Next Article in Journal
Improving RF Fingerprinting Methods by Means of D2D Communication Protocol
Next Article in Special Issue
SURROGATES: Virtual OBUs to Foster 5G Vehicular Services
Previous Article in Journal
Design of Voltage Mode Electronically Tunable First Order All Pass Filter in ±0.7 V 16 nm CNFET Technology
Previous Article in Special Issue
Tracking and Monitoring System Based on LoRa Technology for Lightweight Boats
Open AccessArticle

Certificate Based Security Mechanisms in Vehicular Ad-Hoc Networks based on IEC 61850 and IEEE WAVE Standards

1
Department of Computer Science and Engineering, YSR Engineering College, Yogi Vemana University, Andhra Pradesh 516360, India
2
Fukushima Renewable Energy Institute, AIST (FREA), Koriyama 963-0215, Japan
*
Author to whom correspondence should be addressed.
Electronics 2019, 8(1), 96; https://doi.org/10.3390/electronics8010096
Received: 13 November 2018 / Revised: 7 January 2019 / Accepted: 10 January 2019 / Published: 15 January 2019
(This article belongs to the Special Issue Smart, Connected and Efficient Transportation Systems)
When equipped with an on-board wireless kit, electric vehicles (EVs) can communicate with nearby entities, e.g., road side units (RSUs), via a vehicle ad-hoc network (VANET). More observability enables smart charging algorithms where charging stations (CSs) are allocated to EVs based on their current state of charge, destination, and urgency to charge. IEEE 1609 WAVE standard regulates VANETs, while IEC 61850 is emerging as the smart grid communication standard. In order to integrate these two domains of energy management, past research has focused on harmonizing these two standards for a full smart city solution. However, this solution requires very sensitive data to be transmitted, such as ownership of EV, owners’ personal details, and driving history. Therefore, data security in these networks is of prime concern and needs to be addressed. In this paper, different security mechanisms defined by the IEEE 1609 WAVE standard are applied for both vehicle-to-infrastructure (V2I) and vehicle-to-grid (V2G) communication. The former relates to EV–RSU, while the latter covers EV–CS communication. The implicit and explicit certificate mechanism processes proposed in IEEE 1609 WAVE for authentication are studied in great detail. Furthermore, a performance evaluation for these mechanisms is presented in terms of total time lapse for authentication, considering both the computational time and communication time delays. These results are very important in understanding the extra latency introduced by security mechanisms. Considering that VANETs may be volatile and may disappear as EVs drive away, overall timing performance becomes vital for operation. Reported results show the magnitude of this impact and compare different security mechanisms. These can be utilized to further develop VANET security approaches based on available time and the required security level. View Full-Text
Keywords: electric vehicle (EV); road side unit (RSU); V2G; V2I; implicit and explicit certificate mechanisms; cybersecurity in smart grids electric vehicle (EV); road side unit (RSU); V2G; V2I; implicit and explicit certificate mechanisms; cybersecurity in smart grids
Show Figures

Graphical abstract

MDPI and ACS Style

Farooq, S.M.; Hussain, S.M.S.; Kiran, S.; Ustun, T.S. Certificate Based Security Mechanisms in Vehicular Ad-Hoc Networks based on IEC 61850 and IEEE WAVE Standards. Electronics 2019, 8, 96.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop