[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Babu et al., 2022 - Google Patents

EV-Auth: Lightweight authentication protocol suite for dynamic charging system of electric vehicles with seamless handover

Babu et al., 2022

Document ID
8884102580116693599
Author
Babu P
Reddy A
Palaniswamy B
Kommuri S
Publication year
Publication venue
IEEE Transactions on Intelligent Vehicles

External Links

Snippet

Electric vehicle adoption has accelerated globally, necessitating the development of an efficient charging technology. Static and partially dynamic charging are currently in use, but such types of charging reduce vehicles' ability to stand charge, contributing to range anxiety …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/70Energy storage for electromobility
    • Y02T10/7005Batteries
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/04Key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks

Similar Documents

Publication Publication Date Title
Cui et al. An efficient and safe road condition monitoring authentication scheme based on fog computing
Wazid et al. AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment
CN111372248B (en) Efficient anonymous identity authentication method in Internet of vehicles environment
Li et al. EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks
Garg et al. An efficient blockchain-based hierarchical authentication mechanism for energy trading in V2G environment
Vijayakumar et al. Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks
Babu et al. EV-Auth: Lightweight authentication protocol suite for dynamic charging system of electric vehicles with seamless handover
Feng et al. P2BA: A privacy-preserving protocol with batch authentication against semi-trusted RSUs in vehicular ad hoc networks
Chuang et al. TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks
Eddine et al. EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles
Wang et al. A novel lightweight authentication protocol for emergency vehicle avoidance in VANETs
Qi et al. A privacy-preserving authentication and pseudonym revocation scheme for VANETs
Liu et al. Bua: A blockchain-based unlinkable authentication in vanets
Kang et al. Highly efficient randomized authentication in VANETs
Babu et al. Robust authentication protocol for dynamic charging system of electric vehicles
Limbasiya et al. Iovcom: Reliable comprehensive communication system for internet of vehicles
Nandy et al. An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network
CN110022542A (en) A kind of anonymous authentication method of the modified based on condition secret protection
CN107493165B (en) Internet of vehicles authentication and key agreement method with strong anonymity
Babu et al. EV-PUF: Lightweight security protocol for dynamic charging system of electric vehicles using physical unclonable functions
Wang et al. A practical authentication framework for VANETs
Jiang et al. No one can track you: Randomized authentication in vehicular ad-hoc networks
Abdelfatah et al. Secure VANET authentication protocol (SVAP) using Chebyshev chaotic maps for emergency conditions
Liu et al. PTAP: A novel secure privacy-preserving & traceable authentication protocol in VANETs
Huang et al. PTVC: Achieving privacy-preserving trust-based verifiable vehicular cloud computing