Abstract
Vehicle-to-grid (V2G) networks, as a crucial subsystem of smart grid, can potentially help the grid to improve stability, save generation cost and reduce energy consumption. However, how to ensure the security and privacy of V2G networks, especially to realize secure communication between electric vehicles (EVs) and the grid, is extremely challenging. In order to overcome the challenge, we design an efficient privacy-preserving authentication scheme for V2G networks. In the proposed scheme, EV can securely access services provided by smart grid using an authenticated key agreement protocol established between them, which can support mutual authentication and generate a secure common session key for further communication. Security analysis and performance evaluation show that the proposed scheme not only protects the privacy of EV, but also reduces the computation cost of charging station and EV. Experimental results demonstrate that our scheme is fit for the application of V2G networks.
Similar content being viewed by others
References
Abdalla M, Fouque PA, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: International workshop on public key cryptography. Springer, pp 65–84
Abdallah A, Shen XS (2016) Lightweight authentication and privacy-preserving scheme for v2g connections. IEEE Trans Veh Technol 66(3):2615–2629
Bellare M, Rogaway P (1993) Entity authentication and key distribution. In: Annual international cryptology conference. Springer, pp 232–249
Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the first ACM conference on Computer and communications security. ACM, pp 62–73
Bellare M, Rogaway P (1995) Provably secure session key distribution: the three party case. In: Proceedings of the twenty-seventh annual ACM symposium on theory of computing, vol 95, pp 57–66
Boyko V, MacKenzie P, Patel S (2000) Provably secure password-authenticated key exchange using diffie-hellman. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 156–171
Cao J, Ma M, Li H, Ma R, Sun Y, Yu P, Xiong L (2019) A survey on security aspects for 3gpp 5g networks. IEEE Communications Surveys & Tutorials 22(1):170–195
Cao J, Ma M, Li H, Zhang Y, Luo Z (2013) A survey on security aspects for lte and lte-a networks. IEEE Communications Surveys & Tutorials 16(1):283–302
Chen X, Zhang F, Liu S (2007) Id-based restrictive partially blind signatures and applications. J Syst Softw 80(2):164–171
Dolev D, Yao A (1983) On the security of public key protocols. IEEE Transactions on Information Theory 29(2):198–208
Gao F, Zhu L, Shen M, Sharif K, Wan Z, Ren K (2018) A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks. IEEE Netw 32(6):184–192
Gope P, Sikdar B (2019) An efficient privacy-preserving authentication scheme for energy internet-based vehicle-to-grid communication. IEEE Transactions on Smart Grid 10(6):6607–6618
He D, Kumar N, Khan MK, Wang L, Shen J (2016) Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Syst J 12(2):1621–1631
Hu X, Huang S (2008) Analysis of id-based restrictive partially blind signatures and applications. J Syst Softw 81(11):1951–1954
Ning J, Huang X, Susilo W, Liang K, Liu X, Zhang Y (2020) Dual access control for cloud-based data storage and sharing. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1109/TDSC.2020.3011525
Odelu V, Das AK, Goswami A (2015) A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Transactions on Information Forensics and Security 10(9):1953–1966
Pazos-Revilla M, Alsharif A, Gunukula S, Guo TN, Mahmoud M, Shen X (2017) Secure and privacy-preserving physical-layer-assisted scheme for ev dynamic charging system. IEEE Trans Veh Technol 67(4):3304–3318
Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. Journal of Cryptology 13(3):361–396
Rabieh K, Aydogan AF (2019) A fair and privacy-preserving reservation scheme for charging electric vehicles. In: 2019 International symposium on networks, computers and communications (ISNCC). IEEE, pp 1–6
Roman LF, Gondim PR, Lloret J (2019) Pairing-based authentication protocol for v2g networks in smart grid. Ad Hoc Netw 90:101745
Saxena N, Choi BJ, Cho S (2015) Lightweight privacy-preserving authentication scheme for v2g networks in the smart grid. In: Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, vol 1. IEEE, pp 604–611
Shen J, Zhou T, Wei F, Sun X, Xiang Y (2017) Privacy-preserving and lightweight key agreement protocol for v2g in the social internet of things. IEEE Internet of Things Journal 5(4):2526–2536
Tsai JL, Lo NW (2015) A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst J 9(3):805–815
Wang H, Qin B, Wu Q, Xu L, Domingo-Ferrer J (2015) Tpp: traceable privacy-preserving communication and precise reward for vehicle-to-grid networks in smart grids. IEEE Transactions on Information Forensics and Security 10(11):2340–2351
Xu S, Ning J, Li Y, Zhang Y, Xu G, Huang X, Deng R (2020) Match in my way: fine-grained bilateral access control for secure cloud-fog computing. IEEE Transactions on Dependable and Secure Computing: 1–15. https://doi.org/10.1109/TDSC.2020.3001557
Xu S, Yang G, Mu Y (2018) A new revocable and re-delegable proxy signature and its application. J Comput Sci Technol 33: 380–399
Xu S, Yang G, Mu Y (2019) Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. Inf Sci 479:116–134
Xu S, Yang G, Mu Y, Deng RH (2018) Secure fine-grained access control and data sharing for dynamic groups in the cloud. IEEE Transactions on Information Forensics and Security 13(8):2101–2113
Yang Z, Yu S, Lou W, Liu C (2011) p2: privacy-preserving communication and precise reward architecture for v2g networks in smart grid. IEEE Transactions on Smart Grid 2(4):697–706
Zhang Y, Deng R, Bertino E, Zheng D (2019) Robust and universal seamless handover authentication in 5g hetnets. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1109/TDSC.2019.2927664
Zhang Y, Deng R, Liu X, Zheng D (2018) Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Transactions on Services Computing. https://doi.org/10.1109/TSC.2018.2864191
Zhang Y, Deng RH, Liu X, Zheng D (2018) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262–277
Zhang Y, Deng RH, Zheng D, Li J, Wu P, Cao J (2019) Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial iot. IEEE Transactions on Industrial Informatics 15 (9):5099–5108
Zhang Y, Li J, Zheng D, Li P, Tian Y (2018) Privacy-preserving communication and power injection over vehicle networks and 5g smart grid slice. J Netw Comput Appl 122:50–60
Zhang Y, Zhao J, Zheng D (2017) Efficient and privacy-aware power injection over ami and smart grid slice in future 5g networks. Mob Inf Syst 2017:1–11
Acknowledgements
This work is supported by the National Key R&D Program of China (2017YFB0802000), the National Natural Science Foundation of China (61772418, 62072369, 61802303), the Innovation Capability Support Program of Shaanxi (2020KJXX-052), the Shaanxi Special Support Program Youth Top-notch Talent Program, the Key Research and Development Program of Shaanxi (2019KW-053, 2020ZDLGY08-04), the Sichuan Science and Technology Program (2017GZDZX0002), the Basic Research Program of Qinghai Province (2020-ZJ-701), and the New Star Team of Xi’an University of Posts and Telecommunications (2016-02).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: Special Issue on Privacy-Preserving Computing
Guest Editors: Kaiping Xue, Zhe Liu, Haojin Zhu, Miao Pan and David S.L. Wei
Rights and permissions
About this article
Cite this article
Zhang, Y., Zou, J. & Guo, R. Efficient privacy-preserving authentication for V2G networks. Peer-to-Peer Netw. Appl. 14, 1366–1378 (2021). https://doi.org/10.1007/s12083-020-01018-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-020-01018-w