版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:Univ Washington Dept Elect & Comp Engn Network Secur Lab Seattle WA 98195 USA Univ Padua Dept Math I-35121 Padua Italy
出 版 物:《IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING》 (IEEE Trans. Dependable Secure Comput.)
年 卷 期:2025年第22卷第3期
页 面:2492-2504页
核心收录:
学科分类:0808[工学-电气工程] 08[工学] 0835[工学-软件工程] 0812[工学-计算机科学与技术(可授工学、理学学位)]
基 金:European Union through the National Recovery and Resilience Plan (NRRP), Mission 4 Component 2 Investment 1.3 of Italian Ministry of University and Research NextGenerationEU [341, PE00000014, CUP D43C22003050001] Project "SEcurity and RIghts in the CyberSpace (SERICS)-Spoke 7 Infrastructure Security-Visible Light Communication for Secure Vehicle-to-Everything Communication-VisiCar" Beneficiary's [CUP C99J2400025000]
主 题:Protocols Authentication Security Vehicle dynamics Privacy Cryptography Hash functions Vehicular ad hoc networks Public key Mathematical models dynamic charging electric vehicle identity-based cryptography privacy protocol security
摘 要:Dynamic wireless power transfer provides a means for charging Electric Vehicles (EVs) while driving, avoiding stopping to charge and hence fostering their widespread adoption. Researchers have devoted much effort over the last decade to providing a reliable infrastructure for potential users to improve their comfort and time management. Due to the severe security and performance system requirements, the different schemes proposed in the last years lack a unified protocol involving the modern architecture model with merged authentication and billing processes. Furthermore, they require the continuous interaction of the trusted entity during the process, increasing the delay in communication and reducing security due to a large number of message exchanges. This article proposes a secure, computationally lightweight, unified protocol for fast authentication and billing that provides on-demand dynamic charging to deal with all the computational and security comprehensively with additional usability for the customers. The protocol employs an ID-based public encryption scheme to manage mutual authentication and pseudonyms to preserve the user s identity across multiple charging processes. Compared to state-of-the-art authentication protocols, our proposal provides on-demand service and public critical infrastructure security without impacting performances with around 7 ms, close to the most straightforward scheme available.