1,815 research outputs found
Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks
Vehicle-to-Grid (V2G) networks have emerged as a new communication paradigm between Electric Vehicles (EVs) and the Smart Grid (SG). In order to ensure seamless communications between mobile EVs and the electric vehicle supply equipment, the support of ubiquitous and transparent mobile IP communications is essential in V2G networks. However, enabling mobile IP communications raises real concerns about the possibility of tracking the locations of connected EVs through their mobile IP addresses. In this paper, we employ certificate-less public key cryptography in synergy with the restrictive partially blind signature technique to construct a secure and privacy-aware proxy mobile IPv6 (SP-PMIPv6) protocol for V2G networks. SP-PMIPv6 achieves low authentication latency while protecting the identity and location privacy of the mobile EV. We evaluate the SP-PMIPv6 protocol in terms of its authentication overhead and the information-theoretic uncertainty derived by the mutual information metric to show the high level of achieved anonymity
Authentication and Billing Scheme for The Electric Vehicles: EVABS
The need for different energy sources has increased due to the decrease in
the amount and the harm caused to the environment by its usage. Today, fossil
fuels used as an energy source in land, sea or air vehicles are rapidly being
replaced by different energy sources. The number and types of vehicles using
energy sources other than fossil fuels are also increasing. Electricity stands
out among the energy sources used. The possibility of generating electricity
that is renewable, compatible with nature and at a lower cost provides a great
advantage. For all these reasons, the use of electric vehicles is increasing
day by day. Various solutions continue to be developed for the charging systems
and post-charge billing processes of these vehicles. As a result of these
solutions, the standards have not yet been fully formed. In this study, an
authentication and billing scheme is proposed for charging and post-charging
billing processes of electric land vehicles keeping security and privacy in the
foreground. This scheme is named EVABS, which derives from the phrase "Electric
Vehicle Authentication and Billing Scheme". An authentication and billing
scheme is proposed where data communication is encrypted, payment transactions
are handled securely and parties can authenticate over wired or wireless. The
security of the proposed scheme has been examined theoretically and it has been
determined that it is secure against known attacks
Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks
Vehicle-to-Grid (V2G) networks have emerged as a new communication paradigm between Electric Vehicles (EVs) and the Smart Grid (SG). In order to ensure seamless communications between mobile EVs and the electric vehicle supply equipment, the support of ubiquitous and transparent mobile IP communications is essential in V2G networks. However, enabling mobile IP communications raises real concerns about the possibility of tracking the locations of connected EVs through their mobile IP addresses. In this paper, we employ certificate-less public key cryptography in synergy with the restrictive partially blind signature technique to construct a secure and privacy-aware proxy mobile IPv6 (SP-PMIPv6) protocol for V2G networks. SP-PMIPv6 achieves low authentication latency while protecting the identity and location privacy of the mobile EV. We evaluate the SP-PMIPv6 protocol in terms of its authentication overhead and the information-theoretic uncertainty derived by the mutual information metric to show the high level of achieved anonymity
Privacy-Preserving Observation in Public Spaces
One method of privacy-preserving accounting or billing in cyber-physical systems, such as electronic toll collection or public transportation ticketing, is to have the user present an encrypted record of transactions and perform the accounting or billing computation securely on them. Honesty of the user is ensured by spot checking the record for some selected surveyed transactions. But how much privacy does that give the user, i.e. how many transactions need to be surveyed? It turns out that due to collusion in mass surveillance all transactions need to be observed, i.e. this method of spot checking provides no privacy at all. In this paper we present a cryptographic solution to the spot checking problem in cyber-physical systems. Users carry an authentication device that authenticates only based on fair random coins. The probability can be set high enough to allow for spot checking, but in all other cases privacy is perfectly preserved. We analyze our protocol for computational efficiency and show that it can be efficiently implemented even on plat- forms with limited computing resources, such as smart cards and smart phones
- …