Abstract

Vehicle to grid technology allows bidirectional energy exchange between electric vehicles and the power grid for achieving many known benefits. However, V2G networks suffer from certain security threats, such as EV’s privacy and authentication problem. In this paper, we propose an anonymous group authentication scheme for V2G communications. This scheme realizes dynamic joining and revocation of EVs, and greatly reduces the overhead of EV revocation. Through the theoretical analysis, this scheme can ensure identity privacy of EV user and security of data transmission in the process of charging and discharging.

Highlights

  • Depletion of fossil fuel reserves and prominence of environment problem gives a wakeup call for finding the alternative energy sources for these sectors

  • Smart grid support and encourage integration of new energy power generation system, but because of the discontinuity and randomness, new energy will cause the fluctuation of power grid, so in order to smooth the fluctuations and ensure the stability of power grid voltage and frequency, smart grid need other auxiliary system as a compensation of new energy system

  • Vehicle to grid technology allows bidirectional energy exchange between electric vehicles and the power grid under the unified dispatch and control of power grid, and it is an integral part of the smart Grid

Read more

Summary

Introduction

Depletion of fossil fuel reserves and prominence of environment problem gives a wakeup call for finding the alternative energy sources for these sectors. References [3] and [4] based on the blind signature to ensure the safety of the electric car users’ privacy information, but blind signature algorithm is very complex, and it will bring huge delays to identity verification in V2G network. Miao He et al [5] propose a privacy-preserving multi-quality charging (PMQC) scheme to evaluate the EV’s attributes, and authenticate its service eligibility and generate its bill without revealing the EV’s private information.

Security Threats and Requirements of V2G Communication
System Model
Authentication Scheme
Batch Authentication
Security Analysis
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call