Communication Reduced Interaction Protocol between Customer, Charging Station, and Charging Station Management System
Karl-Heinz Krempels, Christoph Terwelp, Stefan Wüller, Tilman Frosch, Sevket Gökay
2014
Abstract
The emerging build-ups of charging station infrastructures require sufficiently secure and economic authentication protocols. Existing protocols for the purpose of authenticating a customer against a charging station have the inherent disadvantage that they expect a network connection to the management system, produce a communication overhead, or might reveal sensitive customer data depending on the protocol. The protocol, provided by us, enables a multiple-operator customer-to-charging station authentication system. The particularity of the protocol is that it does not require a permanent network connection between charging stations and a corresponding management system, reduces the communication overhead between the involved entities, and protects sensitive customer data at a high rate.
References
- Andrew J. Blumberg and Peter Eckersley (2009). On locational privacy, and how to avoid losing it forever. Technical report, Electronic Frontier Foundation.
- Applebaum, J. (2013). https://github.com/ioerror/tlsdate.
- Delerablée, C. and Pointcheval, D. (2006). Dynamic fully anonymous short group signatures. In VIETCRYPT, pages 193-210.
- 3Bundesministerium für Wirtschaft und Technologie (BMWi) http://www.bmwi.de/
- Frosch, T., Schäge, S., Goll, M., and Holz, T. (2013). Improving location privacy for the electric vehicle masses. Technical Report TR-HGI-2013-001, Horst Görtz Institute for IT Security.
- ISO (2013). Road vehicles - Vehicle to grid communication interface. Technical Report ISO/IEC 15118-1, International Organization for Standardization, Geneva, Switzerland.
- Jager, T., Kohlar, F., Schäge, S., and Schwenk, J. (2012). On the security of TLS-DHE in the standard model. In Advances in Cryptology - CRYPTO.
- Leyden, J. (2013). Avg, avira and whatsapp pwned by hacktivists' dns hijack. http:// www.theregister.co.uk/2013/10/08/dns hijack attack spree/.
- Mathewson, N., Syverson, P., and Dingledine, R. (2004). Tor: the second-generation onion router. In Proc. USENIX Security Symp.
- OCPP Steering Group (2012). Open Charge Point Protocol. Technical Report 1.5, e-laad.nl.
- Tippenhauer, N. O., Pöpper, C., Rasmussen, K. B., and Capkun, S. (2011). On the requirements for successful gps spoofing attacks. In Proceedings of the 18th ACM conference on Computer and communications security, pages 75-86. ACM.
Paper Citation
in Harvard Style
Krempels K., Terwelp C., Wüller S., Frosch T. and Gökay S. (2014). Communication Reduced Interaction Protocol between Customer, Charging Station, and Charging Station Management System . In Proceedings of the 3rd International Conference on Smart Grids and Green IT Systems - Volume 1: SMARTGREENS, ISBN 978-989-758-025-3, pages 118-125. DOI: 10.5220/0004971801180125
in Bibtex Style
@conference{smartgreens14,
author={Karl-Heinz Krempels and Christoph Terwelp and Stefan Wüller and Tilman Frosch and Sevket Gökay},
title={Communication Reduced Interaction Protocol between Customer, Charging Station, and Charging Station Management System},
booktitle={Proceedings of the 3rd International Conference on Smart Grids and Green IT Systems - Volume 1: SMARTGREENS,},
year={2014},
pages={118-125},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004971801180125},
isbn={978-989-758-025-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 3rd International Conference on Smart Grids and Green IT Systems - Volume 1: SMARTGREENS,
TI - Communication Reduced Interaction Protocol between Customer, Charging Station, and Charging Station Management System
SN - 978-989-758-025-3
AU - Krempels K.
AU - Terwelp C.
AU - Wüller S.
AU - Frosch T.
AU - Gökay S.
PY - 2014
SP - 118
EP - 125
DO - 10.5220/0004971801180125