A Hypergraph-Based Key Management Scheme for Smart Charging Networking
Title | A Hypergraph-Based Key Management Scheme for Smart Charging Networking |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Zhi, Li, Yanzhu, Liu, Di, Liu, Nan, Zhang, Xueying, Ding, Yuanyuan, Liu |
Conference Name | 2019 Chinese Control And Decision Conference (CCDC) |
Publisher | IEEE |
ISBN Number | 978-1-7281-0106-4 |
Keywords | cryptography, Data security, data security requirements, electric vehicle charging, electric vehicle users, graph theory, Human Behavior, human factors, hypergraph structure, hypergraph theory, hypergraph-based key management scheme, key generation cost, Key Management, key management scheme SCHKM, Key storage, Metrics, pubcrawl, resilience, Resiliency, Scalability, SCHKM scheme, security of data, security requirements, Smart Charging, smart charging network, telecommunication network management, two-subnetwork model |
Abstract | In this article, to deal with data security requirements of electric vehicle users, a key management scheme for smart charging has been studied. According to the characteristics of the network, three elements and a two-subnetwork model between the charging and the electric vehicle users have been designed. Based on the hypergraph theory, the hypergraph structure of the smart charging network is proposed. And the key management scheme SCHKM is designed to satisfy the operational and security requirements of this structure. The efficiency of SCHKM scheme is analyzed from the cost experiment of key generation and key storage. The experimental results show that compared with the LKH, OFT and GKMP, the proposed key management scheme has obvious advantages in multi-user and key generation cost. |
URL | https://ieeexplore.ieee.org/document/8833069 |
DOI | 10.1109/CCDC.2019.8833069 |
Citation Key | zhi_hypergraph-based_2019 |
- key management scheme SCHKM
- two-subnetwork model
- telecommunication network management
- smart charging network
- Smart Charging
- security requirements
- security of data
- SCHKM scheme
- Scalability
- Resiliency
- resilience
- pubcrawl
- Metrics
- Key storage
- Cryptography
- key management
- key generation cost
- hypergraph-based key management scheme
- hypergraph theory
- hypergraph structure
- Human Factors
- Human behavior
- graph theory
- electric vehicle users
- electric vehicle charging
- data security requirements
- Data Security