A Secure Solution of V2G Communication Based on Trusted Computing

被引:0
|
作者
Wang, Shuai [1 ]
Wang, Baoyi [1 ]
Zhang, Shaomin [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Baoding, Peoples R China
关键词
V2G; trusted computing; electric vehicles' communication; routing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Aiming at the security problems existing in the communication process of electric vehicles in V2G networks, we propose a secure solution of V2G communication based on trusted computing. The electric vehicle communication is divided into two scenarios, including V2G communication outside the coverage of the aggregation and V2G communication within the coverage of the aggregation. V2G communication outside the coverage area of the aggregation uses onion routing technology toto construct an anonymous communication link. And through the embedded trusted computing module to assist in the selection of the communication intermediate node, combined with the signcryption technology to complete the signature and encryption of the communication message. The V2G communication within the coverage of the aggregation completes the mutual authentication of the two parties through the embedded trusted computing module to ensure the trusted connection between them. The safety assessment of related technologies proves that the scheme can meet the security required for electric vehicles' communication.
引用
收藏
页码:98 / 102
页数:5
相关论文
共 50 条
  • [41] Possible Hardware Architectures for Power Line Communication in Automotive V2G Applications
    Ramasamy D.
    [J]. Journal of The Institution of Engineers (India): Series B, 2023, 104 (03) : 813 - 819
  • [42] Bidirectional Power Transfer Control Based on V2G concept
    Shi Rui
    Chi Zhong
    Chen Yanxia
    Li Zhou
    [J]. 2014 IEEE PES ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (IEEE PES APPEEC), 2014,
  • [43] Charging and discharging strategies for electric vehicles based on V2G
    Tian, Shihui
    Hua, Guowei
    [J]. 2015 INTERNATIONAL CONFERENCE ON LOGISTICS, INFORMATICS AND SERVICE SCIENCES (LISS), 2015,
  • [44] Investigation of V2G Economical Viability
    Almehizia, Abdullah. A.
    Snodgrass, J. M.
    [J]. 2018 IEEE TEXAS POWER AND ENERGY CONFERENCE (TPEC), 2018,
  • [45] Fuzzy Logic based Frequency Control by V2G Aggregators
    Datta, Manoj
    [J]. 2014 IEEE 5TH INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS FOR DISTRIBUTED GENERATION SYSTEMS (PEDG), 2014,
  • [46] A novel Pricing Policy for G2V and V2G Services
    Abd Eldjalil, Chekired Djabir
    Said, Dhaou
    Khoukhi, Lyes
    Mouftah, Hussein T.
    [J]. 2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 634 - 635
  • [47] Seal-based secure boot scheme for trusted computing platform
    Song C.
    Peng W.-P.
    Xin Y.
    Luo S.-S.
    Zhu H.-L.
    [J]. Journal of China Universities of Posts and Telecommunications, 2010, 17 (SUPPL. 2): : 16 - 21
  • [48] The V2G Process With the Predictive Model
    Mroczek, Bartlomiej
    Kolodynska, Amanda
    [J]. IEEE ACCESS, 2020, 8 : 86947 - 86956
  • [49] Efficient and Secure Multi-Signature Scheme Based on Trusted Computing
    HAO Liming1
    2.School of Information Security Engineering
    [J]. Wuhan University Journal of Natural Sciences, 2008, (02) : 180 - 184
  • [50] The Impact of V2G on Power Factors
    Chukwu, Uwakwe C.
    [J]. 2020 CLEMSON UNIVERSITY POWER SYSTEMS CONFERENCE (PSC), 2020,