of a Unique Batch Authentication Protocol for Vehicle-to-Grid Communications,” in Proc. ITST, Taiwan, November 2012.
H. Liu, H. Ning, Y. Zhang, and L. Yang, “Aggregated-Proofs Based Privacy-Preserving Authentication for V2G Networks in the Smart Grid,” IEEE Transactions on Smart Grid, vol. 3, no. 4, pp. 1722–1733, December 2012.
H. Liu, H. Ning and M. Guizani, “Battery status-aware authentication scheme for V2G networks in smart grid,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 99–110, March 2013.
Z. Yang, S. Yu and C. Liu, “P2: Privacy-preserving communication and precise reward architecture for V2G networks in smart grid,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 697–706, December 2011.
H. Tseng, “A Secure and Privacy-Preserving Communication Protocol for V2G Networks,” in Proc. IEEE WCNC, France, April 2012.
M. Stegelmann and D. Kesdogan, “Design and evaluation of a privacy-preserving architecture for vehicle-to-grid interaction,” Lecture Notes in Computer Science, Public Key Infrastructures, Services and Applications, Springer Berlin Heidelberg, vol. 7163, pp. 75–90, 2012.
B. Vaidya, D. Makrakis, and H. Mouftah, “Security Mechanism for Multi-domain Vehicle-to- Grid Infrastructure,” in Proc. IEEE GLOBECOM, USA, December 2011.
D. Ghosh and S. Wicker, “A privacy-aware design for the vehicle-to-grid framework,” in Proc. HICSS, USA, January 2013.
T. Holden and J. Yazdani, “Hybrid security for hybrid vehicles exploring smart grid technology, power-line and wireless communication,” in Proc. IEEE PES ISGT Europe, UK, December 2011.
H. Su, M. Qiu, and H. Wang, “Secure wireless communication system for smart grid with rechargeable electric vehicle,” IEEE Communications Magazine, vol. 50, no. 8, pp. 62–68, August 2012.
Y. Li, R. Wang and Z. Han, “Resilient PHEV charging policies under price information attacks,” in Proc. IEEE SmartGridComm, Taiwan, November 2012.
M. Stegelmann and D. Kesdogan, “V2GPriv: Vehicle-to-grid privacy in the smart grid,” in Proc. CSS, Australia, December 2012.
M. Au, J. Liu and J. Zhou, “A new payment system for enhancing location privacy of electric vehicles,” IEEE Transactions on Vehicular Technology, vol. 63, no. 1, pp. 3–18, January 2014.
A. Abdallah, and X. Shen, “Lightweight Security and Privacy-Preserving V2G Connection Scheme in Smart Grid,” in Proc. IEEE GLOBECOM, USA, December 2015.
A. Abdallah, and X. Shen, “Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections,” IEEE Transaction on Vehicular Technology, vol. 66, no. 3, pp. 2615–2629, 2017.
M. Saarinen, “The BlueJay ultra-lightweight hybrid crypto-system,” in Proc. IEEE Symposium on Security and Privacy Workshops, USA, May 2012.
M. Saarinen, “The PASSERINE public key encryption and authentication mechanism,” Lecture Notes in Computer Science, Springer, vol. 7127, pp. 283 – 288, 2011.
D. Engels, M. Saarinen and E. Smith, “The Hummingbird-2 lightweight authenticated encryption algorithm,” Lecture Notes in Computer Science, Springer, vol. 7055, pp. 19–31, 2011.
A. Menezes and S. Wanstone, Handbook of Applied Cryptography. CRC Press, 1996.
H. Martin, E. Millan and J. Castro, “AKARI-x: a pseudorandom number generator for secure lightweight systems,” In Proc. IEEE IOLTS, Greece, July 2011.
B. Collard and F. Standaert, “A statistical saturation attack against the block cipher PRESENT,” In Proc. CT-RSA, USA, April 2009. Lecture Notes in Computer Science, Springer, vol. 5473, pp. 195–210, 2009.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 The Author(s), under exclusive license to Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Abdallah, A., Shen, X. (2018). Smart Grid Security Secure V2G Connections. In: Security and Privacy in Smart Grid. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-93677-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-93677-2_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93676-5
Online ISBN: 978-3-319-93677-2
eBook Packages: Computer ScienceComputer Science (R0)