A Novel Privacy-Preserving Authentication Scheme for V2G Networks

被引:36
|
作者
Su, Yixin [1 ]
Shen, Gang [1 ,2 ]
Zhang, Mingwu [2 ,3 ,4 ,5 ]
机构
[1] Wuhan Univ Technol, Sch Automat, Wuhan 430070, Peoples R China
[2] Hubei Univ Technol, Sch Comp, Wuhan 430068, Peoples R China
[3] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guilin 541004, Peoples R China
[4] State Key Lab Cryptol, Beijing 100878, Peoples R China
[5] China Univ Geosci, Hubei Key Lab Intelligent Geoinformat Proc, Wuhan 430074, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2020年 / 14卷 / 02期
基金
中国国家自然科学基金;
关键词
Vehicle-to-grid; Authentication; Privacy; Protocols; Cascading style sheets; Elliptic curve; lightweight authentication; privacy-preserving; V2G networks; PARTIALLY BLIND SIGNATURES; COMMUNICATION; SECURE;
D O I
10.1109/JSYST.2019.2932127
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As we acknowledge that vehicle-to-grid (V2G) network holds obvious predominance in economic benefits, it attracts wide attentions of power system and electric vehicle (EV) users. However, lots of security issues hinder its further development. For example, many existing V2G schemes use the bilinear pairing to implement authentication protocol, resulting in high computational costs. In addition, the system master key in the existing V2G scheme is generated independently by a trusted third party, so the system master key is vulnerable to leakage if the third party is compromised by the adversary. In this article, we propose a novel privacy-preserving authentication scheme for V2G networks. Specifically, this scheme employs the nonsupersingular elliptic curve to construct a lightweight authentication protocol for EV and smart grid. Meanwhile, system master key in the proposed scheme is generated by the key agreement protocol, i.e., a protocol that is constructed using a secure two-party computation between the third party authority and the dispatching center. Security analysis shows that the proposed scheme is provably secure under the random oracle model. Compared with related schemes, the proposed scheme can not only improve the authentication efficiency of V2G networks, but also prevent internal attacker. Experimental results indicate that our scheme is of practical significance for V2G networks.
引用
收藏
页码:1963 / 1971
页数:9
相关论文
共 50 条
  • [11] PPVC: Towards a Personalized Local Differential Privacy-Preserving Scheme for V2G Charging Networks
    Qin, Peng
    Wang, Lina
    MATHEMATICS, 2023, 11 (20)
  • [12] Effective charging identity authentication scheme based on fog computing in V2G networks
    Xia, Zhuoqun
    Fang, Zhenwei
    Gu, Ke
    Wang, Jing
    Tan, Jingjing
    Wang, Guanghui
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [13] Efficient, Secure, and Privacy-Preserving PMIPv6 Protocol for V2G Networks
    Eiza, Mahmoud Hashem
    Shi, Qi
    Marnerides, Angelos K.
    Owens, Thomas
    Ni, Qiang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (01) : 19 - 33
  • [14] Conditional Privacy-Preserving Anonymous Authentication Scheme With Forward Security in Vehicle-to-Grid Networks
    Wang, Qinglong
    Ou, Min
    Yang, Yun
    Duan, Zongtao
    IEEE ACCESS, 2020, 8 : 217592 - 217602
  • [15] An Efficient Blockchain-Based Authentication Scheme for Energy-Trading in V2G Networks
    Aggarwal, Shubhani
    Kumar, Neeraj
    Gope, Prosanta
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (10) : 6971 - 6980
  • [16] A Privacy-Preserving Aggregation Scheme With Continuous Authentication for Federated Learning in VANETs
    Feng, Xia
    Wang, Xiaofeng
    Liu, Haiyang
    Yang, Haowei
    Wang, Liangmin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (07) : 9465 - 9477
  • [17] Efficient Privacy-Preserving Authentication in Wireless Mobile Networks
    Jo, Hyo Jin
    Paik, Jung Ha
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (07) : 1469 - 1481
  • [18] PMQC: A Privacy-Preserving Multi-Quality Charging Scheme in V2G network
    He, Miao
    Zhang, Kuan
    Shen, Xuemin
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 675 - 680
  • [19] Anonymous and Efficient Authentication Scheme for Privacy-Preserving Distributed Learning
    Jiang, Yili
    Zhang, Kuan
    Qian, Yi
    Zhou, Liang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2227 - 2240
  • [20] An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks
    Zhou, Yousheng
    Zhao, Xiaofeng
    Jiang, Yi
    Shang, Fengjun
    Deng, Shaojiang
    Wang, Xiaojun
    SENSORS, 2017, 17 (12)