Ad Hoc Networks. 6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papers

Research Article

Security and Privacy-Preserving Mechanism for Aggregator Based Vehicle-to-Grid Network

Download
474 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-13329-4_7,
        author={Binod Vaidya and Dimitrios Makrakis and Hussein Mouftah},
        title={Security and Privacy-Preserving Mechanism for Aggregator Based Vehicle-to-Grid Network},
        proceedings={Ad Hoc Networks. 6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papers},
        proceedings_a={ADHOCNETS},
        year={2014},
        month={11},
        keywords={},
        doi={10.1007/978-3-319-13329-4_7}
    }
    
  • Binod Vaidya
    Dimitrios Makrakis
    Hussein Mouftah
    Year: 2014
    Security and Privacy-Preserving Mechanism for Aggregator Based Vehicle-to-Grid Network
    ADHOCNETS
    Springer
    DOI: 10.1007/978-3-319-13329-4_7
Binod Vaidya1,*, Dimitrios Makrakis1,*, Hussein Mouftah1,*
  • 1: University of Ottawa
*Contact email: bvaidya@eecs.uottawa.ca, dimitris@eecs.uottawa.ca, mouftah@eecs.uottawa.ca

Abstract

Electrification is foremost actor in superseding internal combustion engine vehicles with electric vehicles (EV). The EV technology will lead to fundamental shift in existing power grid as well as transportation systems. In Smart grid, EVs play vital roles to reduce dependence on fossil fuel, in turn, minimize green house gas emissions. In Vehicle-to-Grid (V2G) network, EVs communicate with power grid operators to trade demand response services by delivering stored electricity into the electric power grid. Communication between aggregator and EVs is central for such an approach. Viewing security and privacy requirements for V2G communications, privacy-preserving technique is central for efficacious V2G network implementation. In this paper, we have proposed effective security and privacy-preserving mechanism for aggregator based V2G network, which is built on ECC-based restrictive partially blind signature. We have provided security analysis and shown that the proposed mechanism is efficient than existing ones in terms of computational overheads.