Efficient privacy-preserving authentication for V2G networks

  • PDF / 2,553,667 Bytes
  • 13 Pages / 595.224 x 790.955 pts Page_size
  • 101 Downloads / 242 Views

DOWNLOAD

REPORT


Efficient privacy-preserving authentication for V2G networks Yinghui Zhang1,2 · Jian Zou1,2

· Rui Guo1,2

Received: 29 June 2020 / Accepted: 14 October 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract Vehicle-to-grid (V2G) networks, as a crucial subsystem of smart grid, can potentially help the grid to improve stability, save generation cost and reduce energy consumption. However, how to ensure the security and privacy of V2G networks, especially to realize secure communication between electric vehicles (EVs) and the grid, is extremely challenging. In order to overcome the challenge, we design an efficient privacy-preserving authentication scheme for V2G networks. In the proposed scheme, EV can securely access services provided by smart grid using an authenticated key agreement protocol established between them, which can support mutual authentication and generate a secure common session key for further communication. Security analysis and performance evaluation show that the proposed scheme not only protects the privacy of EV, but also reduces the computation cost of charging station and EV. Experimental results demonstrate that our scheme is fit for the application of V2G networks. Keywords Mutual authentication · Key agreement · Electric vehicle · Privacy-preserving · V2G networks

1 Introduction With the strengthening of environmental regulation policy, electricvehicles (EVs) will gradually replace traditional fuel vehicles to reduce environmental pollution. It is expected that EVs will become the mainstream of the automobile industry in the near future. Furthermore, EVs can smooth the unstable fluctuation of the grid to ensure the voltage and frequency stability of the grid, while Vehicle-to-grid

This article is part of the Topical Collection: Special Issue on Privacy-Preserving Computing Guest Editors: Kaiping Xue, Zhe Liu, Haojin Zhu, Miao Pan and David S.L. Wei  Yinghui Zhang

[email protected] Jian Zou [email protected] Rui Guo [email protected] 1

School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an, 710121, China

2

National Engineering Laboratory for Wireless Security, Xi’an University of Posts and Telecommunications, Xi’an, 710121, China

(V2G) networks utilize EVs’ batteries as buffers of the grid to achieve the bidirectional flow of electrical energy and information between EVs and grid. By this means, EVs can feedback excess electrical energy to the grid to reduce grid load. Similarly, EVs can also store electrical energy from the grid when the grid load is low. By this way, the waste of energy in V2G network can be effectively avoided. Moreover, EVs can purchase power from the grid when electricity prices are low. In the same way, they can also sell the electricity stored in batteries to the grid for obtaining economic benefits. A typical V2G network architecture consists of a distribution network, a trusted authority (TA), a dispatching center (DC), charging stations (CSs), aggregators and EVs, which is shown in Fig. 1. The DC