Abstract

When equipped with an on-board wireless kit, electric vehicles (EVs) can communicate with nearby entities, e.g., road side units (RSUs), via a vehicle ad-hoc network (VANET). More observability enables smart charging algorithms where charging stations (CSs) are allocated to EVs based on their current state of charge, destination, and urgency to charge. IEEE 1609 WAVE standard regulates VANETs, while IEC 61850 is emerging as the smart grid communication standard. In order to integrate these two domains of energy management, past research has focused on harmonizing these two standards for a full smart city solution. However, this solution requires very sensitive data to be transmitted, such as ownership of EV, owners’ personal details, and driving history. Therefore, data security in these networks is of prime concern and needs to be addressed. In this paper, different security mechanisms defined by the IEEE 1609 WAVE standard are applied for both vehicle-to-infrastructure (V2I) and vehicle-to-grid (V2G) communication. The former relates to EV–RSU, while the latter covers EV–CS communication. The implicit and explicit certificate mechanism processes proposed in IEEE 1609 WAVE for authentication are studied in great detail. Furthermore, a performance evaluation for these mechanisms is presented in terms of total time lapse for authentication, considering both the computational time and communication time delays. These results are very important in understanding the extra latency introduced by security mechanisms. Considering that VANETs may be volatile and may disappear as EVs drive away, overall timing performance becomes vital for operation. Reported results show the magnitude of this impact and compare different security mechanisms. These can be utilized to further develop VANET security approaches based on available time and the required security level.

Highlights

  • Intelligent transport systems (ITS) improve traveler safety, decrease traffic congestion, facilitate the reduction of air pollution, provide vehicle information, and contribute to protecting natural resources.The applications of ITS extend to incident management system processes, electronic road toll collection, and in-car navigation systems [1]

  • The authors in References [22,23] proposed pseudonym-based, privacy preserving authentication schemes based on public key infrastructure (PKI), which consists of thousands of public and private key pairs along with corresponding certificates installed in a vehicle’s onboard unit (OBU)

  • When an road side units (RSUs) receives a certificate from an electric vehicles (EVs) for establishment of communication, the RSU constructs the transmitter’s public key from the user identity, the certificate authority (CA)’s public key, and the public parameter

Read more

Summary

Introduction

Intelligent transport systems (ITS) improve traveler safety, decrease traffic congestion, facilitate the reduction of air pollution, provide vehicle information, and contribute to protecting natural resources. To effectively manage the participation of EVs in V2G and G2V, robust, interoperable, and standardized communication is required [6] In this regard, the authors in Reference [7] developed a charging management scheme over a communication network that harmonizes IEEE 1609 WAVE [8] services and IEC 61850-90-8 information models [9]. IEEE 1609.2 has proposed the use of implicit and explicit certificate mechanisms for authentication This paper analyses these mechanisms in detail and presents performance evaluations in terms of total time lapse for authentication. The python-based program was developed using OpenSSL libraries to generate certificates, implement the authentication mechanisms, and calculate the required computational time.

Related Work
Limitations
Cybersecurity
Conceptual
Explicit Certificate Mechanism
Certificate
Digital
Implicit Certificate Mechanism
Evaluation
Timing
50 EVs and 5 RSUs
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call