Communication Reduced Interaction Protocol between Customer, Charging Station, and Charging Station Management System

Karl-Heinz Krempels, Christoph Terwelp, Stefan Wüller, Tilman Frosch, Sevket Gökay

Abstract

The emerging build-ups of charging station infrastructures require sufficiently secure and economic authentication protocols. Existing protocols for the purpose of authenticating a customer against a charging station have the inherent disadvantage that they expect a network connection to the management system, produce a communication overhead, or might reveal sensitive customer data depending on the protocol. The protocol, provided by us, enables a multiple-operator customer-to-charging station authentication system. The particularity of the protocol is that it does not require a permanent network connection between charging stations and a corresponding management system, reduces the communication overhead between the involved entities, and protects sensitive customer data at a high rate.

References

  1. Andrew J. Blumberg and Peter Eckersley (2009). On locational privacy, and how to avoid losing it forever. Technical report, Electronic Frontier Foundation.
  2. Applebaum, J. (2013). https://github.com/ioerror/tlsdate.
  3. Delerablée, C. and Pointcheval, D. (2006). Dynamic fully anonymous short group signatures. In VIETCRYPT, pages 193-210.
  4. 3Bundesministerium für Wirtschaft und Technologie (BMWi) http://www.bmwi.de/
  5. Frosch, T., Schäge, S., Goll, M., and Holz, T. (2013). Improving location privacy for the electric vehicle masses. Technical Report TR-HGI-2013-001, Horst Görtz Institute for IT Security.
  6. ISO (2013). Road vehicles - Vehicle to grid communication interface. Technical Report ISO/IEC 15118-1, International Organization for Standardization, Geneva, Switzerland.
  7. Jager, T., Kohlar, F., Schäge, S., and Schwenk, J. (2012). On the security of TLS-DHE in the standard model. In Advances in Cryptology - CRYPTO.
  8. Leyden, J. (2013). Avg, avira and whatsapp pwned by hacktivists' dns hijack. http:// www.theregister.co.uk/2013/10/08/dns hijack attack spree/.
  9. Mathewson, N., Syverson, P., and Dingledine, R. (2004). Tor: the second-generation onion router. In Proc. USENIX Security Symp.
  10. OCPP Steering Group (2012). Open Charge Point Protocol. Technical Report 1.5, e-laad.nl.
  11. Tippenhauer, N. O., Pöpper, C., Rasmussen, K. B., and Capkun, S. (2011). On the requirements for successful gps spoofing attacks. In Proceedings of the 18th ACM conference on Computer and communications security, pages 75-86. ACM.
Download


Paper Citation


in Harvard Style

Krempels K., Terwelp C., Wüller S., Frosch T. and Gökay S. (2014). Communication Reduced Interaction Protocol between Customer, Charging Station, and Charging Station Management System . In Proceedings of the 3rd International Conference on Smart Grids and Green IT Systems - Volume 1: SMARTGREENS, ISBN 978-989-758-025-3, pages 118-125. DOI: 10.5220/0004971801180125


in Bibtex Style

@conference{smartgreens14,
author={Karl-Heinz Krempels and Christoph Terwelp and Stefan Wüller and Tilman Frosch and Sevket Gökay},
title={Communication Reduced Interaction Protocol between Customer, Charging Station, and Charging Station Management System},
booktitle={Proceedings of the 3rd International Conference on Smart Grids and Green IT Systems - Volume 1: SMARTGREENS,},
year={2014},
pages={118-125},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004971801180125},
isbn={978-989-758-025-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Conference on Smart Grids and Green IT Systems - Volume 1: SMARTGREENS,
TI - Communication Reduced Interaction Protocol between Customer, Charging Station, and Charging Station Management System
SN - 978-989-758-025-3
AU - Krempels K.
AU - Terwelp C.
AU - Wüller S.
AU - Frosch T.
AU - Gökay S.
PY - 2014
SP - 118
EP - 125
DO - 10.5220/0004971801180125