Privacy preservation for V2G networks in smart grid: A survey

نویسندگان

  • Wenlin Han
  • Yang Xiao
چکیده

Vehicle to grid (V2G) network is a crucial part of smart grid. An electric vehicle (EV) in a V2G network uses electricity instead of gasoline, and this benefits the environment and helps mitigate the energy crisis. By using its battery capacity, the vehicle can serve temporarily as a distributed energy storage system to mitigate peak load of the power grid. However, the two-way communication and power flows not only facilitate the functionality of V2G network, but they also facilitate attackers as well. Privacy is now a big obstacle in the way of the development of V2G networks. The privacy preservation problem in V2G networks could be more severe than in other parts of Smart Grid due to its e-mobility. In this paper, we will analyze and summarize privacy preservation approaches which achieve various privacy preservation goals. We will survey research works, based on existing privacy preservation techniques, which address various privacy preservation problems in V2G networks, including anonymous authentication, location privacy, identification privacy, concealed data aggregation, privacy-preserving billing and payment, and privacy-preserving data publication. These techniques include homomorphic encryption, blind signature, group signature, ring signature, third party anonymity, and anonymity networks. We will summarize solved problems and issues of these techniques, and introduce possible solutions for unsolved problems. © 2016 Elsevier B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IP2DM: integrated privacy-preserving data management architecture for smart grid V2G networks

With the development of battery vehicles, vehicle-to-grid (V2G) networks are becoming more and more important in smart grid. Although battery vehicles are environmentally friendly and flexible to use two-way communication and two-way electricity flow, they also raise privacy-preservation challenges, such as location and movement privacy. On the one hand, utility companies have to monitor the gr...

متن کامل

State of the Art Authentication, Access Control, and Secure Integration in Smart Grid

The smart grid (SG) is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications...

متن کامل

Enabling Privacy in Vehicle-to-Grid Interactions for Battery Recharging

The diffusion of Electric Vehicles (EV) fostered by the evolution of the power system towards the new concept of Smart Grid introduces several technological challenges related to the synergy among electricity-propelled vehicle fleets and the energy grid ecosystem. EVs promise to reduce carbon emissions by exploiting Renewable Energy Sources (RESes) for battery recharge, and could potentially se...

متن کامل

A Triple State Time Variant Cost Function Unit Commitment with Significant Vehicle to Grid Penetration

Hastening the power industry toward smart operation juxtaposed with the unrivaled restructuring and privatization agendas, some of the ubiquitous smart grid advantages are glanced more and more. Recently, the vehicle to grid (V2G) technology, as one of these beneficial aspects, has found a worldwide attention due to its important advantages. The V2G technology can raise the system operation eff...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Communications

دوره 91-92  شماره 

صفحات  -

تاریخ انتشار 2016