Skip to main content

ORIGINAL RESEARCH article

Front. Phys.

Sec. Social Physics

Volume 13 - 2025 | doi: 10.3389/fphy.2025.1529638

A Secure and Efficient Authentication Scheme for Vehicle to Grid in Smart Grid

Provisionally accepted
Nan Xiao Nan Xiao Zhaoshun Wang Zhaoshun Wang *Xiaoxue Sun Xiaoxue Sun
  • University of Science and Technology Beijing, Beijing, China

The final, formatted version of the article will be published soon.

    As environmental issues and climate change worsen, Smart Grid has become a crucial technology for tackling energy challenges. Smart Grid substantially enhances the reliability, security and efficiency of power systems by integrating state-of-the-art communication, control and information technologies. As a crucial component of Smart Grid, Vehicle to Grid (V2G) facilitates bidirectional energy flow between electric vehicle (EV) and the grid. This not only optimizes energy utilization but also accelerates the large-scale adoption of EV, contributing to a more sustainable energy ecosystem. However, security and privacy concerns in V2G cannot be ignored, particularly regarding identity authentication and data protection. Therefore, enabling the secure transmission of users' private information within V2G is crucial. This paper presents a secure and efficient authentication scheme for privacy preserving in V2G. The scheme validates vehicle user identities and leverages chebyshev chaotic maps along with hash function to enable V2G communication. It ensures both data integrity and user privacy during transmission, addressing key security concerns in V2G. Through formal security analysis, it is confirmed that the scheme can withstand common attacks. Additionally, detailed informal security discussions demonstrate that the scheme can resist known attacks and meet design objectives. Further performance evaluation shows that the proposed scheme balances efficiency and security.

    Keywords: Smart Grid, Vehicle to grid, Privacy preserving, authentication, security

    Received: 17 Nov 2024; Accepted: 24 Feb 2025.

    Copyright: © 2025 Xiao, Wang and Sun. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

    * Correspondence: Zhaoshun Wang, University of Science and Technology Beijing, Beijing, China

    Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

    Research integrity at Frontiers

    Man ultramarathon runner in the mountains he trains at sunset

    94% of researchers rate our articles as excellent or good

    Learn more about the work of our research integrity team to safeguard the quality of each article we publish.


    Find out more