Ultra super fast authentication protocol for electric vehicle charging using extended chaotic maps
W Wang, Z Han, M Alazab… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Due to the explosive increase of electric vehicles (EVs) and universal charging stations
(CS), achieving fast authentication is an important topic in the vehicle-to-grid (V2G) network …
(CS), achieving fast authentication is an important topic in the vehicle-to-grid (V2G) network …
Physically secure and privacy-preserving charging authentication framework with data aggregation in vehicle-to-grid networks
In response to critical security threats such as data tampering, identity impersonation, and
channel eavesdropping in Vehicle-to-Grid (V2G) networks, numerous charging …
channel eavesdropping in Vehicle-to-Grid (V2G) networks, numerous charging …
Lightweight and privacy-preserving charging reservation authentication protocol for 5G-V2G
W Hou, Y Sun, D Li, Z Guan, J Liu - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
To compensate for the lack of charging equipment, the charging reservation mechanism has
been employed in the vehicle-to-grid (V2G) system, which is vulnerable to some potential …
been employed in the vehicle-to-grid (V2G) system, which is vulnerable to some potential …
A survey on authentication protocols of dynamic wireless EV charging
Abstract Electric Vehicles (EVs) are considered the predominant method of decreasing fossil
fuels as well as greenhouse gas emissions. With the drastic growth of EVs, the future smart …
fuels as well as greenhouse gas emissions. With the drastic growth of EVs, the future smart …
Authenticated key agreement protocol for secure communication establishment in vehicle-to-grid environment with FPGA implementation
V Sureshkumar, P Chinnaraj… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Vehicle-to-grid (V2G) technology enables bidirectional energy flow between the electric
vehicle and power grid thereby making the electric vehicle as a virtual power plant. This …
vehicle and power grid thereby making the electric vehicle as a virtual power plant. This …
[HTML][HTML] A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods
T Aljohani, A Almutairi - Defence Technology, 2024 - Elsevier
With the continuous development of transportation electrification, the cybersecurity of energy
infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool …
infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool …
Efficient privacy-preserving and secure authentication for electric-vehicle-to-electric-vehicle-charging system based on ECQV
AM Almuhaideb, SS Algothami - Journal of Sensor and Actuator …, 2022 - mdpi.com
The use of Electric Vehicles (EVs) is almost inevitable in the near future for the sake of the
environment and our plant's long-term sustainability. The availability of an Electric-Vehicle …
environment and our plant's long-term sustainability. The availability of an Electric-Vehicle …
Agreement-induced data verification model for securing vehicular communication in intelligent transportation systems
Intelligent Transportation security requires cooperative credentials for sharing navigation
and communication data between the vehicles. However due to the dynamic environment …
and communication data between the vehicles. However due to the dynamic environment …
Integrating privacy into the electric vehicle charging architecture
The Electric Vehicle (EV) charging architecture consists of several actors which
communicate with different protocols. A serious issue is the lack of adequate privacy …
communicate with different protocols. A serious issue is the lack of adequate privacy …
Efficient authentication for vehicular digital twin communications
J Xu, C He, TH Luan - 2021 IEEE 94th Vehicular Technology …, 2021 - ieeexplore.ieee.org
Autonomous vehicles (AVs) have developed rapidly in recent years and derived many AV-
related services. However, the stringent requirement of real-time sensing, computing, and …
related services. However, the stringent requirement of real-time sensing, computing, and …