Skip to main content

Smart Grid Security Secure V2G Connections

  • Chapter
  • First Online:
Security and Privacy in Smart Grid

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

Abstract

V2G networks face various types of attacks, which can threaten the vehicle owners’ privacy and the integrity of exchanged messages, such as impersonating EVs, illegally modifying their messages, or threatening the owner’s privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Mustafa, N. Zhang, G. Kalogridis, and Z. Fan, “Smart Electric Vehicle Charging: Security Analysis,” in Proc. IEEE PES ISGT, USA, February 2013.

    Google Scholar 

  2. H. Guo, Y. Wu, H. Chen, and M. Ma, “A Batch Authentication Protocol for V2G Communications,” in Proc. NTMS, France, February 2011.

    Google Scholar 

  3. H. Guo, Y. Wu, H. Chen, F. Bao, and M. Ma, “UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 707–714, December 2011.

    Article  Google Scholar 

  4. H. Tseng, “On the Security of a Unique Batch Authentication Protocol for Vehicle-to-Grid Communications,” in Proc. ITST, Taiwan, November 2012.

    Google Scholar 

  5. H. Liu, H. Ning, Y. Zhang, and L. Yang, “Aggregated-Proofs Based Privacy-Preserving Authentication for V2G Networks in the Smart Grid,” IEEE Transactions on Smart Grid, vol. 3, no. 4, pp. 1722–1733, December 2012.

    Article  Google Scholar 

  6. H. Liu, H. Ning and M. Guizani, “Battery status-aware authentication scheme for V2G networks in smart grid,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 99–110, March 2013.

    Article  Google Scholar 

  7. Z. Yang, S. Yu and C. Liu, “P2: Privacy-preserving communication and precise reward architecture for V2G networks in smart grid,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 697–706, December 2011.

    Article  Google Scholar 

  8. H. Tseng, “A Secure and Privacy-Preserving Communication Protocol for V2G Networks,” in Proc. IEEE WCNC, France, April 2012.

    Google Scholar 

  9. M. Stegelmann and D. Kesdogan, “Design and evaluation of a privacy-preserving architecture for vehicle-to-grid interaction,” Lecture Notes in Computer Science, Public Key Infrastructures, Services and Applications, Springer Berlin Heidelberg, vol. 7163, pp. 75–90, 2012.

    Google Scholar 

  10. B. Vaidya, D. Makrakis, and H. Mouftah, “Security Mechanism for Multi-domain Vehicle-to- Grid Infrastructure,” in Proc. IEEE GLOBECOM, USA, December 2011.

    Google Scholar 

  11. D. Ghosh and S. Wicker, “A privacy-aware design for the vehicle-to-grid framework,” in Proc. HICSS, USA, January 2013.

    Google Scholar 

  12. T. Holden and J. Yazdani, “Hybrid security for hybrid vehicles exploring smart grid technology, power-line and wireless communication,” in Proc. IEEE PES ISGT Europe, UK, December 2011.

    Google Scholar 

  13. H. Su, M. Qiu, and H. Wang, “Secure wireless communication system for smart grid with rechargeable electric vehicle,” IEEE Communications Magazine, vol. 50, no. 8, pp. 62–68, August 2012.

    Article  Google Scholar 

  14. Y. Li, R. Wang and Z. Han, “Resilient PHEV charging policies under price information attacks,” in Proc. IEEE SmartGridComm, Taiwan, November 2012.

    Google Scholar 

  15. M. Stegelmann and D. Kesdogan, “V2GPriv: Vehicle-to-grid privacy in the smart grid,” in Proc. CSS, Australia, December 2012.

    Google Scholar 

  16. M. Au, J. Liu and J. Zhou, “A new payment system for enhancing location privacy of electric vehicles,” IEEE Transactions on Vehicular Technology, vol. 63, no. 1, pp. 3–18, January 2014.

    Article  Google Scholar 

  17. A. Abdallah, and X. Shen, “Lightweight Security and Privacy-Preserving V2G Connection Scheme in Smart Grid,” in Proc. IEEE GLOBECOM, USA, December 2015.

    Google Scholar 

  18. A. Abdallah, and X. Shen, “Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections,” IEEE Transaction on Vehicular Technology, vol. 66, no. 3, pp. 2615–2629, 2017.

    Article  Google Scholar 

  19. M. Saarinen, “The BlueJay ultra-lightweight hybrid crypto-system,” in Proc. IEEE Symposium on Security and Privacy Workshops, USA, May 2012.

    Google Scholar 

  20. M. Saarinen, “The PASSERINE public key encryption and authentication mechanism,” Lecture Notes in Computer Science, Springer, vol. 7127, pp. 283 – 288, 2011.

    Article  Google Scholar 

  21. D. Engels, M. Saarinen and E. Smith, “The Hummingbird-2 lightweight authenticated encryption algorithm,” Lecture Notes in Computer Science, Springer, vol. 7055, pp. 19–31, 2011.

    Article  Google Scholar 

  22. A. Menezes and S. Wanstone, Handbook of Applied Cryptography. CRC Press, 1996.

    Book  Google Scholar 

  23. H. Martin, E. Millan and J. Castro, “AKARI-x: a pseudorandom number generator for secure lightweight systems,” In Proc. IEEE IOLTS, Greece, July 2011.

    Google Scholar 

  24. B. Collard and F. Standaert, “A statistical saturation attack against the block cipher PRESENT,” In Proc. CT-RSA, USA, April 2009. Lecture Notes in Computer Science, Springer, vol. 5473, pp. 195–210, 2009.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s), under exclusive license to Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Abdallah, A., Shen, X. (2018). Smart Grid Security Secure V2G Connections. In: Security and Privacy in Smart Grid. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-93677-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93677-2_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93676-5

  • Online ISBN: 978-3-319-93677-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics