Secure Plug-in Electric Vehicle (PEV) Charging in a Smart Grid Network
Autor: | Mohammed Abdel-Hafez, Khaled Shuaib, Ala Al-Fuqaha, Ezedin Barka, Juhar Ahmed Abdella, Farag Sallabi |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2017 |
Předmět: |
Control and Optimization
business.product_category Computer science 020209 energy Online charging system Energy Engineering and Power Technology 02 engineering and technology computer.software_genre privacy lcsh:Technology Mode (computer interface) Electric vehicle information security protocols 0202 electrical engineering electronic engineering information engineering Plug-in Smart grid network Electrical and Electronic Engineering smart grid energy charging Engineering (miscellaneous) Protocol (object-oriented programming) electric vehicles Renewable Energy Sustainability and the Environment business.industry lcsh:T Smart grid Roaming business computer Energy (miscellaneous) Computer network |
Zdroj: | Energies; Volume 10; Issue 7; Pages: 1024 Energies, Vol 10, Iss 7, p 1024 (2017) |
ISSN: | 1996-1073 |
DOI: | 10.3390/en10071024 |
Popis: | Charging of plug-in electric vehicles (PEVs) exposes smart grid systems and their users to different kinds of security and privacy attacks. Hence, a secure charging protocol is required for PEV charging. Existing PEV charging protocols are usually based on insufficiently represented and simplified charging models that do not consider the user’s charging modes (charging at a private location, charging as a guest user, roaming within one’s own supplier network or roaming within other suppliers’ networks). However, the requirement for charging protocols depends greatly on the user’s charging mode. Consequently, available solutions do not provide complete protocol specifications. Moreover, existing protocols do not support anonymous user authentication and payment simultaneously. In this paper, we propose a comprehensive end-to-end charging protocol that addresses the security and privacy issues in PEV charging. The proposed protocol uses nested signatures to protect users’ privacy from external suppliers, their own suppliers and third parties. Our approach supports anonymous user authentication, anonymous payment, as well as anonymous message exchange between suppliers within a hierarchical smart grid architecture. We have verified our protocol using the AVISPA software verification tool and the results showed that our protocol is secure and works as desired. |
Databáze: | OpenAIRE |
Externí odkaz: |