A Novel Privacy-Preserving Authentication Scheme for V2G Networks

被引:41
作者
Su, Yixin [1 ]
Shen, Gang [1 ,2 ]
Zhang, Mingwu [2 ,3 ,4 ,5 ]
机构
[1] Wuhan Univ Technol, Sch Automat, Wuhan 430070, Peoples R China
[2] Hubei Univ Technol, Sch Comp, Wuhan 430068, Peoples R China
[3] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guilin 541004, Peoples R China
[4] State Key Lab Cryptol, Beijing 100878, Peoples R China
[5] China Univ Geosci, Hubei Key Lab Intelligent Geoinformat Proc, Wuhan 430074, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2020年 / 14卷 / 02期
基金
中国国家自然科学基金;
关键词
Vehicle-to-grid; Authentication; Privacy; Protocols; Cascading style sheets; Elliptic curve; lightweight authentication; privacy-preserving; V2G networks; PARTIALLY BLIND SIGNATURES; COMMUNICATION; SECURE;
D O I
10.1109/JSYST.2019.2932127
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As we acknowledge that vehicle-to-grid (V2G) network holds obvious predominance in economic benefits, it attracts wide attentions of power system and electric vehicle (EV) users. However, lots of security issues hinder its further development. For example, many existing V2G schemes use the bilinear pairing to implement authentication protocol, resulting in high computational costs. In addition, the system master key in the existing V2G scheme is generated independently by a trusted third party, so the system master key is vulnerable to leakage if the third party is compromised by the adversary. In this article, we propose a novel privacy-preserving authentication scheme for V2G networks. Specifically, this scheme employs the nonsupersingular elliptic curve to construct a lightweight authentication protocol for EV and smart grid. Meanwhile, system master key in the proposed scheme is generated by the key agreement protocol, i.e., a protocol that is constructed using a secure two-party computation between the third party authority and the dispatching center. Security analysis shows that the proposed scheme is provably secure under the random oracle model. Compared with related schemes, the proposed scheme can not only improve the authentication efficiency of V2G networks, but also prevent internal attacker. Experimental results indicate that our scheme is of practical significance for V2G networks.
引用
收藏
页码:1963 / 1971
页数:9
相关论文
共 34 条
[1]   Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections [J].
Abdallah, Asmaa ;
Shen, Xuemin .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (03) :2615-2629
[2]  
[Anonymous], 2017, IEEE T DEPENDABLE SE
[3]  
[Anonymous], 2012, CYBERSPACE SAFETY SE
[4]   Cyber-Physical Device Authentication for the Smart Grid Electric Vehicle Ecosystem [J].
Chan, Aldar C. -F. ;
Zhou, Jianying .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (07) :1509-1517
[5]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[6]   ID-based restrictive partially blind signatures and applications [J].
Chen, Xiaofeng ;
Zhang, Fangguo ;
Liu, Shengli .
JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (02) :164-171
[7]   Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding [J].
Cheng, Chi ;
Lee, Jemin ;
Jiang, Tao ;
Takagi, Tsuyoshi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) :993-1002
[8]  
Eiza M. H., 2016, P IEEE INT C COMM SY, P1
[9]   Integrating Power Systems, Transport Systems and Vehicle Technology for Electric Mobility Impact Assessment and Efficient Control [J].
Galus, Matthias D. ;
Waraich, Rashid A. ;
Noembrini, Fabrizio ;
Steurs, Karel ;
Georges, Gil ;
Boulouchos, Konstantinos ;
Axhausen, Kay W. ;
Andersson, Goeran .
IEEE TRANSACTIONS ON SMART GRID, 2012, 3 (02) :934-949
[10]   Privacy preservation for V2G networks in smart grid: A survey [J].
Han, Wenlin ;
Xiao, Yang .
COMPUTER COMMUNICATIONS, 2016, 91-92 :17-28