{"id":"https://openalex.org/W4417338024","doi":"https://doi.org/10.1109/tce.2025.3644135","title":"Secure and Reliable Authentication Protocol for Energy Internet-Enabled Vehicle-to-Grid Communication System","display_name":"Secure and Reliable Authentication Protocol for Energy Internet-Enabled Vehicle-to-Grid Communication System","publication_year":2025,"publication_date":"2025-12-15","ids":{"openalex":"https://openalex.org/W4417338024","doi":"https://doi.org/10.1109/tce.2025.3644135"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2025.3644135","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3644135","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083739390","display_name":"Akber Ali Khan","orcid":"https://orcid.org/0000-0001-7525-8864"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Akber Ali Khan","raw_affiliation_strings":["Department of Applied Sciences and Humanities, IIMT College of Engineering, Greater Noida, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Department of Applied Sciences and Humanities, IIMT College of Engineering, Greater Noida, Uttar Pradesh, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120807608","display_name":"Samar Muti","orcid":null},"institutions":[{"id":"https://openalex.org/I117222138","display_name":"Abu Dhabi University","ror":"https://ror.org/01r3kjq03","country_code":"AE","type":"education","lineage":["https://openalex.org/I117222138"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Samar Muti","raw_affiliation_strings":["Department of Information Technology, College of Engineering and Computing, Liwa University, Abu Dhabi, United Arab Emirates","Department of Information Technology, College of Engineering and Computing, Liwa University, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, College of Engineering and Computing, Liwa University, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I117222138"]},{"raw_affiliation_string":"Department of Information Technology, College of Engineering and Computing, Liwa University, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I117222138"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088671998","display_name":"Bander Alzahrani","orcid":"https://orcid.org/0000-0002-7118-0761"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Bander A. Alzahrani","raw_affiliation_strings":["Information Systems Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Information Systems Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]},{"raw_affiliation_string":"Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011213078","display_name":"Ashok Kumar Das","orcid":"https://orcid.org/0000-0002-5196-9589"},"institutions":[{"id":"https://openalex.org/I64189192","display_name":"International Institute of Information Technology, Hyderabad","ror":"https://ror.org/05f11g639","country_code":"IN","type":"education","lineage":["https://openalex.org/I64189192"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashok Kumar Das","raw_affiliation_strings":["Center for Security, Theory and Algorithmic Research, International Institute of Information Technology Hyderabad, Hyderabad, India","Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology Hyderabad, Hyderabad, India","institution_ids":["https://openalex.org/I64189192"]},{"raw_affiliation_string":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India","institution_ids":["https://openalex.org/I64189192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067498452","display_name":"Matloub Hussain","orcid":"https://orcid.org/0000-0002-6312-3994"},"institutions":[{"id":"https://openalex.org/I29891158","display_name":"University of Sharjah","ror":"https://ror.org/00engpz63","country_code":"AE","type":"education","lineage":["https://openalex.org/I29891158"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Matloub Hussain","raw_affiliation_strings":["College of Business Administration (COBA), University of Sharjah, Sharjah, United Arab Emirates","College of Business Administration (COBA), University of Sharjah, Sharjah, UAE"],"affiliations":[{"raw_affiliation_string":"College of Business Administration (COBA), University of Sharjah, Sharjah, United Arab Emirates","institution_ids":["https://openalex.org/I29891158"]},{"raw_affiliation_string":"College of Business Administration (COBA), University of Sharjah, Sharjah, UAE","institution_ids":["https://openalex.org/I29891158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025407927","display_name":"Azeem Irshad","orcid":"https://orcid.org/0000-0002-1366-2834"},"institutions":[{"id":"https://openalex.org/I192891849","display_name":"University of Wah","ror":"https://ror.org/020we4134","country_code":"PK","type":"education","lineage":["https://openalex.org/I192891849"]},{"id":"https://openalex.org/I2799678268","display_name":"Pakistan Army","ror":"https://ror.org/0310kd428","country_code":"PK","type":"government","lineage":["https://openalex.org/I2799678268"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Azeem Irshad","raw_affiliation_strings":["Punjab Higher Education Department, Faculty of Computer Science, GGC Asghar Mall Rawalpindi, Punjab, Pakistan","Faculty of Computer Science, Punjab Higher Education Department, GGC Asghar Mall Rawalpindi, Pakistan"],"affiliations":[{"raw_affiliation_string":"Punjab Higher Education Department, Faculty of Computer Science, GGC Asghar Mall Rawalpindi, Punjab, Pakistan","institution_ids":["https://openalex.org/I2799678268"]},{"raw_affiliation_string":"Faculty of Computer Science, Punjab Higher Education Department, GGC Asghar Mall Rawalpindi, Pakistan","institution_ids":["https://openalex.org/I192891849"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047048551","display_name":"Shehzad Ashraf Chaudhry","orcid":"https://orcid.org/0000-0002-9321-6956"},"institutions":[{"id":"https://openalex.org/I117222138","display_name":"Abu Dhabi University","ror":"https://ror.org/01r3kjq03","country_code":"AE","type":"education","lineage":["https://openalex.org/I117222138"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Shehzad Ashraf Chaudhry","raw_affiliation_strings":["Department of Computer Science and Information Technology, College of Engineering, Abu Dhabi University, Abu Dhabi, United Arab Emirates","Department of Computer Science and Information Technology, College of Engineering, Abu Dhabi University, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Technology, College of Engineering, Abu Dhabi University, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I117222138"]},{"raw_affiliation_string":"Department of Computer Science and Information Technology, College of Engineering, Abu Dhabi University, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I117222138"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5083739390"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40769228,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"1241","last_page":"1253"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.428600013256073,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.428600013256073,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10768","display_name":"Electric Vehicles and Infrastructure","score":0.23440000414848328,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.07760000228881836,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.6085000038146973},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5322999954223633},{"id":"https://openalex.org/keywords/otway\u2013rees-protocol","display_name":"Otway\u2013Rees protocol","score":0.4887000024318695},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.4781999886035919},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.4657999873161316},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.453900009393692},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4250999987125397},{"id":"https://openalex.org/keywords/challenge-handshake-authentication-protocol","display_name":"Challenge-Handshake Authentication Protocol","score":0.4180000126361847},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.4174000024795532}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7232000231742859},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6085000038146973},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6055999994277954},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5322999954223633},{"id":"https://openalex.org/C35788789","wikidata":"https://www.wikidata.org/wiki/Q1320237","display_name":"Otway\u2013Rees protocol","level":5,"score":0.4887000024318695},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.4781999886035919},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.4657999873161316},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.453900009393692},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4250999987125397},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.4180000126361847},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.4174000024795532},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.40310001373291016},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.4000000059604645},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.39079999923706055},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.36640000343322754},{"id":"https://openalex.org/C65567647","wikidata":"https://www.wikidata.org/wiki/Q81414","display_name":"Internet protocol suite","level":3,"score":0.3546999990940094},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.35420000553131104},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.3499999940395355},{"id":"https://openalex.org/C124086997","wikidata":"https://www.wikidata.org/wiki/Q4053131","display_name":"Wide Mouth Frog protocol","level":5,"score":0.3443000018596649},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.33550000190734863},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.33239999413490295},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2989000082015991},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2948000133037567},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.2782000005245209},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.27559998631477356},{"id":"https://openalex.org/C20636137","wikidata":"https://www.wikidata.org/wiki/Q11163","display_name":"User Datagram Protocol","level":4,"score":0.2752000093460083},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.27320000529289246},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2651999890804291},{"id":"https://openalex.org/C188573790","wikidata":"https://www.wikidata.org/wiki/Q12705","display_name":"Renewable energy","level":2,"score":0.25929999351501465},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.25290000438690186}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3644135","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3644135","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"As":[0],"an":[1,27,69,143],"innovative":[2],"approach":[3],"to":[4,17,62,73,170],"distributing":[5],"renewable":[6,99],"energy,":[7],"the":[8,50,80,95,115,125,128,134,173,194,206],"Energy":[9],"Internet":[10],"(EI)":[11],"utilizes":[12],"computing":[13],"and":[14,22,42,90,106,154,188,199],"communication":[15,54,77,163],"technologies":[16],"transform":[18],"traditional":[19],"electric":[20,40],"power":[21],"intelligent":[23],"transportation":[24],"systems":[25],"into":[26],"environment":[28],"that":[29,114,193],"supports":[30],"open":[31],"innovation.":[32],"EI":[33],"enables":[34],"bidirectional,":[35],"sustainable":[36],"energy":[37,47,100,167],"transmission":[38],"between":[39,79],"vehicles":[41],"service":[43],"providers,":[44],"facilitating":[45],"seamless":[46],"exchange.":[48],"However,":[49],"underlying":[51],"public":[52],"data":[53],"architecture":[55],"in":[56,101,110,146,212],"Vehicle-to-Grid":[57,102],"(V2G)":[58],"environments":[59],"is":[60,118,131,197],"susceptible":[61],"several":[63,121],"security":[64,126,190],"attacks,":[65],"which":[66],"call":[67],"for":[68,94,201],"efficient":[70],"authentication":[71,92,144],"protocol":[72,93,159,196,208],"provide":[74],"a":[75,88,213],"secure":[76,89,202],"channel":[78],"V2G":[81,203,216],"entities.":[82],"In":[83],"this":[84,111],"article,":[85],"we":[86],"introduce":[87],"resource-efficient":[91],"reliable":[96,198],"distribution":[97],"of":[98,127,172,176,181],"systems.":[103],"The":[104,139,157],"informal":[105],"formal":[107],"analyses":[108],"presented":[109],"article":[112],"demonstrate":[113],"proposed":[116,129,140,158,195,207],"scheme":[117,141],"resilient":[119],"against":[120],"known":[122],"threats.":[123],"Moreover,":[124],"system":[130],"verified":[132],"using":[133],"automated":[135],"simulation":[136],"tool":[137],"AVISPA.":[138],"completes":[142],"round":[145],"just":[147],"31.337":[148],"ms":[149],"by":[150,164],"exchanging":[151],"896":[152],"bits":[153],"two":[155],"messages.":[156],"reduced":[160,169],"computational":[161],"55%,":[162],"73%,":[165],"while":[166],"consumption":[168],"55%":[171],"mean":[174],"value":[175],"existing":[177],"protocols.":[178],"This":[179],"reduction":[180],"costs,":[182],"along":[183],"with":[184],"its":[185],"attack":[186],"resistance":[187],"comparable":[189],"features,":[191],"shows":[192],"robust":[200],"communication.":[204],"Thus,":[205],"can":[209],"be":[210],"applied":[211],"real-time":[214],"EI-enabled":[215],"environment.":[217]},"counts_by_year":[],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2025-12-15T00:00:00"}
