A Secure Solution of V2G Communication Based on Trusted Computing

被引:0
|
作者
Wang, Shuai [1 ]
Wang, Baoyi [1 ]
Zhang, Shaomin [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Baoding, Peoples R China
关键词
V2G; trusted computing; electric vehicles' communication; routing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Aiming at the security problems existing in the communication process of electric vehicles in V2G networks, we propose a secure solution of V2G communication based on trusted computing. The electric vehicle communication is divided into two scenarios, including V2G communication outside the coverage of the aggregation and V2G communication within the coverage of the aggregation. V2G communication outside the coverage area of the aggregation uses onion routing technology toto construct an anonymous communication link. And through the embedded trusted computing module to assist in the selection of the communication intermediate node, combined with the signcryption technology to complete the signature and encryption of the communication message. The V2G communication within the coverage of the aggregation completes the mutual authentication of the two parties through the embedded trusted computing module to ensure the trusted connection between them. The safety assessment of related technologies proves that the scheme can meet the security required for electric vehicles' communication.
引用
收藏
页码:98 / 102
页数:5
相关论文
共 50 条
  • [1] A dynamic anonymous authentication scheme with trusted fog computing in V2G networks
    Huang, Wenhua
    Du, Hongyuan
    Feng, Jingyu
    Han, Gang
    Zhang, Wenbo
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 79
  • [2] A Secure and Privacy-Preserving Communication Protocol for V2G Networks
    Tseng, Huei-Ru
    [J]. 2012 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2012,
  • [3] Information and Communication Technology Solution for the V2G Concept Implementation
    Santos, Victor D. N.
    Trovao, Joao P.
    Branco, Telmo P.
    Goncalves, Jose M. R.
    [J]. 2014 IEEE VEHICLE POWER AND PROPULSION CONFERENCE (VPPC), 2014,
  • [4] Secure and Efficient V2G Scheme through Edge Computing and Federated Learning
    Shang, Yitong
    Li, Zekai
    Shao, Ziyun
    Jian, Linni
    [J]. 2022 4TH INTERNATIONAL CONFERENCE ON SMART POWER & INTERNET ENERGY SYSTEMS, SPIES, 2022, : 2250 - 2255
  • [5] Privacy-friendly and efficient secure communication framework for V2G networks
    He, Daojing
    Chan, Sammy
    Guizani, Mohsen
    [J]. IET COMMUNICATIONS, 2018, 12 (03) : 304 - 309
  • [6] A Secure Communication Protocol with Privacy-Preserving Monitoring and Controllable Linkability for V2G
    Jiang, Rong
    Lu, Rongxing
    Lai, Chengzhe
    Li, Aiping
    [J]. 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016), 2016, : 567 - 572
  • [7] TEST SOLUTION TARGETS V2G
    Iguchi, Takemi
    [J]. EE: Evaluation Engineering, 2019, 58 (12): : 25 - 27
  • [8] A secure bootstrap based on trusted computing
    Gu, Junkai
    Ji, Weiyong
    [J]. 2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 502 - 504
  • [9] Secure and Membership-Based Data Sharing Scheme in V2G Networks
    Shen, Gang
    Su, Yixin
    Zhang, Mingwu
    [J]. IEEE ACCESS, 2018, 6 : 58450 - 58460
  • [10] A secure IoT and edge computing based EV selection model in V2G systems using ant colony optimization algorithm
    Anjinappa, Gopinath
    Prabhakar, Divakar Bangalore
    [J]. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2022,