The upcoming development in vehicle to grid network (V2G) allows for the flow of energy from battery powered Electric Vehicle (EV) to grid as well as the exchange of information between them. However, during the information exchange, the EV's confidential information should be transferred from one charging station to another in a secure manner. Furthermore, the anonymity of the EV and charging station should be preserved. Despite the fact that many works on anonymous authentication and privacy preservation exist, there is an increase in computational cost in existing surveys. In this work, the new charging station authenticates the EV using blockchain technology without the involvement of a trusted entity, resulting in a reduction in computational time. Moreover, an efficient revoking mechanism is suggested to block the misbehaving charging station from the V2G network. In addition, security analysis section proves the resistant of our work against several possible well known attacks. Finally, to evaluate the performance of the work, the simulation is performed using CYGWIN platform and the results are proved to be noteworthy.

ABRIS: Anonymous blockchain based revocable and integrity preservation scheme for vehicle to grid network

Mostarda L.
Ultimo
2022-01-01

Abstract

The upcoming development in vehicle to grid network (V2G) allows for the flow of energy from battery powered Electric Vehicle (EV) to grid as well as the exchange of information between them. However, during the information exchange, the EV's confidential information should be transferred from one charging station to another in a secure manner. Furthermore, the anonymity of the EV and charging station should be preserved. Despite the fact that many works on anonymous authentication and privacy preservation exist, there is an increase in computational cost in existing surveys. In this work, the new charging station authenticates the EV using blockchain technology without the involvement of a trusted entity, resulting in a reduction in computational time. Moreover, an efficient revoking mechanism is suggested to block the misbehaving charging station from the V2G network. In addition, security analysis section proves the resistant of our work against several possible well known attacks. Finally, to evaluate the performance of the work, the simulation is performed using CYGWIN platform and the results are proved to be noteworthy.
2022
File in questo prodotto:
File Dimensione Formato  
1-s2.0-S2352484722013300-main.pdf

accesso aperto

Descrizione: editorial version
Tipologia: Versione Editoriale
Licenza: PUBBLICO - Creative Commons
Dimensione 1.47 MB
Formato Adobe PDF
1.47 MB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11581/467092
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 9
  • ???jsp.display-item.citation.isi??? 3
social impact