Physically Secure and Privacy-Preserving Charging Authentication Framework With Data Aggregation in Vehicle-to-Grid Networks

被引:5
作者
Liang, Yangfan [1 ,2 ]
Liu, Yining [3 ]
Zhang, Xianchao [1 ,2 ]
Liu, Gao [4 ]
机构
[1] Jiaxing Univ, Inst Informat Network & Artificial Intelligence, Prov Key Lab Multimodal Perceiving & Intelligent S, Key Lab Med Elect & Digital Hlth Zhejiang Prov, Jiaxing 314001, Peoples R China
[2] Jiaxing Univ, Engn Res Ctr Intelligent Human Hlth Situat Awarene, Jiaxing 314001, Peoples R China
[3] Wenzhou Univ Technol, Sch Data Sci & Artificial Intelligence, Wenzhou 325000, Peoples R China
[4] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Authentication; Vehicle-to-grid; Electricity; Security; Data aggregation; Privacy; Physical unclonable function; Anonymous authentication; privacy-preserving; physical unclonable function; data aggregation; vehicle-to-grid; SCHEME;
D O I
10.1109/TITS.2024.3443171
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
In response to critical security threats such as data tampering, identity impersonation, and channel eavesdropping in Vehicle-to-Grid (V2G) networks, numerous charging authentication schemes have been proposed. However, these schemes either lack sufficient anonymity, physical security, or electricity consumption data aggregation for electricity dispatch. In light of these considerations, we propose a comprehensive solution-a physically secure and privacy-preserving charging authentication framework with data aggregation, comprising two foundational schemes. The first scheme introduces a fully anonymous authentication system. In this approach, an Electric Vehicle (EV) seeking charging generates a random signature for its charging request. Subsequently, a Charging Station (CS) verifies the signature, granting charging services upon successful validation. Notably, this process guarantees the EV's real identity remains undisclosed, even to the Control Center (CC). Moreover, this scheme also addresses potential physical attacks through the incorporation of a physical unclonable function. The second scheme involves a privacy-preserving data aggregation scheme, aggregating total electricity consumption of CSs in a given area while simultaneously preserving individual CSs' electricity consumption data from potential leakage. Subsequently, the aggregated electricity consumption data is transmitted back to the CC, enabling efficient electricity coordination. A detailed security and privacy analysis demonstrates that our proposed framework meets intended security and privacy objectives. The final performance evaluation underscores the advantages of our proposed framework in comparison with related work.
引用
收藏
页码:18831 / 18846
页数:16
相关论文
共 53 条
  • [1] Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections
    Abdallah, Asmaa
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (03) : 2615 - 2629
  • [2] [Anonymous], 2023, PYTHON FUZZY EXTRACT
  • [3] [Anonymous], 2023, PYPUF
  • [4] [Anonymous], 2023, ARBITERPUF
  • [5] EV-PUF: Lightweight Security Protocol for Dynamic Charging System of Electric Vehicles Using Physical Unclonable Functions
    Babu, Ponnuru Raveendra
    Reddy, Alavalapati Goutham
    Palaniswamy, Basker
    Das, Ashok Kumar
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (05): : 3791 - 3807
  • [6] Robust Authentication Protocol for Dynamic Charging System of Electric Vehicles
    Babu, Ponnuru Raveendra
    Amin, Ruhul
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    Susilo, Willy
    Park, YoungHo
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (11) : 11338 - 11351
  • [7] A Group Signature Scheme With Selective Linkability and Traceability for Blockchain-Based Data Sharing Systems in E-Health Services
    Bao, Zijian
    He, Debiao
    Wang, Huaqun
    Luo, Min
    Peng, Cong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (23) : 21115 - 21128
  • [8] Cao L., 2023, IACR CRYPTOLEPRINT A, P1248
  • [9] Efficient Revocable Anonymous Authentication Mechanism for Edge Intelligent Controllers
    Cao, Zhong
    Chen, Zhuo
    Shang, Wenli
    Zhu, Yongdong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (12) : 10357 - 10367
  • [10] Efficient Attribute-Based Signature With Collusion Resistance for Internet of Vehicles
    Chen, Biwen
    Xiang, Tao
    Li, Xiaoguo
    Zhang, Mingwu
    He, Debiao
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (06) : 7844 - 7856