4.7 Article

Robust Authentication Protocol for Dynamic Charging System of Electric Vehicles

Journal

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Volume 70, Issue 11, Pages 11338-11351

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TVT.2021.3116279

Keywords

Authentication; Security; Protocols; Vehicle dynamics; Electric vehicle charging; Privacy; Charging stations; Authentication; key agreement; electric vehicles; dynamic charging; security; privacy

Funding

  1. National Institute of Technology Andhra Pradesh
  2. Ministry of Education, India
  3. Basic Science Research Program through the National Research Foundation of Korea (NRF) - Ministry of Education [2020R1I1A3058605]
  4. National Research Foundation of Korea [2020R1I1A3058605] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)

Ask authors/readers for more resources

This article discusses the importance of authentication mechanisms for charging electric vehicles and proposes a new protocol suitable for charging electric vehicles while driving in the future. The proposed protocol utilizes secure and lightweight algorithms, ensuring the security and reliability of communication.
Electric vehicles have emerged as the future of transport worldwide with the rising need for greener and energy-efficient transportation solutions. This remarkable shift delegated a wide variety of protocols for reliable, scalable and secure communications in the electric vehicle transportation system. With this vision in mind, security researchers have proposed diverse authentication protocols vital for the electric vehicle charging system to protect the information exchanged between the various principals involved. Several existing authentication techniques, on the other hand, are either vulnerable to significant security threats or are limited to static charging. This article proposes a robust authentication mechanism for charging electric vehicles while driving, a scenario that is rapidly approaching in the future. The proposed protocol makes use of secure and lightweight primitives such as elliptic curves and hash functions. The proposed protocol's security is being analyzed to demonstrate that it is capable of withstanding relevant attacks. Additionally, the protocol achieves its objectives at a cost that is practically conceivable in terms of transmission and computing.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available