{"id":"https://openalex.org/W4411336861","doi":"https://doi.org/10.1109/tce.2025.3580338","title":"A Post-Quantum Secure Federated Learning Framework for Cross-Domain V2G Authentication","display_name":"A Post-Quantum Secure Federated Learning Framework for Cross-Domain V2G Authentication","publication_year":2025,"publication_date":"2025-06-16","ids":{"openalex":"https://openalex.org/W4411336861","doi":"https://doi.org/10.1109/tce.2025.3580338"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2025.3580338","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3580338","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079811333","display_name":"Shafiq Ahmed","orcid":"https://orcid.org/0000-0001-9599-1887"},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Shafiq Ahmed","raw_affiliation_strings":["School of Computer Science and Electronic Engineering, University of Essex, Colchester, U.K","School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK"],"raw_orcid":"https://orcid.org/0000-0001-9599-1887","affiliations":[{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, U.K","institution_ids":["https://openalex.org/I110002522"]},{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK","institution_ids":["https://openalex.org/I110002522"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054251799","display_name":"Mohammad Hossein Anisi","orcid":"https://orcid.org/0000-0001-8414-2708"},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Mohammad Hossein Anisi","raw_affiliation_strings":["School of Computer Science and Electronic Engineering, University of Essex, Colchester, U.K","School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK"],"raw_orcid":"https://orcid.org/0000-0001-8414-2708","affiliations":[{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, U.K","institution_ids":["https://openalex.org/I110002522"]},{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK","institution_ids":["https://openalex.org/I110002522"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5079811333"],"corresponding_institution_ids":["https://openalex.org/I110002522"],"apc_list":null,"apc_paid":null,"fwci":4.5718,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.94827638,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"71","issue":"3","first_page":"8433","last_page":"8440"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9745000004768372,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.653410792350769},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.516040563583374},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.47433844208717346},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.397093802690506},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37653404474258423},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08970761299133301}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.653410792350769},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.516040563583374},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.47433844208717346},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.397093802690506},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37653404474258423},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08970761299133301},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3580338","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3580338","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2912135041"],"abstract_inverted_index":{"Cross-domain":[0],"Vehicle-to-Grid":[1],"(V2G)":[2],"networks":[3],"enable":[4],"secure":[5,131,151],"and":[6,17,31,51,100,167,187,200],"efficient":[7,199],"energy":[8],"transactions":[9],"between":[10],"Electric":[11,18],"Vehicles":[12],"(EVs),":[13],"Charging":[14],"Stations":[15],"(CS),":[16],"Service":[19],"Providers":[20],"(ESP),":[21],"forming":[22],"a":[23,80,93,115],"critical":[24],"component":[25],"of":[26,49,57,68],"Edge":[27],"computing-assisted":[28],"Consumer":[29],"devices":[30],"IoT":[32],"(EACI)":[33],"frameworks.":[34],"However,":[35],"existing":[36],"authentication":[37,63,203],"mechanisms":[38,71],"often":[39],"rely":[40],"on":[41],"centralized":[42,139],"trusted":[43],"authorities,":[44],"leading":[45],"to":[46,72,87,106,193],"single":[47],"points":[48],"failure":[50],"computational":[52,183],"bottlenecks.":[53],"Additionally,":[54,114,142],"the":[55,66,124,158],"emergence":[56],"quantum":[58],"computing":[59],"threatens":[60],"traditional":[61],"cryptographic":[62],"schemes,":[64,195],"necessitating":[65],"integration":[67],"post-quantum":[69,108,202],"security":[70,155],"protect":[73],"multi-domain":[74],"V2G":[75],"interactions.":[76],"This":[77],"paper":[78],"presents":[79],"Lightweight":[81,101],"Quantum-Resistant":[82],"Authentication":[83],"Protocol":[84],"(LQAP)":[85],"designed":[86],"address":[88],"these":[89],"challenges":[90],"by":[91,181,185,190],"employing":[92],"hybrid":[94],"eXtended":[95],"Merkle":[96,102],"Signature":[97,103],"Scheme":[98],"(XMSS)":[99],"(LMS)":[104],"system":[105],"achieve":[107],"resilience":[109,163],"with":[110,206],"optimized":[111],"key":[112],"management.":[113],"decentralized":[116],"Hierarchical":[117],"Federated":[118],"Learning":[119],"(HFL)":[120],"framework":[121],"operating":[122],"at":[123],"edge":[125],"layer":[126],"is":[127],"incorporated":[128,148],"for":[129,149],"hardware-based":[130,150],"entity":[132,152],"identification,":[133],"enabling":[134],"distributed":[135],"anomaly":[136],"detection":[137],"without":[138],"data":[140],"aggregation.":[141],"physically":[143],"unclonable":[144],"functions":[145],"(PUF)":[146],"are":[147],"identification.":[153],"Formal":[154],"analysis":[156],"using":[157],"Scyther":[159],"tool":[160],"confirms":[161],"LQAP\u2019s":[162],"against":[164],"impersonation,":[165],"replay,":[166],"machine":[168],"learning-based":[169],"inference":[170],"attacks.":[171],"Performance":[172],"evaluations":[173],"indicate":[174],"that":[175],"LQAP":[176],"substantially":[177],"reduces":[178],"communication":[179],"overhead":[180,189],"21.45%,":[182],"cost":[184],"42.78%,":[186],"storage":[188],"61.95%":[191],"compared":[192],"conventional":[194],"thus":[196],"providing":[197],"an":[198],"scalable":[201],"solution":[204],"aligned":[205],"EACI":[207],"network":[208],"requirements.":[209]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":3}],"updated_date":"2025-11-12T23:11:45.498971","created_date":"2025-10-10T00:00:00"}
