Abstract
V2G technology enables bidirectional energy transfer from EVs to the grid. It is possible to use the grid to charge EVs and to use EVs to charge the grid during peak grid hours, thus alleviating the problem of grid load fluctuations and improving grid efficiency. Many traditional authentication protocols have been proposed to protect V2G. However, the rapid development of high-speed Internet and the race to organize the development of quantum computers are a great threat to the existing authentication schemes. Therefore, traditional authentication protocols are vulnerable to attacks in the era of quantum computing. In this paper, I propose an extended chaotic mapping-based authentication and quantum key distribution scheme to defend against quantum attacks and prevent known traditional security attacks. The proposed extended chaotic mapping-based authentication protocol is secure under the real or random (ROR) model. Also, experimental results demonstrate that our protocol is lightweight compared to existing authentication protocols, as listed in the performance analysis section. The comparative analysis shows that the protocol is suitable for practical implementation in a quantum environment.
Keywords
Get full access to this article
View all access options for this article.
