EconPapers    
Economics at your fingertips  
 

Secure Plug-in Electric Vehicle (PEV) Charging in a Smart Grid Network

Khaled Shuaib, Ezedin Barka, Juhar Ahmed Abdella, Farag Sallabi, Mohammed Abdel-Hafez and Ala Al-Fuqaha
Additional contact information
Khaled Shuaib: College of Information Technology, The United Arab Emirates University, Sheik Khalifa Bin Zayed Street P.O. Box 15551, Al Ain, UAE
Ezedin Barka: College of Information Technology, The United Arab Emirates University, Sheik Khalifa Bin Zayed Street P.O. Box 15551, Al Ain, UAE
Juhar Ahmed Abdella: College of Information Technology, The United Arab Emirates University, Sheik Khalifa Bin Zayed Street P.O. Box 15551, Al Ain, UAE
Farag Sallabi: College of Information Technology, The United Arab Emirates University, Sheik Khalifa Bin Zayed Street P.O. Box 15551, Al Ain, UAE
Mohammed Abdel-Hafez: College of Engineering, The United Arab Emirates University, Sheik Khalifa Bin Zayed Street P.O. Box 15551, Al Ain, UAE
Ala Al-Fuqaha: Department of Computer Science, Western Michigan University, Kalamazoo, MI 49008, USA

Energies, 2017, vol. 10, issue 7, 1-23

Abstract: Charging of plug-in electric vehicles (PEVs) exposes smart grid systems and their users to different kinds of security and privacy attacks. Hence, a secure charging protocol is required for PEV charging. Existing PEV charging protocols are usually based on insufficiently represented and simplified charging models that do not consider the user’s charging modes (charging at a private location, charging as a guest user, roaming within one’s own supplier network or roaming within other suppliers’ networks). However, the requirement for charging protocols depends greatly on the user’s charging mode. Consequently, available solutions do not provide complete protocol specifications. Moreover, existing protocols do not support anonymous user authentication and payment simultaneously. In this paper, we propose a comprehensive end-to-end charging protocol that addresses the security and privacy issues in PEV charging. The proposed protocol uses nested signatures to protect users’ privacy from external suppliers, their own suppliers and third parties. Our approach supports anonymous user authentication, anonymous payment, as well as anonymous message exchange between suppliers within a hierarchical smart grid architecture. We have verified our protocol using the AVISPA software verification tool and the results showed that our protocol is secure and works as desired.

Keywords: electric vehicles; information security protocols; smart grid; privacy; energy charging (search for similar items in EconPapers)
JEL-codes: Q Q0 Q4 Q40 Q41 Q42 Q43 Q47 Q48 Q49 (search for similar items in EconPapers)
Date: 2017
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (2)

Downloads: (external link)
https://www.mdpi.com/1996-1073/10/7/1024/pdf (application/pdf)
https://www.mdpi.com/1996-1073/10/7/1024/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jeners:v:10:y:2017:i:7:p:1024-:d:105189

Access Statistics for this article

Energies is currently edited by Ms. Agatha Cao

More articles in Energies from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-24
Handle: RePEc:gam:jeners:v:10:y:2017:i:7:p:1024-:d:105189