Andreas Unterweger, Fabian Knirsch, Clemens Brunner and Dominik Engel (Center for Secure Energy Informatics, Salzburg University of Applied Sciences, Puch bei Hallein, Austria)

The increasing amount of electric vehicles and a growing electric vehicle ecosystem is becoming a highly heterogeneous environment with a large number of participants that interact and communicate. Finding a charging station, performing vehicle-to-vehicle charging or processing payments poses privacy threats to customers as their location and habits can be traced. In this paper, we present a privacy-preserving solution for grid-to-vehicle charging, vehicle-to-grid charging and vehicle to-vehicle charging, that allows for finding the right charging option in a competitive market environment and that allows for built-in payments with adjustable and limited risk for both, producers and consumers of electricity. The proposed approach builds on blockchain technology and extends a state-of-the-art protocol with payments, while still preserving the privacy of the users. The protocol is evaluated with respect to privacy, risk and scalability. It is shown that pseudonymity and location privacy (against third parties) is guaranteed throughout the protocol, even beyond a single protocol session. In addition, both, risk and scalability can be adjusted based on the used blockchain.

View More Papers

DNS Privacy Vs : Confronting protocol design trade offs...

Mallory Knodel (Center for Democracy and Technology), Shivan Sahib (Salesforce)

Read More

Demo #7: Automated Tracking System For LiDAR Spoofing Attacks...

Yulong Cao, Jiaxiang Ma, Kevin Fu (University of Michigan), Sara Rampazzi (University of Florida), and Z. Morley Mao (University of Michigan) Best Demo Award Runner-up ($200 cash prize)!

Read More

PyPANDA: Taming the PANDAmonium of Whole System Dynamic Analysis

Luke Craig, Tim Leek (MIT Lincoln Laboratory), Andrew Fasano, Tiemoko Ballo (MIT Lincoln Laboratory, Northeastern University), Brendan Dolan-Gavitt (New York University), William Robertson (Northeastern University)

Read More

(Short) WIP: End-to-End Analysis of Adversarial Attacks to Automated...

Hengyi Liang, Ruochen Jiao (Northwestern University), Takami Sato, Junjie Shen, Qi Alfred Chen (UC Irvine), and Qi Zhu (Northwestern University) Best Short Paper Award Winner!

Read More