Manisha.G-Remote Monitoring of Electric Vehicle Charging Stations in Smart Campus Parking Lot

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131

SMART CHARGING STATION FOR ELECTRIC CARS USING RENEWABLE


ENERGY
Dr.P.Meena Kumari1 , P.Mamatha1
Manisha.G2, PrathyushaA2, Maheshwari.A2
1. Faculty, AVN Institute of Engineering and Technology, Hyderabad
2. UG Scolor AVN Institute of Engineering and Technology, Hyderabad

ABSTRACT: This project is tied in with records the clients charging log and past
working up a device to charge Electrical instalments. This system can in like manner
vehicles on Solar based influence be used in IT associations or work
framework and support online cash environments in their parking lot places.
instalments for versatility. The purpose KEYWORDS: Secured user credentials,
behind the endeavor is to decide the issues embedded framework, cloud data storage,
glanced in charging issues of electric charging time counter
vehicles transportation divisions. Wrong 1. INTRODUCTION At the present
anticipation utilizing remote payments is problem of interruption and security issues
one of the points of the present has expanded in this creating world. There
investigation. There are a couple of are a couple of observing charging stations,
watching structures, for instance, tesla for instance, charging at some bunks etc.
charging stations, etc. We give the live IoT Regardless, today paying little heed to
access to our charging stations. We in like where the client is voyaging we can even
manner give battery status notice to the now discover more explorers on their own
client by giving vehicle charging vehicles with the current innovation
notification which can continue refreshing technology (fuel). A force charging system
the client of their vehicle condition. It is critical in different fields of our condition,
moreover gives the live area of the vehicle for instance, an hourly instalment for
careful charging station areas and every charging, power-based instalments, etc. The
single other detail to the office, along this vast majority of the charging stations
giving the security alternatives to the frameworks are over the top expensive for
vehicle's proprietors and the ensuring the working class gatherings to set up such Kind
security of the proper instalments. This of structure. The normal gatherings are
handles issues like cheating in the accusing using IoT based insignificant expense
stations of the proprietors and moreover charging structures which will help them

Volume IX, Issue II, February/2022 Page No: 146


JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131

with making sure about their installment and the vehicle. To concentrate on the security
qualifications of their advantage, etc. i. As of the understudies and furthermore to settle
we realize that the world is ascending with different issues like the area of the vehicle.
each and every new development and there What's more, our structure will alarm if any
is an incredible breadth for development in unapproved card is put as an alert.
the field of EV innovation. There are a huge Guardians might want to know whether their
amount of charging issues and various children have reached securely on schedule
arrangement in our structures, there is a and to guarantee if everything was protected
prerequisite for security in instalments due during the movement and furthermore to
to increase in the multifaceted nature of our screen their children our system will give
human culture and association. ii. the area and furthermore the login and
Consequently, all the clients of an logout subtleties The guardians will get a
association give fundamental noteworthiness warning in regards to the vehicle status and
to security activities. In case a system has along these lines guaranteeing the wellbeing
extraordinary security, by then that structure viewpoint just as the constant update with
is supported by the client. Our structure live area
contains Security and seeing as a spine for 3. RELATED WORKS We have
its rule. iii. The security given by our discovered various papers identified with the
structure is to keep a track on the Previous security framework. Distinctive security
history, and to give an IoT access of the frameworks utilized for various purposes.
vehicle to the charging station association [1]. This paper grants the Wireless Power
just as to the clients, to avoid the area of any Transfer (WPT) topology based on
unapproved and to give unprecedented Inductive Power Transfer (IPT) with
assistance with the occurrence of emergency adopted Super Capacitor (SC) energy
conditions. storage. The proffered topology is fitting for
2. PROBLEM DEFINITION The essential dynamic charging Electric Vehicles (EVs),
issues that our system will fathom are to where oscillations of energy must be
check the invalid reasons given by the concocted without placing extravagant strain
drivers for the time deferral to show up at on the utility grid or EV battery. [2]. —
the goal on schedule. To check if any Vehicle-to-layer (V2L) technology sanctions
unapproved individual endeavors to get into bidirectional charging of the electric vehicle

Volume IX, Issue II, February/2022 Page No: 147


JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131

(EV) and expedites power layer ancillary evaluation is a meaningful indicator that
assistance. Nonetheless, battery packet in relates to driving ranges of electric vehicles
EV may advance in cell dynamic variations (EV). The relationship between open circuit
over time. This is due to the formative voltage (OCV) and SoC plays an essential
complexity & electrochemical orderings in role in SoC estimation for lithium-ion
the battery pack. These diversifications may batteries. To compare with the traditional
arise in V2L systems due to: earliest, incremental OCV (IO) inspection and the
additional charging and discharging low current OCV (LO) test, a novel OCV
successions to power layer; second, external test which combines IO test with LO test
wrecks; and third, long unfolding’s to high (CIL) is proposed in this paper writing.
temperatures. A fastidious reference of these Based on the unimpeachable parameters
diversifications is due to defective sensors. online identification of the dual polarization
Wherefore, it can be pleaded that the battery (DP) battery model, two SoC estimation
packs in EV are highly reliant on the algorithms are linked on the accuracy,
monitoring of these in-cell mutations and robustness and concurrence speed for the
their consequence of propagation with each entire SoC region. Meanwhile, the
incriminated component. In this article, a correlative study of the three OCVSoC
prognostication based scheme to showcase relationships fits by the corresponding OCV
the health of variation induced sensors is tests is contested in terms of the SoC online
proposed. First, a propagation model is estimating beneath various temperatures.
refined to predict the in-cell mutations of a [4]. While wide scale deployment of Plug-in
battery pack by intelligent the covariance Electric Vehicles (PEVs) offers assuring
using a medianbased expectation. Second, a advantages such as environmental gains,
surmise model is developed to distinguish energy security and economic stability, it
and divide each variation. This is obtained also poses certain cybersecurity narrated
by deriving a conditional probability-based challenges. Unlike power grid security, PEV
density function for the computations. The cybersecurity is significantly under-
proposed monitoring framework is evaluated explored. However, cyber-attacks on PEVs
using experimental measurements collected may lead to destructive positions such as
from Lithium-ion battery pack in EVs. [3]. out-ofservice EVs via Denial-of-Charging
The infallible state of charge (SoC) online (DOC) or battery pack harm via

Volume IX, Issue II, February/2022 Page No: 148


JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131

overcharging. In this work, we attempt to of the vehicle will be thought of and if any
address this issue by reconnoitering control- bewilder, by then the notice is sent to the
oriented passageways for PEV concerned power and the association office,
cybersecurity. Indicatively, we focus on just as the client and there the subtleties of
designing algorithms for detecting cyber- the instalment, can be checked through
attacks that can potentially affect PEV perception.
battery packs during charging. We discuss The input of the vehicle charger may contain
two algorithms: (i) Static Detector which an energy from the power source or from the
appropriates only measured variables, and solar power plant itself that will be based on
(ii) Dynamic Detector which utilizes the the availability of source will get
conversance of system dynamics along with automatically switch. The charging docking
the measurements. Furthermore, we intend a cable contains relay based magnetic sensing
filter-based design approach for the circuit which will automatically detects the
Dynamic Detector that analyses a multi- charging plugged in or plugged out and once
objective criteria including stability, if the user connects the charging cable in
robustness, and attack sensitivity then the framework will come out of sleep
IMPLEMENTATION mode and starts charging timer by getting
user credential’s.
The IoT sockets plays very important role in
the user credential’s and also if it denies any
user he can’t able to override the conditions
by his own that has to be verify by the
admin side itself
APPLICATIONS
a. It is used as power charging station.
b. It can also be used as fast charging
station.
The structure has appeared in the above c. It can be used for solar harvesting based
square chart. The essential principle of the charging
system is the deduction of client charging d. It can be more portable.
beginning time and charger unplugging time

Volume IX, Issue II, February/2022 Page No: 149


JASC: Journal of Applied Science and Computations ISSN NO: 1076-5131

CONCLUSION EV charging using IoT Variation Analysis of Vehicle Batteries


System is really essential for basic electrical Member, IEEE, and Jimmy C.-H. Peng ,
vehicles, utilization of Web application is Member, 2020 IEEE.
helpful for monitoring clients previous [3] YUAN LI1, 2, HAO GUO3, FEI QI4,
activities easily. It tends to work in IoT ZHIPING GUO5, MEIYING LI5,
computerized, semi- automated and manual “Comparative Study of the Influence of
mode.it is economically affordable and easy Open Circuit Voltage Tests on State of
to use for the normal authority Charge Online Estimation for Lithium-ion
REFERENCES Batteries”, 2020.
[1] Steven Ruddell, Udaya K. Madawala, [4] Satadru Dey, Member, IEEE, and
“A Wireless EV Charging Topology with Munmun Khanra, Member, IEEE,
Integrated Energy Storage”, IEEE, Duleepa “Cybersecurity of Plug-in Electric Vehicles:
J. Thrimawithana, Member, Cyber Attack Detection During Charging”,
IEEE,2020(references) International Journal of Scientific &
[2] Haris M. Khalid, “Bidirectional Engineering Research, 2020 IEEE.
Charging in V2G Systems: An In-Cell

Volume IX, Issue II, February/2022 Page No: 150

You might also like