A Novel Privacy-Preserving Authentication Scheme for V2G Networks

被引:36
|
作者
Su, Yixin [1 ]
Shen, Gang [1 ,2 ]
Zhang, Mingwu [2 ,3 ,4 ,5 ]
机构
[1] Wuhan Univ Technol, Sch Automat, Wuhan 430070, Peoples R China
[2] Hubei Univ Technol, Sch Comp, Wuhan 430068, Peoples R China
[3] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guilin 541004, Peoples R China
[4] State Key Lab Cryptol, Beijing 100878, Peoples R China
[5] China Univ Geosci, Hubei Key Lab Intelligent Geoinformat Proc, Wuhan 430074, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2020年 / 14卷 / 02期
基金
中国国家自然科学基金;
关键词
Vehicle-to-grid; Authentication; Privacy; Protocols; Cascading style sheets; Elliptic curve; lightweight authentication; privacy-preserving; V2G networks; PARTIALLY BLIND SIGNATURES; COMMUNICATION; SECURE;
D O I
10.1109/JSYST.2019.2932127
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As we acknowledge that vehicle-to-grid (V2G) network holds obvious predominance in economic benefits, it attracts wide attentions of power system and electric vehicle (EV) users. However, lots of security issues hinder its further development. For example, many existing V2G schemes use the bilinear pairing to implement authentication protocol, resulting in high computational costs. In addition, the system master key in the existing V2G scheme is generated independently by a trusted third party, so the system master key is vulnerable to leakage if the third party is compromised by the adversary. In this article, we propose a novel privacy-preserving authentication scheme for V2G networks. Specifically, this scheme employs the nonsupersingular elliptic curve to construct a lightweight authentication protocol for EV and smart grid. Meanwhile, system master key in the proposed scheme is generated by the key agreement protocol, i.e., a protocol that is constructed using a secure two-party computation between the third party authority and the dispatching center. Security analysis shows that the proposed scheme is provably secure under the random oracle model. Compared with related schemes, the proposed scheme can not only improve the authentication efficiency of V2G networks, but also prevent internal attacker. Experimental results indicate that our scheme is of practical significance for V2G networks.
引用
收藏
页码:1963 / 1971
页数:9
相关论文
共 50 条
  • [41] A Secure Communication Protocol with Privacy-Preserving Monitoring and Controllable Linkability for V2G
    Jiang, Rong
    Lu, Rongxing
    Lai, Chengzhe
    Li, Aiping
    2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016), 2016, : 567 - 572
  • [42] An Efficient Location Privacy-Preserving Authentication Scheme for Cooperative Spectrum Sensing
    Lai, Huibin
    Xu, Li
    Zeng, Yali
    IEEE ACCESS, 2020, 8 : 163472 - 163482
  • [43] PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks
    Zhang, Jing
    Cui, Jie
    Zhong, Hong
    Chen, Zhili
    Liu, Lu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (02) : 722 - 735
  • [44] Improved Privacy-Preserving Authentication Scheme for Roaming Service in Mobile Networks
    Wang, Ding
    Wang, Ping
    Liu, Jing
    2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 3136 - 3141
  • [45] Efficient and privacy-preserving authentication scheme for wireless body area networks
    Shuai, Mengxia
    Liu, Bin
    Yu, Nenghai
    Xiong, Ling
    Wang, Changhui
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [46] An Efficient Conditional Privacy-Preserving Authentication Scheme for the Prevention of Side-Channel Attacks in Vehicular Ad Hoc Networks
    Alshudukhi, Jalawi Sulaiman
    Mohammed, Badiea Abdulkarem
    Al-Mekhlafi, Zeyad Ghaleb
    IEEE ACCESS, 2020, 8 : 226624 - 226636
  • [47] CBACS: A Privacy-Preserving and Efficient Cache-Based Access Control Scheme for Software Defined Vehicular Networks
    Zhang, Xiaoyu
    Zhong, Hong
    Fan, Chunyang
    Bolodurina, Irina
    Cui, Jie
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1930 - 1945
  • [48] Privacy-preserving SVANETs Privacy-preserving Simple Vehicular Ad-hoc Networks
    Hajny, Jan
    Malina, Lukas
    Martinasek, Zdenek
    Zeman, Vaclav
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 267 - 274
  • [49] Privacy-preserving authentication and authorization in networks using blockchain
    Sanap, Asha
    Malwade, Sulakshana Sagar
    Bhosale, Rohini
    Karandikar, Aarti
    Bakare, Anuradha A.
    Langote, Vaishali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B) : 903 - 914
  • [50] An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    He, Debiao
    Zeadally, Sherali
    Xu, Baowen
    Huang, Xinyi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) : 2681 - 2691