Research on Anonymous Authentication of Vehicle to Grid Users Based on Group Signature
DOI: 10.23977/acss.2020.040103 | Downloads: 26 | Views: 2587
Author(s)
Shaomin Zhang 1, Fang Xie 1, Baoyi Wang 1
Affiliation(s)
1 Department of Control and Computer, North China Electric Power University, HuaDian Road, BaoDing, China
Corresponding Author
Shaomin ZhangABSTRACT
In order to solve the problem that the privacy information of the vehicle to grid user is leaked, which endangers the safety of users' lives and properties. In this paper, a V2G user anonymous authentication scheme based on group signature is proposed to realize the user anonymous authentication of vehicle to grid. In order to realize the anonymous authentication of the charging station to the EV, the scheme mainly adopts group signature algorithm to achieve anonymous authentication between the EV and the power grid. In the process of authentication, only the trusted center has the real identity of the user to ensure the anonymous interaction between electric vehicle and power grid. The aggregation unit records the EV information by combining a complete subtree method and Chinese remainder theorem, so that other members do not need to change the key in the process of EV revocation. According to the security analysis, this scheme can ensure the confidentiality, integrity, effectiveness and non-repudiation of information in V2G network. The performance analysis shows that this scheme can reduce the computing and communication costs of the vehicle to grid.
KEYWORDS
V2G, Group Signature, Privacy Protection, Anonymous Authentication, Complete Subtree MethodCITE THIS PAPER
Shaomin Zhang, Fang Xie and Baoyi Wang. Research on Anonymous Authentication of Vehicle to Grid Users Based on Group Signature. Advances in Computer, Signals and Systems (2020) 4: 13-18. DOI: http://dx.doi.org/10.23977/acss.2020.040103.
REFERENCES
[1] Jie Chen,Yueyu Zhang,Wencong Su. An anonymous authentication scheme for plug-in electric vehicles joining to charging/discharging station in vehicle-to-Grid (V2G) networks[C]. China Communications ,2015,12(3):9-19.
[2] Neetesh Saxena,Bong Jun Choi. Authentication Scheme for Flexible Charging and Discharging of Mobile Vehicles in the V2G Networks[J]. IEEE Transactions on Information Forensics and Security,2016,11(7): 1438-1452.
[3] Shen Jian,Zhou Tianqi,Wei Fushan. Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things[J]. IEEE Internet of Things Journal,2018,5(7):2526-2536.
[4] Christophe Jouvray, Gloria Pellischek. Impact of a Smart Grid to the Electric Vehicle Ecosystem From a Privacy and Security Perspective[C]. 2013 World Electric Vehicle Symposium and Exhibition (EVS27),2013,1-10.
[5] Neetesh Saxena,Bong Jun Choi,Shinyoung Cho. Lightweight Privacy-Preserving Authentication Scheme for V2G Networks in the Smart Grid[C]. 2015 IEEE Trustcom/BigDataSE/ISPA,2015,604-611.
[6] Asmaa Abdallah,Xuemin (Sherman) Shen. Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections[J]. IEEE Transactions on Vehicular Technology, 2017,66(3):2615-2629.
[7] Hong Liu ,Huansheng Ning et al. Aggregated-Proofs Based Privacy-Preserving Authentication for V2G Networks in the Smart Grid[J]. IEEE Transactions on Smart Grid,2012, 3(4):1722-1733.
[8] Xiaohan Yue,Bing Chen. An Efficient and Secure Anonymous Authentication Scheme for VANETs Based on the Framework of Group Signatures[J]. IEEE Access,2018,6:62584-62600.
Downloads: | 22680 |
---|---|
Visits: | 374644 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks