{"id":"https://openalex.org/W2479646029","doi":"https://doi.org/10.1109/icc.2016.7510934","title":"Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks","display_name":"Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks","publication_year":2016,"publication_date":"2016-05-01","ids":{"openalex":"https://openalex.org/W2479646029","doi":"https://doi.org/10.1109/icc.2016.7510934","mag":"2479646029"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2016.7510934","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2016.7510934","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://researchonline.ljmu.ac.uk/id/eprint/3007/1/Secure%20and%20Privacy-Aware%20PMIPv6%20Protocol%20for%20V2G%20Networks.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032823748","display_name":"Mahmoud Hashem Eiza","orcid":"https://orcid.org/0000-0001-9114-8577"},"institutions":[{"id":"https://openalex.org/I63098007","display_name":"Liverpool John Moores University","ror":"https://ror.org/04zfme737","country_code":"GB","type":"education","lineage":["https://openalex.org/I63098007"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Mahmoud Hashem Eiza","raw_affiliation_strings":["Department of Computer Science, Liverpool John Moores University, Liverpool, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Liverpool John Moores University, Liverpool, U.K","institution_ids":["https://openalex.org/I63098007"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061698636","display_name":"Qi Shi","orcid":"https://orcid.org/0000-0002-3766-7808"},"institutions":[{"id":"https://openalex.org/I63098007","display_name":"Liverpool John Moores University","ror":"https://ror.org/04zfme737","country_code":"GB","type":"education","lineage":["https://openalex.org/I63098007"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Qi Shi","raw_affiliation_strings":["Department of Computer Science, Liverpool John Moores University, Liverpool, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Liverpool John Moores University, Liverpool, U.K","institution_ids":["https://openalex.org/I63098007"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021412159","display_name":"Angelos K. Marnerides","orcid":"https://orcid.org/0000-0002-7996-6216"},"institutions":[{"id":"https://openalex.org/I63098007","display_name":"Liverpool John Moores University","ror":"https://ror.org/04zfme737","country_code":"GB","type":"education","lineage":["https://openalex.org/I63098007"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Angelos Marnerides","raw_affiliation_strings":["Department of Computer Science, Liverpool John Moores University, Liverpool, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Liverpool John Moores University, Liverpool, U.K","institution_ids":["https://openalex.org/I63098007"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075384970","display_name":"Thomas Owens","orcid":"https://orcid.org/0000-0002-6673-3413"},"institutions":[{"id":"https://openalex.org/I59433898","display_name":"Brunel University of London","ror":"https://ror.org/00dn4t376","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I59433898"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Thomas Owens","raw_affiliation_strings":["College of Engineering, Design and Physical Sciences, Brunel University London, Uxbridge, U.K"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Design and Physical Sciences, Brunel University London, Uxbridge, U.K","institution_ids":["https://openalex.org/I59433898"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5032823748"],"corresponding_institution_ids":["https://openalex.org/I63098007"],"apc_list":null,"apc_paid":null,"fwci":2.6504,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.91997667,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7265851497650146},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.72548508644104},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5809903740882874},{"id":"https://openalex.org/keywords/proxy-mobile-ipv6","display_name":"Proxy Mobile IPv6","score":0.5572783350944519},{"id":"https://openalex.org/keywords/mobile-ip","display_name":"Mobile IP","score":0.5196951031684875},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5094125866889954},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.48417359590530396},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.45433786511421204},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42892590165138245},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.399453341960907},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.35897231101989746},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09427511692047119}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7265851497650146},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.72548508644104},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5809903740882874},{"id":"https://openalex.org/C2778610037","wikidata":"https://www.wikidata.org/wiki/Q7252889","display_name":"Proxy Mobile IPv6","level":4,"score":0.5572783350944519},{"id":"https://openalex.org/C82203111","wikidata":"https://www.wikidata.org/wiki/Q205936","display_name":"Mobile IP","level":3,"score":0.5196951031684875},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5094125866889954},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.48417359590530396},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.45433786511421204},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42892590165138245},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.399453341960907},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.35897231101989746},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09427511692047119}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/icc.2016.7510934","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2016.7510934","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},{"id":"pmh:oai:researchonline.ljmu.ac.uk:3007","is_oa":true,"landing_page_url":null,"pdf_url":"https://researchonline.ljmu.ac.uk/id/eprint/3007/1/Secure%20and%20Privacy-Aware%20PMIPv6%20Protocol%20for%20V2G%20Networks.pdf","source":{"id":"https://openalex.org/S4306401246","display_name":"Liverpool John Moores University","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I63098007","host_organization_name":"Liverpool John Moores University","host_organization_lineage":["https://openalex.org/I63098007"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"},{"id":"pmh:oai:eprints.gla.ac.uk:221851","is_oa":false,"landing_page_url":"http://eprints.gla.ac.uk/221851/","pdf_url":null,"source":{"id":"https://openalex.org/S4210235606","display_name":"ENLIGHTEN (Jurnal Bimbingan dan Konseling Islam)","issn_l":"2622-8912","issn":["2622-8912","2622-8920"],"is_oa":false,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceedings"}],"best_oa_location":{"id":"pmh:oai:researchonline.ljmu.ac.uk:3007","is_oa":true,"landing_page_url":null,"pdf_url":"https://researchonline.ljmu.ac.uk/id/eprint/3007/1/Secure%20and%20Privacy-Aware%20PMIPv6%20Protocol%20for%20V2G%20Networks.pdf","source":{"id":"https://openalex.org/S4306401246","display_name":"Liverpool John Moores University","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I63098007","host_organization_name":"Liverpool John Moores University","host_organization_lineage":["https://openalex.org/I63098007"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G227454478","display_name":null,"funder_award_id":"644262","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8051717526","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8318064016","display_name":null,"funder_award_id":"Horizon","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2479646029.pdf","grobid_xml":"https://content.openalex.org/works/W2479646029.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W1587826459","https://openalex.org/W1591524234","https://openalex.org/W1601001795","https://openalex.org/W1604735721","https://openalex.org/W1985890280","https://openalex.org/W1997825451","https://openalex.org/W2072968407","https://openalex.org/W2092958856","https://openalex.org/W2108505700","https://openalex.org/W2115210164","https://openalex.org/W2128713393","https://openalex.org/W2154678734","https://openalex.org/W2177861014","https://openalex.org/W2243489190","https://openalex.org/W2301446542","https://openalex.org/W6676490518","https://openalex.org/W6818807946"],"related_works":["https://openalex.org/W807097251","https://openalex.org/W2127880976","https://openalex.org/W2119520755","https://openalex.org/W2187425543","https://openalex.org/W2082895023","https://openalex.org/W2240531867","https://openalex.org/W2903498931","https://openalex.org/W1985227832","https://openalex.org/W2012573940","https://openalex.org/W2046143260"],"abstract_inverted_index":{"Vehicle-to-Grid":[0],"(V2G)":[1],"networks":[2],"have":[3],"emerged":[4],"as":[5],"a":[6,91],"new":[7],"communication":[8],"paradigm":[9],"between":[10,25],"Electric":[11],"Vehicles":[12],"(EVs)":[13],"and":[14,28,38,93,112,130],"the":[15,29,34,57,61,83,110,116,121,131,136,142],"Smart":[16],"Grid":[17],"(SG).":[18],"In":[19,71],"order":[20],"to":[21,89,140],"ensure":[22],"seamless":[23],"communications":[24,42,52],"mobile":[26,40,50,68,96,117],"EVs":[27,65],"electric":[30],"vehicle":[31],"supply":[32],"equipment,":[33],"support":[35],"of":[36,59,63,115,126,145],"ubiquitous":[37],"transparent":[39],"IP":[41,51,69],"is":[43],"essential":[44],"in":[45,80,124],"V2G":[46,101],"networks.":[47,102],"However,":[48],"enabling":[49],"raises":[53],"real":[54],"concerns":[55],"about":[56],"possibility":[58],"tracking":[60],"locations":[62],"connected":[64],"through":[66],"their":[67],"addresses.":[70],"this":[72],"paper,":[73],"we":[74],"employ":[75],"certificate-less":[76],"public":[77],"key":[78],"cryptography":[79],"synergy":[81],"with":[82],"restrictive":[84],"partially":[85],"blind":[86],"signature":[87],"technique":[88],"construct":[90],"secure":[92],"privacy-aware":[94],"proxy":[95],"IPv6":[97],"(SP-PMIPv6)":[98],"protocol":[99,123],"for":[100],"SP-PMIPv6":[103,122],"achieves":[104],"low":[105],"authentication":[106,128],"latency":[107],"while":[108],"protecting":[109],"identity":[111],"location":[113],"privacy":[114],"EV.":[118],"We":[119],"evaluate":[120],"terms":[125],"its":[127],"overhead":[129],"information-theoretic":[132],"uncertainty":[133],"derived":[134],"by":[135],"mutual":[137],"information":[138],"metric":[139],"show":[141],"high":[143],"level":[144],"achieved":[146],"anonymity.":[147]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
