A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things

被引:45
作者
Park, Kisung [1 ]
Park, Youngho [1 ]
Das, Ashok Kumar [2 ]
Yu, Sungjin [1 ]
Lee, Joonyoung [1 ]
Park, Yohan [3 ]
机构
[1] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Korea Nazarene Univ, Div It Convergence, Cheonan 31172, South Korea
基金
新加坡国家研究基金会;
关键词
Social Internet of Things (SIoT); vehicle-to-grid (V2G); authentication; AVISPA; formal security; key management; AUTHENTICATION PROTOCOL; USER AUTHENTICATION; SECURE; VEHICLE; SCHEME; COMMUNICATION; BIOMETRICS; NETWORKS; EXCHANGE; EFFICIENT;
D O I
10.1109/ACCESS.2019.2921399
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the smart grid (SG) and the social Internet of Things (SIoT), an electric vehicle operator can use reliable, flexible, and efficient charging service with vehicle-to-grid (V2G). However, open channels can be vulnerable to various attacks by a malicious adversary. Therefore, secure mutual authentication for V2G has become essential, and numerous related protocols have been proposed. In 2018, Shen et al. proposed a privacy-preserving and lightweight key agreement protocol for V2G in SIoT to ensure security. However, we demonstrate that their protocol does not withstand impersonation, privileged-insider, and offline password guessing attacks, and it does not also guarantee secure mutual authentication, session key security, and perfect forward secrecy. Therefore, this paper proposes a dynamic privacy-preserving and lightweight key agreement protocol for V2G in SIoT to resolve the security weaknesses of Shen et al.'s protocol. The proposed protocol resists several attacks including impersonation, offline password guessing, man-in-the-middle, replay, and trace attacks, ensures anonymity, perfect forward secrecy, session key security, and secure mutual authentication. We evaluate the security of the proposed protocol using formal security analysis under the broadly-accepted real-or-random (ROR) model, secure mutual authentication proof using the widely-accepted Burrows-Abadi-Needham (BAN) logic, informal (non-mathematical) security analysis, and also the formal security verification using the broadly-accepted automated validation of Internet security protocols and applications (AVISPA) tool. We then compare computation costs, and security and functionality features of the proposed protocol with related protocols. Overall, the proposed protocol provides superior security, and it can be efficiently deployed to practical SIoT-based V2G environment.
引用
收藏
页码:76812 / 76832
页数:21
相关论文
共 55 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections [J].
Abdallah, Asmaa ;
Shen, Xuemin .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (03) :2615-2629
[3]   An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 104 :133-144
[4]  
[Anonymous], 2014, 7628 NISTIR NIST US
[5]   The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo ;
Nitti, Michele .
COMPUTER NETWORKS, 2012, 56 (16) :3594-3608
[6]   SIoT: Giving a Social Structure to the Internet of Things [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
IEEE COMMUNICATIONS LETTERS, 2011, 15 (11) :1193-1195
[7]   A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid [J].
Baek, Joonsang ;
Quang Hieu Vu ;
Liu, Joseph K. ;
Huang, Xinyi ;
Xiang, Yang .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2015, 3 (02) :233-244
[8]   Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks [J].
Banerjee, Soumya ;
Odelu, Vanga ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Kumar, Neeraj ;
Park, Youngho ;
Tanwar, Sudeep .
IEEE ACCESS, 2018, 6 :20673-20693
[9]  
BURNETT A., 2007, International Journal of Network Security, V5, P317
[10]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]