A Novel Privacy-Preserving Authentication Scheme for V2G Networks

被引:36
|
作者
Su, Yixin [1 ]
Shen, Gang [1 ,2 ]
Zhang, Mingwu [2 ,3 ,4 ,5 ]
机构
[1] Wuhan Univ Technol, Sch Automat, Wuhan 430070, Peoples R China
[2] Hubei Univ Technol, Sch Comp, Wuhan 430068, Peoples R China
[3] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guilin 541004, Peoples R China
[4] State Key Lab Cryptol, Beijing 100878, Peoples R China
[5] China Univ Geosci, Hubei Key Lab Intelligent Geoinformat Proc, Wuhan 430074, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2020年 / 14卷 / 02期
基金
中国国家自然科学基金;
关键词
Vehicle-to-grid; Authentication; Privacy; Protocols; Cascading style sheets; Elliptic curve; lightweight authentication; privacy-preserving; V2G networks; PARTIALLY BLIND SIGNATURES; COMMUNICATION; SECURE;
D O I
10.1109/JSYST.2019.2932127
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As we acknowledge that vehicle-to-grid (V2G) network holds obvious predominance in economic benefits, it attracts wide attentions of power system and electric vehicle (EV) users. However, lots of security issues hinder its further development. For example, many existing V2G schemes use the bilinear pairing to implement authentication protocol, resulting in high computational costs. In addition, the system master key in the existing V2G scheme is generated independently by a trusted third party, so the system master key is vulnerable to leakage if the third party is compromised by the adversary. In this article, we propose a novel privacy-preserving authentication scheme for V2G networks. Specifically, this scheme employs the nonsupersingular elliptic curve to construct a lightweight authentication protocol for EV and smart grid. Meanwhile, system master key in the proposed scheme is generated by the key agreement protocol, i.e., a protocol that is constructed using a secure two-party computation between the third party authority and the dispatching center. Security analysis shows that the proposed scheme is provably secure under the random oracle model. Compared with related schemes, the proposed scheme can not only improve the authentication efficiency of V2G networks, but also prevent internal attacker. Experimental results indicate that our scheme is of practical significance for V2G networks.
引用
收藏
页码:1963 / 1971
页数:9
相关论文
共 50 条
  • [21] A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things
    Park, Kisung
    Park, Youngho
    Das, Ashok Kumar
    Yu, Sungjin
    Lee, Joonyoung
    Park, Yohan
    IEEE ACCESS, 2019, 7 : 76812 - 76832
  • [22] A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs
    Nandy, Tarak
    Idris, Mohd Yamani Idna
    Noor, Rafidah Md
    Wahab, Ainuddin Wahid Abdul
    Bhattacharyya, Sananda
    Kolandaisamy, Raenu
    Yahuza, Muktar
    IEEE SENSORS JOURNAL, 2021, 21 (18) : 20998 - 21011
  • [23] A Privacy-Preserving Authentication and Pseudonym Revocation Scheme for VANETs
    Qi, Jiayu
    Gao, Tianhan
    IEEE ACCESS, 2020, 8 : 177693 - 177707
  • [24] P6V2G: a privacy-preserving V2G scheme for two-way payments and reputation
    Schwerdt R.
    Nagel M.
    Fetzer V.
    Gräf T.
    Rupp A.
    Energy Informatics, 2019, 2 (Suppl 1)
  • [25] A Secure and Privacy-Preserving Dynamic Aggregation Mechanism for V2G System
    Qu, Xiaodong
    Kong, Qinglei
    Yin, Feng
    Xu, Leixi
    2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,
  • [26] PPAD-W: A Novel Privacy-Preserving Authentication With Dynamic IPs Window for IoV Networks
    Ibrahim, Sarhang Jamal
    Beitollahi, Hakem
    IEEE ACCESS, 2024, 12 : 164737 - 164749
  • [27] A Privacy-Preserving Authenticated Key Exchange Protocol for V2G Communications Using SSI
    Parameswarath, Rohini Poolat
    Gope, Prosanta
    Sikdar, Biplab
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (11) : 14771 - 14786
  • [28] A privacy-preserving mutual authentication scheme for group communication in VANET
    Nath, Himun Jyoti
    Choudhury, Hiten
    COMPUTER COMMUNICATIONS, 2022, 192 : 357 - 372
  • [29] Privacy-preserving authentication scheme based on zero trust architecture
    Tang, Fei
    Ma, Chunliang
    Cheng, Kefei
    DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (05) : 1211 - 1220
  • [30] A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks
    Wang, Changji
    Yuan, Yuan
    Wu, Jiayuan
    SENSORS, 2017, 17 (06):