Anonymous Key-Agreement Protocol for V2G Environment Within Social Internet of Vehicles

被引:14
作者
Ahmed, Shafiq [1 ]
Kumari, Saru [2 ]
Saleem, Muhammad Asad [1 ]
Agarwal, Kadambri [3 ]
Mahmood, Khalid [1 ]
Yang, Ming-Hour [4 ]
机构
[1] COMSATS Univ Islamabad Sahiwal, Dept Comp Sci, Sahiwal 57000, Pakistan
[2] Chaudhary Charan Singh Univ Meerut, Dept Math, Meerut 250001, Uttar Pradesh, India
[3] Bhagwati Inst Technol & Sci, Dept Comp Sci & Engn, Ghaziabad 201302, India
[4] Chung Yuan Christian Univ, Dept Informat & Comp Engn, Taoyuan 32023, Taiwan
来源
IEEE ACCESS | 2020年 / 8卷
关键词
Vehicle-to-grid; Protocols; Privacy; Authentication; Internet of Things; authentication protocol; V2G; SIoT; smart grid; electric vehicles; PRIVACY-PRESERVING AUTHENTICATION; WIRELESS SENSOR NETWORKS; USER AUTHENTICATION; SCHEME; COMMUNICATION; ARCHITECTURE; MANAGEMENT; SECURITY; DESIGN;
D O I
10.1109/ACCESS.2020.3003298
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The blend of Internet of Things (IoT) and social networking has introduced the emerging notion of social Internet of Things, which is bringing advancements in the operation of concerned industries. There are various prevailing applications of social internet of things; smart grid is one of them. The smart grid is considered as economical robust and intuitive replacement of the conventional grid. However, smart grid experiences two significant challenges, i.e. privacy and security. This article is dedicated to resolve the privacy and security concerns for the vehicle to grid networks to facilitate their large-scale integration with smart grids. As anticipation, a vigorous key agreement protocol is introduced to achieve mutual authentication with an aided feature of user anonymity. Moreover, efficiency in terms of computation, communication and storage needs to be taken care for resource-constrained infrastructure like vehicle to grid network. We have introduced a lightweight key agreement protocol using lightweight cryptographic operations such as exclusive-OR and hash etc. This protocol is validated through a formal security model. An informal security analysis is also elaborated to present the security strength of our protocol against well-known attacks. Furthermore, we have implemented all the cryptographic operations used at trusted agent's side on a desktop system, while the operations used at battery vehicle unit's side are implemented on an Arduino to get the experimental results. In the end, we have presented a performance analysis to compare the performance of our protocol with related ones. This comparison highlights that our protocol is not only lightweight but also efficient in terms of communication and storage cost of related protocols.
引用
收藏
页码:119829 / 119839
页数:11
相关论文
共 43 条
[1]   Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections [J].
Abdallah, Asmaa ;
Shen, Xuemin .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (03) :2615-2629
[2]   Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment [J].
Ali, Rifaqat ;
Pal, Arup Kumar .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (08) :3655-3672
[3]  
[Anonymous], 2019, ARXIV190401171
[4]   A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid [J].
Baek, Joonsang ;
Quang Hieu Vu ;
Liu, Joseph K. ;
Huang, Xinyi ;
Xiang, Yang .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2015, 3 (02) :233-244
[5]   Achieving Controllability of Electric Loads [J].
Callaway, Duncan S. ;
Hiskens, Ian A. .
PROCEEDINGS OF THE IEEE, 2011, 99 (01) :184-199
[6]   Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems [J].
Chaudhry, Shehzad Ashraf ;
Shon, Taeshik ;
Al-Turjman, Fadi ;
Alsharif, Mohammed H. .
COMPUTER COMMUNICATIONS, 2020, 153 :527-537
[7]   A Secure Authentication Protocol for Internet of Vehicles [J].
Chen, Chien-Ming ;
Xiang, Bin ;
Liu, Yining ;
Wang, King-Hang .
IEEE ACCESS, 2019, 7 :12047-12057
[8]   Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography [J].
Choi, Younsung ;
Lee, Donghoon ;
Kim, Jiye ;
Jung, Jaewook ;
Nam, Junghyun ;
Won, Dongho .
SENSORS, 2014, 14 (06) :10081-10106
[9]   A Lightweight Message Authentication Scheme for Smart Grid Communications [J].
Fouda, Mostafa M. ;
Fadlullah, Zubair Md ;
Kato, Nei ;
Lu, Rongxing ;
Shen, Xuemin .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) :675-685
[10]   Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key [J].
Ghani, Anwar ;
Mansoor, Khwaja ;
Mehmood, Shahid ;
Chaudhry, Shehzad Ashraf ;
Rahman, Arif Ur ;
Saqib, Malik Najmus .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (16)