scholarly journals IoT and Blockchain Paradigms for EV Charging System

Energies ◽  
2019 ◽  
Vol 12 (15) ◽  
pp. 2987 ◽  
Author(s):  
Jose P. Martins ◽  
Joao C. Ferreira ◽  
Vitor Monteiro ◽  
Jose A. Afonso ◽  
Joao L. Afonso

In this research work, we apply the Internet of Things (IoT) paradigm with a decentralized blockchain approach to handle the electric vehicle (EV) charging process in shared spaces, such as condominiums. A mobile app handles the user authentication mechanism to initiate the EV charging process, where a set of sensors are used for measuring energy consumption, and based on a microcontroller, establish data communication with the mobile app. A blockchain handles financial transitions, and this approach can be replicated to other EV charging scenarios, such as public charging systems in a city, where the mobile device provides an authentication mechanism. A user interface was developed to visualize transactions, gather users’ preferences, and handle power charging limitations due to the usage of a shared infrastructure. The developed approach was tested in a shared space with three EVs using a charging infrastructure for a period of 3.5 months.

2019 ◽  
Vol 48 (1) ◽  
pp. 14-22
Author(s):  
Krishna Prakasha ◽  
Balachandra Muniyal ◽  
Vasundhara Acharya

Purpose The purpose of the study is to develop a secure, efficient, and enhanced user authentication mechanism to achieve reliable and authenticated connection. In online transactions, users and resources are located at different places, and the sensitive information is to be protected and transferred using the suitable, reliable mechanism. Design/methodology/approach One of the latest approach to handle the requirement is by a Public Key Infrastructure (PKI) or its variant Wireless Public Key Infrastructure (WPKI). Fundamental management techniques are required to be very secure and vital since they are one of the points of attack in public key cryptosystem. Entity authentication and key agreement (AKA) is a critical cryptographic problem in wireless communication, where a mutual entity authentication plays a vital role in the establishment of the secure and authentic connection. This paper proposes an efficient and enhanced AKA scheme (EAKA) with the end-to-end security and verifies the proposed system for protection using automated validation of internet security protocols and applications. An efficient way for the implementation of an enhanced version of the protocol is proposed using a lattice-based cryptographic algorithm. Findings The time consumed for the proposed research work shows that it is practical and acceptable. Originality/value The proposed research work is an efficient and enhanced user authentication mechanism.


Energies ◽  
2021 ◽  
Vol 14 (20) ◽  
pp. 6723
Author(s):  
Mike F. Voss ◽  
Steven P. Haveman ◽  
Gerrit Maarten Bonnema

Current electric vehicle (EV) charging systems have limited smart functionality, and most research focuses on load-balancing the national or regional grid. In this article, we focus on supporting the early design of a smart charging system that can effectively and efficiently charge a company’s EV fleet, maximizing the use of self-generated Photo-Voltaic energy. The support takes place in the form of the Vehicle Charging Simulation (VeCS) model. System performance is determined by operational costs, CO2 emissions and employee satisfaction. Two impactful smart charging functions concern adaptive charging speeds and charging point management. Simulation algorithms for these functions are developed. The VeCS model is developed to simulate implementation of a smart charging system incorporating both charging infrastructure and local Photo-Voltaics input, using a company’s travel and energy data, prior to having the EVs in place. The model takes into account travel behaviour, energy input and energy consumption on a daily basis. The model shows the number of charged vehicles, whether incomplete charges occur, and energy flow during the day. The model also facilitates simulation of an entire year to determine overall cost and emission benefits. It also estimates charging costs and CO2 emissions that can be compared to the non-EV situation. With the VeCS model, the impact of various system design and implementation choices can be explored before EVs are used. Two system designs are proposed for the case company; a short-term version with current technology and a future version with various smart functionalities. Overall, the model can contribute to substantiated advice for a company regarding implementation of charging infrastructure.


With the widespread popularity of the Internet of Things (IoT), different sectors-based applications are increasingly developed. One of the most popular application layer protocols is the Constrained Application Protocol (CoAP), and the necessity of ensuring data security in this layer is crucial. Moreover, attackers target the vulnerabilities of IoT to gain access to the system, which leads to a security threat and violate privacy. Typically, user authentication and data encryption are applied for securing data communication over a public channel between two or more participants. However, most of the existing solutions use cryptography for achieving security, with the exception of high computation cost. Hence, these solutions fail to satisfy the resource-constrained characteristics of IoT devices. Therefore, a lightweight security mechanism is required for achieving both secure transmission and better performance. This paper proposes a Lightweight Authentication with Two-way Encryption for Secure Transmission in CoAP Protocol (LATEST) that provides a secure transmission between the server and IoT devices. This mutual authentication mechanism uses ROT 18 Cipher with XoR operation and 128-bit AES based encryption for securing the data transmission. The ROT18 Cipher is a monoalphabetic substitution cipher, which is a combination of ROT13 and ROT5. The proposed scheme employs symmetric encryption in both client and server for ensuring secure authentication and mutually confirm each other identity. In addition, the proposed LATEST scheme ensures confidentiality and integrity by being resistant to replay attacks, impersonation attacks, and modification attacks. The experimental evaluation demonstrates that the proposed LATEST scheme is lightweight and provides better security compared to the existing scheme.


Energies ◽  
2019 ◽  
Vol 12 (15) ◽  
pp. 2858 ◽  
Author(s):  
Tobias Rodemann ◽  
Tom Eckhardt ◽  
René Unger ◽  
Torsten Schwan

The development of efficient electric vehicle (EV) charging infrastructure requires a modeling of customer behavior at an appropriate level of detail. Since only limited information about real customers is available, most simulation approaches employ a stochastic approach by combining known or estimated customer features with random variations. A typical example is to model EV charging customers by an arrival and a targeted departure time, plus the requested amount of energy or increased state of charge (SoC), where values are drawn from normal (Gaussian) distributions with mean and variance values derived from user studies of obviously limited sample size. In this work, we compare this basic approach with a more detailed customer model employing a multi-agent simulation (MAS) framework in order to investigate how a customer behavior that responds to external factors (like weather) or historical data (like satisfaction in past charging sessions) impacts the essential key performance indicators of the charging system. Our findings show that small changes in the way customers are modeled can lead to quantitative and qualitative differences in the simulated performance of EV charging systems.


2021 ◽  
Vol 2 (2) ◽  
pp. 1-21
Author(s):  
Hossam ElHussini ◽  
Chadi Assi ◽  
Bassam Moussa ◽  
Ribal Atallah ◽  
Ali Ghrayeb

With the growing market of Electric Vehicles (EV), the procurement of their charging infrastructure plays a crucial role in their adoption. Within the revolution of Internet of Things, the EV charging infrastructure is getting on board with the introduction of smart Electric Vehicle Charging Stations (EVCS), a myriad set of communication protocols, and different entities. We provide in this article an overview of this infrastructure detailing the participating entities and the communication protocols. Further, we contextualize the current deployment of EVCSs through the use of available public data. In the light of such a survey, we identify two key concerns, the lack of standardization and multiple points of failures, which renders the current deployment of EV charging infrastructure vulnerable to an array of different attacks. Moreover, we propose a novel attack scenario that exploits the unique characteristics of the EVCSs and their protocol (such as high power wattage and support for reverse power flow) to cause disturbances to the power grid. We investigate three different attack variations; sudden surge in power demand, sudden surge in power supply, and a switching attack. To support our claims, we showcase using a real-world example how an adversary can compromise an EVCS and create a traffic bottleneck by tampering with the charging schedules of EVs. Further, we perform a simulation-based study of the impact of our proposed attack variations on the WSCC 9 bus system. Our simulations show that an adversary can cause devastating effects on the power grid, which might result in blackout and cascading failure by comprising a small number of EVCSs.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Secure and efficient authentication mechanism becomes a major concern in cloud computing due to the data sharing among cloud server and user through internet. This paper proposed an efficient Hashing, Encryption and Chebyshev HEC-based authentication in order to provide security among data communication. With the formal and the informal security analysis, it has been demonstrated that the proposed HEC-based authentication approach provides data security more efficiently in cloud. The proposed approach amplifies the security issues and ensures the privacy and data security to the cloud user. Moreover, the proposed HEC-based authentication approach makes the system more robust and secured and has been verified with multiple scenarios. However, the proposed authentication approach requires less computational time and memory than the existing authentication techniques. The performance revealed by the proposed HEC-based authentication approach is measured in terms of computation time and memory as 26ms, and 1878bytes for 100Kb data size, respectively.


Energies ◽  
2018 ◽  
Vol 11 (7) ◽  
pp. 1869 ◽  
Author(s):  
Alexandre Lucas ◽  
Giuseppe Prettico ◽  
Marco Flammini ◽  
Evangelos Kotsakis ◽  
Gianluca Fulli ◽  
...  

Electric vehicle (EV) charging infrastructure rollout is well under way in several power systems, namely North America, Japan, Europe, and China. In order to support EV charging infrastructures design and operation, little attempt has been made to develop indicator-based methods characterising such networks across different regions. This study defines an assessment methodology, composed by eight indicators, allowing a comparison among EV public charging infrastructures. The proposed indicators capture the following: energy demand from EVs, energy use intensity, charger’s intensity distribution, the use time ratios, energy use ratios, the nearest neighbour distance between chargers and availability, the total service ratio, and the carbon intensity as an environmental impact indicator. We apply the methodology to a dataset from ElaadNL, a reference smart charging provider in The Netherlands, using open source geographic information system (GIS) and R software. The dataset reveals higher energy intensity in six urban areas and that 50% of energy supplied comes from 19.6% of chargers. Correlations of spatial density are strong and nearest neighbouring distances range from 1101 to 9462 m. Use time and energy use ratios are 11.21% and 3.56%. The average carbon intensity is 4.44 gCO2eq/MJ. Finally, the indicators are used to assess the impact of relevant public policies on the EV charging infrastructure use and roll-out.


Sign in / Sign up

Export Citation Format

Share Document