Electric vehicles (EVs) are an emerging type of mobile intelligent power consumption devices in Smart Grid as new green transport tools. In order to provide a powerful automation and intelligence support for wide area...Electric vehicles (EVs) are an emerging type of mobile intelligent power consumption devices in Smart Grid as new green transport tools. In order to provide a powerful automation and intelligence support for wide area electric vehicles energy service network, we analyze the network infrastructure and communications demands of various terminals, devices and monitoring systems distributed in wide area electric vehicle energy service network. According to interactive user services scenarios and energy operations intelligent monitoring, we propose multimode communication integration architecture for wide area electric vehicle energy service network by means of the fusion of the Internet of Things (IoT) technology. Then, we design different networking schemes in access networks and backbone transmission networks meeting multi-scene and multi-operation interaction requirements. The networking schemes will provide efficient technical support to implement intelligent, cross-regional, interactive energy services for electric vehicle users.展开更多
Ubiquitous information exchange is achieved among connected vehicles through the increasingly smart environment.The concept of conventional vehicular ad hoc network is gradually transformed into the Internet of vehicl...Ubiquitous information exchange is achieved among connected vehicles through the increasingly smart environment.The concept of conventional vehicular ad hoc network is gradually transformed into the Internet of vehicles(IoV).Meanwhile,more and more locationbased services(LBSs)are created to provide convenience for drivers.However,the frequently updated location information sent to the LBS server also puts user location privacy at risk.Thus,preserve user location privacy while allowing vehicles to have high-quality LBSs is a critical issue.Many solutions have been proposed in the literature to preserve location privacy.However,most of them cannot provide real-time LBS with accurate location updates.In this paper,we propose a novel location privacy-preserving scheme,which allows vehicles to send accurate real-time location information to the LBS server while preventing being tracked by attackers.In the proposed scheme,a vehicle utilizes the location information of selected shadow vehicles,whose route diverge from the requester,to generate multiple virtual trajectories to the LBS server so as to mislead attackers.Simulation results show that our proposed scheme achieves a high privacy-preserving level and outperforms other state-of-the-art schemes in terms of location entropy and tracking success ratio.展开更多
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles(EVs)to be used by the smart grid through the central aggregator.Since the central aggregator is connected to the smart gr...Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles(EVs)to be used by the smart grid through the central aggregator.Since the central aggregator is connected to the smart grid through a wireless network,it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system.However,existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network.In this paper,the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed.The proposed system,central aggregator–intrusion detection system(CA-IDS),works as a security gateway for EVs to analyze andmonitor incoming traffic for possible DoS attacks.EVs are registered with a Central Aggregator(CAG)to exchange authenticated messages,and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG.A denial of service(DoS)attack is simulated at CAG in a vehicle-to-grid(V2G)network manipulating various network parameters such as transmission overhead,receiving capacity of destination,average packet size,and channel availability.The proposed system is compared with existing intrusion detection systems using different parameters such as throughput,jitter,and accuracy.The analysis shows that the proposed system has a higher throughput,lower jitter,and higher accuracy as compared to the existing schemes.展开更多
Investing on value-added service (VAS) amplifies users' participation and platform profit. However, the investing resource is usually limited in practice. This paper investigates VAS investing and pricing strategie...Investing on value-added service (VAS) amplifies users' participation and platform profit. However, the investing resource is usually limited in practice. This paper investigates VAS investing and pricing strategies for a two-sided platform under investing resource constraint. We reveal that with VAS investment, Subsidizing can still be done to enlarge users' demand, even when the investing cost becomes higher. For optimal pricing strategies, the network effect will be the dominating determinant if the gap between two marginal cross-side benefits (i.e. the benefit that users obtain when each new user join the other side of the platform) is large. Interestingly, we show that with the increase of the marginal investing cost, users might either be priced higher or lower. If the marginal investing cost increases to a high level, and the gap between the two marginal cross-side benefits is large, lowering the access fee for users possessing the higher eross-side network effect does not necessarily compensate more profit loss caused by higher cost. Moreover, after VAS is developed, raising the access fee for those whose marginal investing benefit is large does not necessarily generate more profit as well. The opposite strategy further enlarges users' utility, and promotes the investment to benefit more users.展开更多
文摘Electric vehicles (EVs) are an emerging type of mobile intelligent power consumption devices in Smart Grid as new green transport tools. In order to provide a powerful automation and intelligence support for wide area electric vehicles energy service network, we analyze the network infrastructure and communications demands of various terminals, devices and monitoring systems distributed in wide area electric vehicle energy service network. According to interactive user services scenarios and energy operations intelligent monitoring, we propose multimode communication integration architecture for wide area electric vehicle energy service network by means of the fusion of the Internet of Things (IoT) technology. Then, we design different networking schemes in access networks and backbone transmission networks meeting multi-scene and multi-operation interaction requirements. The networking schemes will provide efficient technical support to implement intelligent, cross-regional, interactive energy services for electric vehicle users.
基金This work was supported by the National Science Foundation under Grant CNS-2007995 and Grant CNS-2008145。
文摘Ubiquitous information exchange is achieved among connected vehicles through the increasingly smart environment.The concept of conventional vehicular ad hoc network is gradually transformed into the Internet of vehicles(IoV).Meanwhile,more and more locationbased services(LBSs)are created to provide convenience for drivers.However,the frequently updated location information sent to the LBS server also puts user location privacy at risk.Thus,preserve user location privacy while allowing vehicles to have high-quality LBSs is a critical issue.Many solutions have been proposed in the literature to preserve location privacy.However,most of them cannot provide real-time LBS with accurate location updates.In this paper,we propose a novel location privacy-preserving scheme,which allows vehicles to send accurate real-time location information to the LBS server while preventing being tracked by attackers.In the proposed scheme,a vehicle utilizes the location information of selected shadow vehicles,whose route diverge from the requester,to generate multiple virtual trajectories to the LBS server so as to mislead attackers.Simulation results show that our proposed scheme achieves a high privacy-preserving level and outperforms other state-of-the-art schemes in terms of location entropy and tracking success ratio.
基金Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(NRF-2021R1A6A1A03039493).
文摘Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles(EVs)to be used by the smart grid through the central aggregator.Since the central aggregator is connected to the smart grid through a wireless network,it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system.However,existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network.In this paper,the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed.The proposed system,central aggregator–intrusion detection system(CA-IDS),works as a security gateway for EVs to analyze andmonitor incoming traffic for possible DoS attacks.EVs are registered with a Central Aggregator(CAG)to exchange authenticated messages,and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG.A denial of service(DoS)attack is simulated at CAG in a vehicle-to-grid(V2G)network manipulating various network parameters such as transmission overhead,receiving capacity of destination,average packet size,and channel availability.The proposed system is compared with existing intrusion detection systems using different parameters such as throughput,jitter,and accuracy.The analysis shows that the proposed system has a higher throughput,lower jitter,and higher accuracy as compared to the existing schemes.
文摘Investing on value-added service (VAS) amplifies users' participation and platform profit. However, the investing resource is usually limited in practice. This paper investigates VAS investing and pricing strategies for a two-sided platform under investing resource constraint. We reveal that with VAS investment, Subsidizing can still be done to enlarge users' demand, even when the investing cost becomes higher. For optimal pricing strategies, the network effect will be the dominating determinant if the gap between two marginal cross-side benefits (i.e. the benefit that users obtain when each new user join the other side of the platform) is large. Interestingly, we show that with the increase of the marginal investing cost, users might either be priced higher or lower. If the marginal investing cost increases to a high level, and the gap between the two marginal cross-side benefits is large, lowering the access fee for users possessing the higher eross-side network effect does not necessarily compensate more profit loss caused by higher cost. Moreover, after VAS is developed, raising the access fee for those whose marginal investing benefit is large does not necessarily generate more profit as well. The opposite strategy further enlarges users' utility, and promotes the investment to benefit more users.