Anonymous Key-Agreement Protocol for V2G Environment Within Social Internet of Vehicles

被引:14
作者
Ahmed, Shafiq [1 ]
Kumari, Saru [2 ]
Saleem, Muhammad Asad [1 ]
Agarwal, Kadambri [3 ]
Mahmood, Khalid [1 ]
Yang, Ming-Hour [4 ]
机构
[1] COMSATS Univ Islamabad Sahiwal, Dept Comp Sci, Sahiwal 57000, Pakistan
[2] Chaudhary Charan Singh Univ Meerut, Dept Math, Meerut 250001, Uttar Pradesh, India
[3] Bhagwati Inst Technol & Sci, Dept Comp Sci & Engn, Ghaziabad 201302, India
[4] Chung Yuan Christian Univ, Dept Informat & Comp Engn, Taoyuan 32023, Taiwan
关键词
Vehicle-to-grid; Protocols; Privacy; Authentication; Internet of Things; authentication protocol; V2G; SIoT; smart grid; electric vehicles; PRIVACY-PRESERVING AUTHENTICATION; WIRELESS SENSOR NETWORKS; USER AUTHENTICATION; SCHEME; COMMUNICATION; ARCHITECTURE; MANAGEMENT; SECURITY; DESIGN;
D O I
10.1109/ACCESS.2020.3003298
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The blend of Internet of Things (IoT) and social networking has introduced the emerging notion of social Internet of Things, which is bringing advancements in the operation of concerned industries. There are various prevailing applications of social internet of things; smart grid is one of them. The smart grid is considered as economical robust and intuitive replacement of the conventional grid. However, smart grid experiences two significant challenges, i.e. privacy and security. This article is dedicated to resolve the privacy and security concerns for the vehicle to grid networks to facilitate their large-scale integration with smart grids. As anticipation, a vigorous key agreement protocol is introduced to achieve mutual authentication with an aided feature of user anonymity. Moreover, efficiency in terms of computation, communication and storage needs to be taken care for resource-constrained infrastructure like vehicle to grid network. We have introduced a lightweight key agreement protocol using lightweight cryptographic operations such as exclusive-OR and hash etc. This protocol is validated through a formal security model. An informal security analysis is also elaborated to present the security strength of our protocol against well-known attacks. Furthermore, we have implemented all the cryptographic operations used at trusted agent's side on a desktop system, while the operations used at battery vehicle unit's side are implemented on an Arduino to get the experimental results. In the end, we have presented a performance analysis to compare the performance of our protocol with related ones. This comparison highlights that our protocol is not only lightweight but also efficient in terms of communication and storage cost of related protocols.
引用
收藏
页码:119829 / 119839
页数:11
相关论文
共 43 条
[11]   A conceptual framework for the vehicle-to-grid (V2G) implementation [J].
Guille, Christophe ;
Gross, George .
ENERGY POLICY, 2009, 37 (11) :4379-4390
[12]   A Survey on Smart Grid Potential Applications and Communication Requirements [J].
Gungor, V. Cagri ;
Sahin, Dilan ;
Kocak, Taskin ;
Ergut, Salih ;
Buccella, Concettina ;
Cecati, Carlo ;
Hancke, Gerhard P. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) :28-42
[13]   Smart Grid Technologies: Communication Technologies and Standards [J].
Gungor, Vehbi C. ;
Sahin, Dilan ;
Kocak, Taskin ;
Ergut, Salih ;
Buccella, Concettina ;
Cecati, Carlo ;
Hancke, Gerhard P. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2011, 7 (04) :529-539
[14]   A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks [J].
Guo, Ping ;
Wang, Jin ;
Geng, Xue Hua ;
Kim, Chang Seob ;
Kim, Jeong-Uk .
JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (06) :929-935
[15]   Development of an Optimal Vehicle-to-Grid Aggregator for Frequency Regulation [J].
Han, Sekyung ;
Han, Soohee ;
Sezaki, Kaoru .
IEEE TRANSACTIONS ON SMART GRID, 2010, 1 (01) :65-72
[16]   The Social Internet of Thing (S-IOT)-Based Mobile Group Handoff Architecture and Schemes for Proximity Service [J].
Huang, Chung-Ming ;
Shao, Chih-Hsiang ;
Xu, Shou-Zhi ;
Zhou, Huan .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2017, 5 (03) :425-437
[17]   Comments on "Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment" [J].
Hussain, Sajid ;
Chaudhry, Shehzad Ashraf .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) :10936-10940
[18]   A Provably Secure and Efficient Authenticated Key Agreement Scheme for Energy Internet-Based Vehicle-to-Grid Technology Framework [J].
Irshad, Azeem ;
Usman, Muhammad ;
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Shafiq, Muhammad .
IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, 2020, 56 (04) :4425-4435
[19]   Vehicle-to-grid power fundamentals: Calculating capacity and net revenue [J].
Kempton, W ;
Tomic, J .
JOURNAL OF POWER SOURCES, 2005, 144 (01) :268-279
[20]   Energy Management for Smart Grids With Electric Vehicles Based on Hierarchical MPC [J].
Kennel, Fabian ;
Goerges, Daniel ;
Liu, Steven .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (03) :1528-1537