
94% of researchers rate our articles as excellent or good
Learn more about the work of our research integrity team to safeguard the quality of each article we publish.
Find out more
ORIGINAL RESEARCH article
Front. Phys.
Sec. Social Physics
Volume 13 - 2025 | doi: 10.3389/fphy.2025.1529638
The final, formatted version of the article will be published soon.
You have multiple emails registered with Frontiers:
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
As environmental issues and climate change worsen, Smart Grid has become a crucial technology for tackling energy challenges. Smart Grid substantially enhances the reliability, security and efficiency of power systems by integrating state-of-the-art communication, control and information technologies. As a crucial component of Smart Grid, Vehicle to Grid (V2G) facilitates bidirectional energy flow between electric vehicle (EV) and the grid. This not only optimizes energy utilization but also accelerates the large-scale adoption of EV, contributing to a more sustainable energy ecosystem. However, security and privacy concerns in V2G cannot be ignored, particularly regarding identity authentication and data protection. Therefore, enabling the secure transmission of users' private information within V2G is crucial. This paper presents a secure and efficient authentication scheme for privacy preserving in V2G. The scheme validates vehicle user identities and leverages chebyshev chaotic maps along with hash function to enable V2G communication. It ensures both data integrity and user privacy during transmission, addressing key security concerns in V2G. Through formal security analysis, it is confirmed that the scheme can withstand common attacks. Additionally, detailed informal security discussions demonstrate that the scheme can resist known attacks and meet design objectives. Further performance evaluation shows that the proposed scheme balances efficiency and security.
Keywords: Smart Grid, Vehicle to grid, Privacy preserving, authentication, security
Received: 17 Nov 2024; Accepted: 24 Feb 2025.
Copyright: © 2025 Xiao, Wang and Sun. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence:
Zhaoshun Wang, University of Science and Technology Beijing, Beijing, China
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.
Research integrity at Frontiers
Learn more about the work of our research integrity team to safeguard the quality of each article we publish.