Babu et al., 2022 - Google Patents
EV-Auth: Lightweight authentication protocol suite for dynamic charging system of electric vehicles with seamless handoverBabu et al., 2022
- Document ID
- 8884102580116693599
- Author
- Babu P
- Reddy A
- Palaniswamy B
- Kommuri S
- Publication year
- Publication venue
- IEEE Transactions on Intelligent Vehicles
External Links
Snippet
Electric vehicle adoption has accelerated globally, necessitating the development of an efficient charging technology. Static and partially dynamic charging are currently in use, but such types of charging reduce vehicles' ability to stand charge, contributing to range anxiety …
- 238000004891 communication 0 abstract description 23
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T10/00—Road transport of goods or passengers
- Y02T10/60—Other road transportation technologies with climate change mitigation effect
- Y02T10/70—Energy storage for electromobility
- Y02T10/7005—Batteries
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/04—Key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cui et al. | An efficient and safe road condition monitoring authentication scheme based on fog computing | |
Wazid et al. | AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment | |
CN111372248B (en) | Efficient anonymous identity authentication method in Internet of vehicles environment | |
Li et al. | EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks | |
Garg et al. | An efficient blockchain-based hierarchical authentication mechanism for energy trading in V2G environment | |
Vijayakumar et al. | Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks | |
Babu et al. | EV-Auth: Lightweight authentication protocol suite for dynamic charging system of electric vehicles with seamless handover | |
Feng et al. | P2BA: A privacy-preserving protocol with batch authentication against semi-trusted RSUs in vehicular ad hoc networks | |
Chuang et al. | TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks | |
Eddine et al. | EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles | |
Wang et al. | A novel lightweight authentication protocol for emergency vehicle avoidance in VANETs | |
Qi et al. | A privacy-preserving authentication and pseudonym revocation scheme for VANETs | |
Liu et al. | Bua: A blockchain-based unlinkable authentication in vanets | |
Kang et al. | Highly efficient randomized authentication in VANETs | |
Babu et al. | Robust authentication protocol for dynamic charging system of electric vehicles | |
Limbasiya et al. | Iovcom: Reliable comprehensive communication system for internet of vehicles | |
Nandy et al. | An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network | |
CN110022542A (en) | A kind of anonymous authentication method of the modified based on condition secret protection | |
CN107493165B (en) | Internet of vehicles authentication and key agreement method with strong anonymity | |
Babu et al. | EV-PUF: Lightweight security protocol for dynamic charging system of electric vehicles using physical unclonable functions | |
Wang et al. | A practical authentication framework for VANETs | |
Jiang et al. | No one can track you: Randomized authentication in vehicular ad-hoc networks | |
Abdelfatah et al. | Secure VANET authentication protocol (SVAP) using Chebyshev chaotic maps for emergency conditions | |
Liu et al. | PTAP: A novel secure privacy-preserving & traceable authentication protocol in VANETs | |
Huang et al. | PTVC: Achieving privacy-preserving trust-based verifiable vehicular cloud computing |