Threshold-Based Privacy-Preserving Key Management Scheme for Vehicle-to-Grid Networks

Article Preview

Abstract:

The concept of vehicle-to-grid (V2G) is that electric vehicles (EVs) communicate with the smart grid to sell demand response services by delivering electricity into the grid. Due to the scale of the network, the speed of the vehicles, their geographic positions, and the very sporadic connectivity between them, V2G communications have the crucial requirements of fast session key establishment. In this paper, we propose a threshold-based privacy-preserving key management scheme for V2G networks, which utilizes the threshold-based secret sharing and symmetric key technique to protect the identities of the EV owners and to establish the shared session key between the aggregator and the vehicle. The proposed scheme can achieve the property of identity privacy, confidentiality of the communications, and known-key security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

978-982

Citation:

Online since:

December 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Smartgrid city. [Online]. Available: http: / smartgridcity. xcelenergy. com.

Google Scholar

[2] Center for carbon-free power integration. [Online]. Available: http: / www. carbonfree. udel. edu.

Google Scholar

[3] Z. Yang, S. Yu, W. Lou, and C. Liu, IEEE Transactions on Smart Grid, 2, 4 (2011).

Google Scholar

[4] H. R. Tseng, A secure and privacy-preserving communication protocol for V2G networks, IEEE Wireless Communications and Networking Conference (WCNC), Paris, France, IEEE Press (2012), pp.2706-2711.

DOI: 10.1109/wcnc.2012.6214259

Google Scholar

[5] H. R. Tseng, A robust aggregated message authentication protocol for vehicle-to-grid networks, The 19th World Congress on Intelligent Transport Systems, Vienna, Austria (2012).

Google Scholar

[6] H. R. Tseng and T. H. Chueh, Applied Mathematics and Information Sciences, In Press (2013).

Google Scholar

[7] T. H. Chueh and H. R. Tseng, Applied Mechanics and Materials, 145 (2012), pp.364-368.

Google Scholar

[8] H. R. Tseng, Applied Mechanics and Materials, 284-287 (2013), pp.3380-3384.

Google Scholar

[9] H. R. Tseng, Privacy-preserving key management scheme for vehicle-to-grid networks, The 20th World Congress on Intelligent Transport Systems, Tokyo, Japan (2013).

Google Scholar

[10] D. Wu and C. Zhou, IEEE Transactions on Smart Grid, 2, 2 (2011), pp.375-381.

Google Scholar

[11] J. Xia and Y. Wang, IEEE Transactions on Smart Grid, 3, 3 (2012), pp.1437-1443.

Google Scholar

[12] A. Shamir, Communications of the ACM, 22, 11 (1979), pp.612-613.

Google Scholar

[13] D. R. Stinson, Cryptography: Theory and practice, Chapman & Hall/CRC, Boca Raton, FL, (2006).

Google Scholar