Skip to main content

Advertisement

Log in

Efficient privacy-preserving authentication for V2G networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Vehicle-to-grid (V2G) networks, as a crucial subsystem of smart grid, can potentially help the grid to improve stability, save generation cost and reduce energy consumption. However, how to ensure the security and privacy of V2G networks, especially to realize secure communication between electric vehicles (EVs) and the grid, is extremely challenging. In order to overcome the challenge, we design an efficient privacy-preserving authentication scheme for V2G networks. In the proposed scheme, EV can securely access services provided by smart grid using an authenticated key agreement protocol established between them, which can support mutual authentication and generate a secure common session key for further communication. Security analysis and performance evaluation show that the proposed scheme not only protects the privacy of EV, but also reduces the computation cost of charging station and EV. Experimental results demonstrate that our scheme is fit for the application of V2G networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Abdalla M, Fouque PA, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: International workshop on public key cryptography. Springer, pp 65–84

  2. Abdallah A, Shen XS (2016) Lightweight authentication and privacy-preserving scheme for v2g connections. IEEE Trans Veh Technol 66(3):2615–2629

    Article  Google Scholar 

  3. Bellare M, Rogaway P (1993) Entity authentication and key distribution. In: Annual international cryptology conference. Springer, pp 232–249

  4. Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the first ACM conference on Computer and communications security. ACM, pp 62–73

  5. Bellare M, Rogaway P (1995) Provably secure session key distribution: the three party case. In: Proceedings of the twenty-seventh annual ACM symposium on theory of computing, vol 95, pp 57–66

  6. Boyko V, MacKenzie P, Patel S (2000) Provably secure password-authenticated key exchange using diffie-hellman. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 156–171

  7. Cao J, Ma M, Li H, Ma R, Sun Y, Yu P, Xiong L (2019) A survey on security aspects for 3gpp 5g networks. IEEE Communications Surveys & Tutorials 22(1):170–195

    Article  Google Scholar 

  8. Cao J, Ma M, Li H, Zhang Y, Luo Z (2013) A survey on security aspects for lte and lte-a networks. IEEE Communications Surveys & Tutorials 16(1):283–302

    Article  Google Scholar 

  9. Chen X, Zhang F, Liu S (2007) Id-based restrictive partially blind signatures and applications. J Syst Softw 80(2):164–171

    Article  Google Scholar 

  10. Dolev D, Yao A (1983) On the security of public key protocols. IEEE Transactions on Information Theory 29(2):198–208

    Article  MathSciNet  Google Scholar 

  11. Gao F, Zhu L, Shen M, Sharif K, Wan Z, Ren K (2018) A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks. IEEE Netw 32(6):184–192

    Article  Google Scholar 

  12. Gope P, Sikdar B (2019) An efficient privacy-preserving authentication scheme for energy internet-based vehicle-to-grid communication. IEEE Transactions on Smart Grid 10(6):6607–6618

    Article  Google Scholar 

  13. He D, Kumar N, Khan MK, Wang L, Shen J (2016) Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Syst J 12(2):1621–1631

    Article  Google Scholar 

  14. Hu X, Huang S (2008) Analysis of id-based restrictive partially blind signatures and applications. J Syst Softw 81(11):1951–1954

    Article  Google Scholar 

  15. Ning J, Huang X, Susilo W, Liang K, Liu X, Zhang Y (2020) Dual access control for cloud-based data storage and sharing. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1109/TDSC.2020.3011525

  16. Odelu V, Das AK, Goswami A (2015) A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Transactions on Information Forensics and Security 10(9):1953–1966

    Article  Google Scholar 

  17. Pazos-Revilla M, Alsharif A, Gunukula S, Guo TN, Mahmoud M, Shen X (2017) Secure and privacy-preserving physical-layer-assisted scheme for ev dynamic charging system. IEEE Trans Veh Technol 67(4):3304–3318

    Article  Google Scholar 

  18. Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. Journal of Cryptology 13(3):361–396

    Article  Google Scholar 

  19. Rabieh K, Aydogan AF (2019) A fair and privacy-preserving reservation scheme for charging electric vehicles. In: 2019 International symposium on networks, computers and communications (ISNCC). IEEE, pp 1–6

  20. Roman LF, Gondim PR, Lloret J (2019) Pairing-based authentication protocol for v2g networks in smart grid. Ad Hoc Netw 90:101745

    Article  Google Scholar 

  21. Saxena N, Choi BJ, Cho S (2015) Lightweight privacy-preserving authentication scheme for v2g networks in the smart grid. In: Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, vol 1. IEEE, pp 604–611

  22. Shen J, Zhou T, Wei F, Sun X, Xiang Y (2017) Privacy-preserving and lightweight key agreement protocol for v2g in the social internet of things. IEEE Internet of Things Journal 5(4):2526–2536

    Article  Google Scholar 

  23. Tsai JL, Lo NW (2015) A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst J 9(3):805–815

    Article  Google Scholar 

  24. Wang H, Qin B, Wu Q, Xu L, Domingo-Ferrer J (2015) Tpp: traceable privacy-preserving communication and precise reward for vehicle-to-grid networks in smart grids. IEEE Transactions on Information Forensics and Security 10(11):2340–2351

    Article  Google Scholar 

  25. Xu S, Ning J, Li Y, Zhang Y, Xu G, Huang X, Deng R (2020) Match in my way: fine-grained bilateral access control for secure cloud-fog computing. IEEE Transactions on Dependable and Secure Computing: 1–15. https://doi.org/10.1109/TDSC.2020.3001557

  26. Xu S, Yang G, Mu Y (2018) A new revocable and re-delegable proxy signature and its application. J Comput Sci Technol 33: 380–399

    Article  MathSciNet  Google Scholar 

  27. Xu S, Yang G, Mu Y (2019) Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. Inf Sci 479:116–134

    Article  MathSciNet  Google Scholar 

  28. Xu S, Yang G, Mu Y, Deng RH (2018) Secure fine-grained access control and data sharing for dynamic groups in the cloud. IEEE Transactions on Information Forensics and Security 13(8):2101–2113

    Article  Google Scholar 

  29. Yang Z, Yu S, Lou W, Liu C (2011) p2: privacy-preserving communication and precise reward architecture for v2g networks in smart grid. IEEE Transactions on Smart Grid 2(4):697–706

    Article  Google Scholar 

  30. Zhang Y, Deng R, Bertino E, Zheng D (2019) Robust and universal seamless handover authentication in 5g hetnets. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1109/TDSC.2019.2927664

  31. Zhang Y, Deng R, Liu X, Zheng D (2018) Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Transactions on Services Computing. https://doi.org/10.1109/TSC.2018.2864191

  32. Zhang Y, Deng RH, Liu X, Zheng D (2018) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262–277

    Article  MathSciNet  Google Scholar 

  33. Zhang Y, Deng RH, Zheng D, Li J, Wu P, Cao J (2019) Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial iot. IEEE Transactions on Industrial Informatics 15 (9):5099–5108

    Article  Google Scholar 

  34. Zhang Y, Li J, Zheng D, Li P, Tian Y (2018) Privacy-preserving communication and power injection over vehicle networks and 5g smart grid slice. J Netw Comput Appl 122:50–60

    Article  Google Scholar 

  35. Zhang Y, Zhao J, Zheng D (2017) Efficient and privacy-aware power injection over ami and smart grid slice in future 5g networks. Mob Inf Syst 2017:1–11

    Google Scholar 

Download references

Acknowledgements

This work is supported by the National Key R&D Program of China (2017YFB0802000), the National Natural Science Foundation of China (61772418, 62072369, 61802303), the Innovation Capability Support Program of Shaanxi (2020KJXX-052), the Shaanxi Special Support Program Youth Top-notch Talent Program, the Key Research and Development Program of Shaanxi (2019KW-053, 2020ZDLGY08-04), the Sichuan Science and Technology Program (2017GZDZX0002), the Basic Research Program of Qinghai Province (2020-ZJ-701), and the New Star Team of Xi’an University of Posts and Telecommunications (2016-02).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yinghui Zhang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on Privacy-Preserving Computing

Guest Editors: Kaiping Xue, Zhe Liu, Haojin Zhu, Miao Pan and David S.L. Wei

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Y., Zou, J. & Guo, R. Efficient privacy-preserving authentication for V2G networks. Peer-to-Peer Netw. Appl. 14, 1366–1378 (2021). https://doi.org/10.1007/s12083-020-01018-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-01018-w

Keywords

Navigation