Robust Revocable Anonymous Authentication for Vehicle to Grid Communications

被引:15
作者
Kilari, Vishnu Teja [1 ]
Yu, Ruozhou [2 ]
Misra, Satyajayant [3 ]
Xue, Guoliang [1 ]
机构
[1] Arizona State Univ, Sch Comp Informat & Decis Syst Engn, Tempe, AZ 85287 USA
[2] North Carolina State Univ, Dept Comp Sci, Raleigh, NC 27606 USA
[3] New Mexico State Univ, Dept Comp Sci, Las Cruces, NM 88003 USA
关键词
Smart grid; V2G communications; anonymous authentication; revocable anonymity; PRIVACY; PROTOCOL;
D O I
10.1109/TITS.2019.2948803
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Electric vehicles can place a significant load on the power grid due to their unscheduled charging events. One way of improving power grid stability is to schedule electric vehicle charging in advance. Before a charging visit, the electric vehicle provides necessary information to request for charging at a charging station, which prepares and reserves the energy before the visit. However, the reported information can cause privacy leakage of the electric vehicle user. Anonymous information reporting can protect user privacy, but also enables attacks on the charging station by unauthorized users. An anonymous authentication system can address these issues, but cannot detect misbehaviors by authenticated users. One remedy to this is revocable anonymity-based authentication, which can revoke the anonymity of malicious users after their misbehaviors. However, we show that such a system is still vulnerable to application-level Denial of Service attacks, where a malicious user requests for large amounts of energy simultaneously from many charging stations, preventing these stations from serving other users. To address this, we improve upon an existing revocable anonymity-based authentication framework. We propose a permit-based mechanism, where each electric vehicle is only issued with one blind signature-based permit at a time. A request is valid only if it contains a valid and unused permit, which protects the system from the application-level Denial of Service attacks. Security analysis and experiments demonstrate that our framework, while ensuring user anonymity and being robust to the aforementioned attack, is also scalable and lightweight.
引用
收藏
页码:4845 / 4857
页数:13
相关论文
共 32 条
  • [1] Afrin S., 2017, P IEEE INT C ADV NET, P1
  • [2] [Anonymous], 1996, HDB APPL CRYPTOGRAPH
  • [3] Barker E., 2018, NIST SPECIAL PUBLICA, DOI DOI 10.6028/NIST.SP.800-56AR3
  • [4] Blakley G.R, 1979, P NAT COMP C, V48, DOI 10.1109/MARK.1979.8817296
  • [5] Camenisch Jan., 2006, ACM C COMPUTER COMMU, P201
  • [6] CHAUM D, 1991, LECT NOTES COMPUT SC, V547, P257
  • [7] Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
  • [8] Anonymous Authentication and Pseudonym-Renewal for VANET in NDN
    Chowdhury, Muktadir
    Gawande, Ashlesh
    Wang, Lan
    [J]. PROCEEDINGS OF THE 4TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN 2017), 2017, : 222 - 223
  • [9] Crosbie J., 2017, YAHOO NEWS
  • [10] Davis StacyC., 2015, 2015 Vehicle Technologies Market Report