TY - GEN
T1 - Poster
T2 - 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019
AU - Gabay, David
AU - Cebe, Mumin
AU - Akkaya, Kemal
N1 - Publisher Copyright:
© 2019 Copyright held by the owner/author(s).
PY - 2019/5/15
Y1 - 2019/5/15
N2 - As Electric Vehicles (EVs) are becoming widely available, their secure management is crucial to fully enable their potential. For instance, for convenient charging, they may require quick authentication with the charging stations while they are on the go. As charging is frequently needed, exposing one's charging frequency to the stations may risk the exposure of privacy for the EV driver. Therefore, a mechanism is needed to hide EV information. In this paper, we propose using zero-knowledge proofs to achieve this goal. While zero-knowledge proofs can provide anonymous authentication, they require computation for generation of witnesses. Therefore, we assess the overhead of generating a witness and proof computation at the resource constrained on-board units (OBUs) which are deployed on EVs that utilize wireless communications for scheduling. The results indicate that computation overhead is minimal and can be delployed on resource contrained devices.
AB - As Electric Vehicles (EVs) are becoming widely available, their secure management is crucial to fully enable their potential. For instance, for convenient charging, they may require quick authentication with the charging stations while they are on the go. As charging is frequently needed, exposing one's charging frequency to the stations may risk the exposure of privacy for the EV driver. Therefore, a mechanism is needed to hide EV information. In this paper, we propose using zero-knowledge proofs to achieve this goal. While zero-knowledge proofs can provide anonymous authentication, they require computation for generation of witnesses. Therefore, we assess the overhead of generating a witness and proof computation at the resource constrained on-board units (OBUs) which are deployed on EVs that utilize wireless communications for scheduling. The results indicate that computation overhead is minimal and can be delployed on resource contrained devices.
KW - Charging
KW - EVs
KW - Privacy
KW - Zero-knowledge proof
KW - ZkSNARKs
UR - http://www.scopus.com/inward/record.url?scp=85066733082&partnerID=8YFLogxK
U2 - 10.1145/3317549.3326325
DO - 10.1145/3317549.3326325
M3 - Conference contribution
AN - SCOPUS:85066733082
T3 - WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks
SP - 347
EP - 348
BT - WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks
PB - Association for Computing Machinery, Inc
Y2 - 15 May 2019 through 17 May 2019
ER -