{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:45:39Z","timestamp":1775666739069,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T00:00:00Z","timestamp":1576454400000},"content-version":"vor","delay-in-days":15,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"the Guangdong Province Key Research and Development Plan","award":["2019B010137004"],"award-info":[{"award-number":["2019B010137004"]}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U1636215, 61871140, 61572153, 61572492, 61672020"],"award-info":[{"award-number":["U1636215, 61871140, 61572153, 61572492, 61672020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the National Key research and Development Plan","award":["2018YFB0803504"],"award-info":[{"award-number":["2018YFB0803504"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Electric vehicle (EV) is considered eco-friendly with low carbon emission and maintenance costs. Given the current battery and charging technology, driving experience of EVs relies heavily on the availability and reachability of EV charging infrastructure. As the number of charging piles increases, carefully designed arrangement of resources and efficient utilization of the infrastructure is essential to the future development of EV industry. The mobility and distribution of EVs determine the charging demand and the load of power distribution grid. Then, dynamic traffic pattern of numerous interconnected EVs poses great impact on charging plans and charging infrastructure.<\/jats:p><jats:p>In this paper, we introduce the digital twin of a real-world EV by modeling the mobility based on a time series behaviors of EVs to evaluate the charging algorithm and pile arrangement policy. The introduced digital twin EV is a virtually simulated equivalence with same traffic behaviors and charging activities as the EV in real world. The behavior and route choice of EVs is dynamically simulated base on the time-varying driving operations, travel intent, and charging plan in a simulated large-scale charging scenario composed of concurrently moving EVs and correspondingly equipped charging piles. Different EV navigation algorithms and charging algorithms of Internet of Vehicle can be exactly evaluated in the dynamic simulation of the digital twins of the moving EVs and charging infrastructure. Then we analyze the collected data such as energy consumption, charging capacity, charging frequency, and waiting time in queue on both the EV side and the charging pile side to evaluate the charging efficiency. The simulation is used to study the relations between the scheduled charging operation of EVs and the deployment of piles. The proposed model helps evaluate and validate the design of the charging recommendation and the deployment plan regarding to the arrangement and distribution of charging piles.<\/jats:p>","DOI":"10.1186\/s13638-019-1589-8","type":"journal-article","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T14:02:48Z","timestamp":1576504968000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["Time series behavior modeling with digital twin for Internet of Vehicles"],"prefix":"10.1186","volume":"2019","author":[{"given":"Tianle","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiangtao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zongwei","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Fuqiang","family":"Dong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6949-4876","authenticated-orcid":false,"given":"Yu","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,16]]},"reference":[{"key":"1589_CR1","doi-asserted-by":"crossref","unstructured":"J. Lopes, F. Soares, P. Almeida, Integration of electric vehicles in the electric power system. Proc IEEE 168\u2013183 (2011)","DOI":"10.1109\/JPROC.2010.2066250"},{"key":"1589_CR2","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.future.2018.12.054","volume":"95","author":"Z Tian","year":"2019","unstructured":"Z. Tian, S. Su, W. Shi, X. Du, M. Guizani, X. Yu, A data-driven model for future Internet route decision modeling. Future Generation Comput Syst 95, 212\u2013220 (2019)","journal-title":"Future Generation Comput Syst"},{"key":"1589_CR3","unstructured":"Tirez, A.; Luickx, P.; He, X.; Rious, V. Optimal charging schedule of an electric vehicle fleet, 7th International Conference on the European Energy Market (EEM), pp.1-6, 23-25 June 2010."},{"key":"1589_CR4","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-28487-8_21","volume-title":"Intelligent Information and Database Systems","author":"Junghoon Lee","year":"2012","unstructured":"Junghoon Lee, Hye-Jin Kim, Gyung-Leen Park, and Hongbeom Jeon. Genetic algorithm-based charging task scheduler for electric vehicles in smart transportation. Intelligent Information and Database Systems, March, 2012."},{"issue":"1","key":"1589_CR5","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TPWRS.2009.2036481","volume":"25","author":"K Clement","year":"2010","unstructured":"K. Clement, E. Haesen, J. Driesen, The impact of charging plug-in hybrid electric vehicles on the distribution grid[J]. IEEE Transact Power Systems 25(1), 371\u2013380 (2010)","journal-title":"IEEE Transact Power Systems"},{"key":"1589_CR6","doi-asserted-by":"crossref","unstructured":"S. Babaei, D. Steen, T.A. Le, O. Carlson and L. Bertling. Effects of plug-in electric vehicles on distribution systems: a real case of Gothenburg. Innovative Smart Grid Technologies Conference Europe (ISGT Europe), IEEE, 11-13 Oct. 2010.","DOI":"10.1109\/ISGTEUROPE.2010.5638947"},{"key":"1589_CR7","unstructured":"M. Sanchez and P. Manzoni. A java-based ad hoc networks simulator. In Proc. of the SCS Western Multiconference Web-based Simulation Track, Jan. 1999"},{"key":"1589_CR8","unstructured":"Wang, Z.-P & Sun, F.-C & Lin, C. (2006). Computing method of energy consumption in EV typical driving mode. 26. 69-72."},{"key":"1589_CR9","unstructured":"Toepfer, C.: SAE electric vehicle conductive charge coupler, SAE J1772. Society of Automotive Engineers (2009)"},{"key":"1589_CR10","doi-asserted-by":"crossref","unstructured":"J. Haerri, M. Fiore, F. Filali, and C. Bonnet. Vanetmobisim: generating realistic mobility patterns for vanets. In ACM Workshop on Vehicular Ad Hoc Networks (VANET 2006), Los Angeles, California, September 2006.","DOI":"10.1145\/1161064.1161084"},{"issue":"2","key":"1589_CR11","doi-asserted-by":"publisher","first-page":"1584","DOI":"10.1109\/JIOT.2018.2846624","volume":"6","author":"Q Tan","year":"2019","unstructured":"Q. Tan, Y. Gao, J. Shi, X. Wang, B. Fang, Z. Tian, Toward a comprehensive insight into the eclipse attacks of tor hidden services. IEEE Internet Things J 6(2), 1584\u20131593 (April 2019)","journal-title":"IEEE Internet Things J"},{"key":"1589_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/5823439","volume":"2018","author":"Xiang Yu","year":"2018","unstructured":"X. Yu, Z. Tian, J. Qiu, F. Jiang, A data leakage prevention method based on the reduction of confidential and context terms for smart mobile devices. Wireless Commun Mobile Comput https:\/\/doi.org\/10.1155\/2018\/5823439","journal-title":"Wireless Communications and Mobile Computing"},{"key":"1589_CR13","doi-asserted-by":"publisher","first-page":"35355","DOI":"10.1109\/ACCESS.2018.2846590","volume":"6","author":"Zhihong Tian","year":"2018","unstructured":"Z. Tian, Y Cui, L An, S Su, X Yin, L Yin and X Cui. A real-time correlation of host-level events in cyber range service for smart campus. IEEE Access. vol. 6, pp. 35355-35364, 2018. DOI: https:\/\/doi.org\/10.1109\/ACCESS.2018.2846590.","journal-title":"IEEE Access"},{"issue":"12","key":"1589_CR14","doi-asserted-by":"publisher","first-page":"4486","DOI":"10.3390\/s18124486","volume":"18","author":"Mohan Li","year":"2018","unstructured":"M. Li, Y. Sun, Y. Jiang, Z. Tian, Answering the min-cost quality-aware query on multi-sources in sensor-cloud systems. Sensors (2018). https:\/\/doi.org\/10.3390\/s18124486","journal-title":"Sensors"},{"issue":"21","key":"1589_CR15","doi-asserted-by":"publisher","first-page":"30111","DOI":"10.1007\/s11042-018-6938-9","volume":"78","author":"Weihong Han","year":"2018","unstructured":"W. Han, Z. Tian, Z. Huang, S. Li, Y. Jia. Bidirectional self-adaptive resampling in imbalanced big data learning. Multimedia Tools and Applications. 2018. DOI: https:\/\/doi.org\/10.1007\/s11042-018-6938-9.","journal-title":"Multimedia Tools and Applications"},{"key":"1589_CR16","doi-asserted-by":"publisher","first-page":"74854","DOI":"10.1109\/ACCESS.2018.2881422","volume":"6","author":"J Qiu","year":"2018","unstructured":"J. Qiu, Y. Chai, Y. Liu, Z. Gu, S. Li, Z. Tian, Automatic non-taxonomic relation extraction from big data in smart city. IEEE Access 6, 74854\u201374864 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2881422","journal-title":"IEEE Access"},{"issue":"8","key":"1589_CR17","doi-asserted-by":"publisher","first-page":"2440","DOI":"10.3390\/s18082440","volume":"18","author":"Y Wang","year":"2018","unstructured":"Y. Wang, Z. Tian, H. Zhang, S. Su, W. Shi, A privacy preserving scheme for nearest neighbor query. Sensors. 18(8), 2440 (2018) https:\/\/doi.org\/10.3390\/s18082440","journal-title":"Sensors."},{"key":"1589_CR18","doi-asserted-by":"crossref","unstructured":"Chunyuan Kang, Tianle Zhang. Realistic traffic data based mobility modeling and simulation of smart EV. In the 3rd IEEE International Conference on Data Science in Cyberspace (DSC), 2018, pp. 854-857.","DOI":"10.1109\/DSC.2018.00137"},{"issue":"3","key":"1589_CR19","doi-asserted-by":"publisher","first-page":"437","DOI":"10.3390\/app9030437","volume":"9","author":"S Su","year":"2019","unstructured":"S. Su, Y. Sun, X. Gao, J. Qiu, Z. Tian, A correlation-change based feature selection method for IoT equipment anomaly detection. Appl Sci 9(3), 437 (2019) https:\/\/doi.org\/10.3390\/app9030437","journal-title":"Appl Sci"},{"key":"1589_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/7943586","volume":"2018","author":"ZiHan Wang","year":"2018","unstructured":"Z. Wang, C. Liu, J. Qiu, Z. Tian, C. Xiang, Y. Dong, S. Su. Automatically traceback RDP-based targeted ransomware attacks. Wireless Communications and Mobile Computing. 2018. https:\/\/doi.org\/10.1155\/2018\/7943586.","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"2","key":"1589_CR21","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1109\/TPWRD.2012.2236364","volume":"28","author":"J Rolink","year":"2013","unstructured":"J. Rolink, C. Rehtanz, Large-scale modeling of grid-connected electric vehicles. IEEE Transact Power Delivery 28(2), 894\u2013902 (2013)","journal-title":"IEEE Transact Power Delivery"},{"key":"1589_CR22","doi-asserted-by":"publisher","unstructured":"Z. Tian, C. Luo, J. Qiu, X. Du and M. Guizani. A distributed deep learning system for web attack detection on edge devices. IEEE Transactions on Industrial Informatics. 2019. DOI: https:\/\/doi.org\/10.1109\/TII.2019.2938778.","DOI":"10.1109\/TII.2019.2938778"},{"key":"1589_CR23","doi-asserted-by":"crossref","unstructured":"Christoph Aldejohann, Jonas Maasmann, Willi Horenkamp, Fritz Rettberg, Christian Rehtanz. Testing environment for vehicle to grid (V2G) applications for investigating a voltage stability support method. In IEEE Transportation and Electrification Conference and Expo (ITEC), Dearborn 2014","DOI":"10.1109\/ITEC.2014.6861812"},{"key":"1589_CR24","unstructured":"Road vehicles - Vehicle to grid communication interface - Part 1: General information and use-case definition, ISO 15118-1, 2013."},{"key":"1589_CR25","doi-asserted-by":"crossref","unstructured":"M. J. Rutherford and V. Yousefzadeh. The impact of electric vehicle battery charging on distribution transformers. In Applied Power Electronics Conference and Exposition (APEC), 2011 Twenty-Sixth Annual IEEE, 2011, pp. 396-400.","DOI":"10.1109\/APEC.2011.5744627"},{"issue":"7","key":"1589_CR26","doi-asserted-by":"publisher","first-page":"4285","DOI":"10.1109\/TII.2019.2907754","volume":"15","author":"Z Tian","year":"2019","unstructured":"Z. Tian, W. Shi, Y. Wang, C. Zhu, X. Du, S. Su, Y. Sun, N. Guizani, Real time lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Trans Ind Inform 15(7), 4285\u20134294 (2019)","journal-title":"IEEE Trans Ind Inform"},{"key":"1589_CR27","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.ins.2019.04.011","volume":"491","author":"Z Tian","year":"2019","unstructured":"Z. Tian, M. Li, M. Qiu, Y. Sun, S. Su, Block-DEF: a secure digital evidence framework using blockchain. Inform Sci 491, 151\u2013165 (2019). https:\/\/doi.org\/10.1016\/j.ins.2019.04.011","journal-title":"Inform Sci"},{"issue":"6","key":"1589_CR28","doi-asserted-by":"publisher","first-page":"5971","DOI":"10.1109\/TVT.2019.2910217","volume":"68","author":"Z Tian","year":"2019","unstructured":"Z. Tian, X. Gao, S. Su, J. Qiu, X. Du, M. Guizani, Evaluating reputation management schemes of Internet of Vehicles based on evolutionary game theory. IEEE Trans Vehicular Technol 68(6), 5971\u20135980 (2019)","journal-title":"IEEE Trans Vehicular Technol"},{"issue":"11-12","key":"1589_CR29","doi-asserted-by":"publisher","first-page":"2314","DOI":"10.1016\/j.comcom.2007.04.009","volume":"30","author":"Y Xiao","year":"2007","unstructured":"Y. Xiao, V. Rayi, B. Sun, X. Du, F. Hu, M. Galloway, A survey of key management schemes in wireless sensor networks. J Comput Commun 30(11-12), 2314\u20132341 (Sept. 2007)","journal-title":"J Comput Commun"},{"key":"1589_CR30","doi-asserted-by":"crossref","unstructured":"X. Du, Y. Xiao, M. Guizani, and H. H. Chen. An effective key management scheme for heterogeneous sensor networks. Ad Hoc Networks, Elsevier, Vol. 5, Issue 1, pp 24\u201334, Jan. 2007.","DOI":"10.1016\/j.adhoc.2006.05.012"},{"issue":"11","key":"1589_CR31","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/MCOM.2007.4378332","volume":"45","author":"Y Xiao","year":"2007","unstructured":"Y. Xiao, X. Du, J. Zhang, S. Guizani, Internet protocol television (IPTV): the killer application for the next generation internet. IEEE Commun Mag 45(11), 126\u2013134 (Nov. 2007)","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"1589_CR32","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MWC.2008.4599222","volume":"15","author":"X Du","year":"2008","unstructured":"X. Du, H.H. Chen, Security in wireless sensor networks. IEEE Wireless Commun Mag 15(4), 60\u201366 (Aug. 2008)","journal-title":"IEEE Wireless Commun Mag"},{"issue":"3","key":"1589_CR33","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/TWC.2009.060598","volume":"8","author":"X Du","year":"2009","unstructured":"X. Du, M. Guizani, Y. Xiao, H.H. Chen, A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Trans Wireless Commun 8(3), 1223\u20131229 (March 2009)","journal-title":"IEEE Trans Wireless Commun"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1589-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1589-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1589-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T00:11:25Z","timestamp":1607991085000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1589-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1589"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1589-8","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"11 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"271"}}