Skip to main content

Advertisement

Log in

An enhanced mutually authenticated security protocol with key establishment for cloud enabled smart vehicle to grid network

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Vehicle-to-Grid (V2G) is the convergence of smart grid, electrical vehicle and information and communication technology. It envisions a system where smart grid and electric vehicles can communicate with each other to provide various services. Researchers are actively trying to solve many of the interesting challenges in this emerging technology. One such challenge is to secure the communications between the entities in V2G environment using various security mechanisms. Recently, Su et al. proposed a scheme to provide authentication between electrical vehicles and charging station. On detailed analysis, the scheme exhibited some vulnerabilities. In our work, cryptanalysis of the protocol by Su et al. to show the scheme is vulnerable to traceability attack, user impersonation attack, insider attack and the protocol fails to support session key establishment is presented. Also, cloud computing is necessary for storing, processing and analyzing large amount of data generated in the V2G environment. Hence, we propose a new communication architecture involving cloud server and an efficient authentication protocol using Elliptic Curve Cryptography (ECC) for the proposed architecture. The security of the proposed protocol is established using the formal method BAN logic. Informal proofs are given to show the resistance of the proposed protocol against many known attacks. Other performance metrics of our protocol are evaluated and compared against many significant protocols of similar architecture.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Fatemidokht H, Rafsanjani MK, Gupta BB, Hsu CH (2021) Efficient and secure routing protocol based on artificial intelligence algorithms with uav-assisted for vehicular ad hoc networks in intelligent transportation systems. IEEE Trans Intell Transp Syst 22(7):4757–4769

    Article  Google Scholar 

  2. Gope P, Sikdar B (2019) An efficient privacy-preserving authentication scheme for energy internet-based vehicle-to-grid communication. IEEE Trans Smart Grid 10(6):6607–6618

    Article  Google Scholar 

  3. Grée F, Laznikova V, Kim B, Garcia G, Kigezi T, Gao B (2020) Cloud-based big data platform for vehicle-to-grid (v2g). World Electric Vehicle Journal 11(2):30

    Article  Google Scholar 

  4. Noel L, de Rubens GZ, Kester J, Sovacool BK (2019) Vehicle-to-Grid. Springer

    Book  Google Scholar 

  5. Saxena N, Choi BJ (2016) Authentication scheme for flexible charging and discharging of mobile vehicles in the v2g networks. IEEE Trans Inf Forensics Secur 11(7):1438–1452

    Article  Google Scholar 

  6. Zhou Z, Gaurav A, Gupta BB, Lytras MD, Razzak I (2021) A fine-grained access control and security approach for intelligent vehicular transport in 6g communication system. IEEE Trans Intell Transp Syst

  7. Jindal A, Kumar N, Singh M (2020) Internet of energy-based demand response management scheme for smart homes and phevs using svm. Futur Gener Comput Syst 108:1058–1068

    Article  Google Scholar 

  8. Prathiba SB, Raja G, Bashir AK, Alzubi AA, Gupta B (2021) Sdn-assisted safety message dissemination framework for vehicular critical energy infrastructure. IEEE Trans Ind Inf

  9. Xu S, Wang Z, Fan L, Cai X, Ji H, Khoo SC, Gupta BB (2021) Deepsuite: A test suite optimizer for autonomous vehicles. IEEE Trans Intell Transp Syst

  10. Mirsadeghi F, Rafsanjani MK, Gupta BB (2021) A trust infrastructure based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Networking and Applications 14(4):2537–2553

    Article  Google Scholar 

  11. Su Y, Shen G, Zhang M (2019) A novel privacy-preserving authentication scheme for v2g networks. IEEE Syst J 14(2):1963–1971

    Article  Google Scholar 

  12. Wu D, Zhou C (2011) Fault-tolerant and scalable key management for smart grid. IEEE Trans Smart Grid 2(2):375–381

    Article  Google Scholar 

  13. Xia J, Wang Y (2012) Secure key distribution for the smart grid. IEEE Trans Smart Grid 3(3):1437–1443

    Article  Google Scholar 

  14. Park JH, Kim M, Kwon D (2013) Security weakness in the smart grid key distribution scheme proposed by xia and wang. IEEE Trans Smart Grid 4(3):1613–1614

    Article  Google Scholar 

  15. Nicanfar H, Leung VC (2013) Multilayer consensus ecc-based password authenticated key-exchange (mcepak) protocol for smart grid system. IEEE Trans Smart Grid 4(1):253–264

    Article  Google Scholar 

  16. Tsai JL, Lo NW (2015) Secure anonymous key distribution scheme for smart grid. IEEE Trans Smart Grid 7(2):906–914

    Google Scholar 

  17. Odelu V, Das AK, Wazid M, Conti M (2016) Provably secure authenticated key agreement scheme for smart grid. IEEE Trans Smart Grid 9(3):1900–1910

    Google Scholar 

  18. Kempton W, Tomić J (2005) Vehicle-to-grid power fundamentals: Calculating capacity and net revenue. J Power Sources 144(1):268–279

    Article  Google Scholar 

  19. Li X, Niu J, Kumari S, Wu F, Choo KKR (2018) A robust biometrics based three-factor authentication scheme for global mobility networks in smart city. Futur Gener Comput Syst 83:607–618

    Article  Google Scholar 

  20. Roman LF, Gondim PR, Lloret J (2019) Pairing-based authentication protocol for v2g networks in smart grid. Ad Hoc Networks 90:101745

    Article  Google Scholar 

  21. Shen J, Zhou T, Wei F, Sun X, Xiang Y (2017) Privacy-preserving and lightweight key agreement protocol for v2g in the social internet of things. IEEE Internet Things J 5(4):2526–2536

    Article  Google Scholar 

  22. Bansal G, Naren N, Chamola V, Sikdar B, Kumar N, Guizani M (2020) Lightweight mutual authentication protocol for v2g using physical unclonable function. IEEE Trans Veh Technol 69(7):7234–7246

    Article  Google Scholar 

  23. Irshad A, Usman M, Chaudhry SA, Naqvi H, Shafiq M (2020) A provably secure and efficient authenticated key agreement scheme for energy internet-based vehicle-to-grid technology framework. IEEE Trans Ind Appl 56(4):4425–4435

    Google Scholar 

  24. Sureshkumar V, Amin R, Vijaykumar V, Sekar SR (2019) Robust secure communication protocol for smart healthcare system with fpga implementation. Futur Gener Comput Syst 100:938–951

    Article  Google Scholar 

  25. Sureshkumar V, Amin R, Obaidat MS, Karthikeyan I (2020) An enhanced mutual authentication and key establishment protocol for tmis using chaotic map. Journal of Information Security and Applications 53:102539

    Article  Google Scholar 

  26. Amin R, Biswas G (2015) Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment. Wirel Pers Commun 84(1):439–462

    Article  Google Scholar 

  27. Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208

    Article  MathSciNet  Google Scholar 

  28. Das AK, Goswami A (2013) A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J Med Syst 37(3):1–16

    Article  Google Scholar 

  29. Ghahramani M, Javidan R, Shojafar M (2020) A secure biometric-based authentication protocol for global mobility networks in smart cities. J Supercomp 76(11):8729–8755

  30. Zhang Y, Gjessing S, Liu H, Ning H, Yang LT, Guizani M (2013) Securing vehicle-to-grid communications in the smart grid. IEEE Wirel Commun 20(6):66–73

    Article  Google Scholar 

  31. Guo H, Wu Y, Bao F, Chen H, Ma M (2011) UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications. IEEE Trans Smart Grid 2(4):707–714

    Article  Google Scholar 

  32. Mustafa MA, Zhang N, Kalogridis G, Fan Z (2013) Smart electric vehicle charging: Security analysis. In: 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), IEEE, pp 1–6

  33. Wu F, Xu L, Kumari S, Li X, Das AK, Khan MK, Karuppiah M, Baliyan R (2016) A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Security and Communication Networks 9(16):3527–3542

    Article  Google Scholar 

  34. Kumari A, Jangirala S, Abbasi MY, Kumar V, Alam M (2020) Eseap: Ecc based secure and efficient mutual authentication protocol using smart card. Journal of Information Security and Applications 51:102443

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruhul Amin.

Ethics declarations

Conflict of interests

The authors declare that they do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sureshkumar, V., Mugunthan, S. & Amin, R. An enhanced mutually authenticated security protocol with key establishment for cloud enabled smart vehicle to grid network. Peer-to-Peer Netw. Appl. 15, 2347–2363 (2022). https://doi.org/10.1007/s12083-022-01350-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-022-01350-3

Keywords

Navigation