Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV
Abstract
:1. Introduction
1.1. Problem Statement
1.2. Motivation and Contribution
- Proposes an authentication scheme for an electric-vehicle-to-electric-vehicle-charging system, which provides more secure mutual authentication and efficient privacy preservation based on ECQV.
- Conducts an informal security analysis to indicate the protocol’s security against numerous attacks.
- Computational costs are compared with other related work, demonstrating that our proposed protocol has a better performance.
1.3. Paper Organization
2. Preliminaries
2.1. Solution Requirements
- Mutual authentication: The system must enable participants to authenticate one another and ensure that communication is built on mutual trust. The demander EV authenticates the supplier EV to confirm its identity and its registration with the electricity OPerator (OP). The supplier EV will simultaneously verify the demander EV’s registration with the OP, using certificates issued by the OP. As a result, the prospect of a masquerade attack should be eliminated [13,14].
- Anonymity: It is the ability to stay anonymous among a group of subjects. The real identity of the EV should not be disclosed to other EVs or the EAG during the V2V-charging process [15]. The ability to keep a subject’s activities untraceable is known as untraceability. Eavesdroppers are unable to deduce or track the activities of the EV [13,14].
- Traceability: This property enables the trustworthy organization (OP) to identify or disclose the malicious EV’s true identity if necessary [16].
- Perfect forward/backward security: If a long-term private key is compromised, the attacker will not be able to access future/old session keys [17].
- Joint key control: Both the demander and supplier EVs will contribute a random number to generate the session key. Thus, no one other than participating entities receives access to or may obtain any session keys.
- Effective re-authentication: The process whereby the supplier EV re-authenticates the demander EV, if matched again, causes an overhead. Hence, using information provided by a trusted third party (OP) and the EAG, the supplier EV should be able to verify the demander EV just once in the first encounter. For future access, the supplier EV can re-authenticate the demander EV without relying on the OP or EAG.
- Revocation method: If the user’s registration is terminated, or if the EV’s secret key is disclosed, then it is essential to provide the system with a revocation mechanism.
- Attack resistance: Because the connection between EAG/EV and EV/EV is conducted in an insecure environment, an adversary may initiate an attack during the communications. As a result, the proposed solution must be capable of defeating attacks such as modification attacks, impersonation attacks, replay attacks, MITM, etc.
- Non-repudiation: Both the demander and supplier EVs provide proof of delivery in order to thwart participation denial. This is required to ensure that any dispute is resolved fairly [14].
2.2. Elliptic-Curve-Based Operations
2.3. ECQV Implicit Certificates
3. Literature Review
4. Proposed System
4.1. System Architecture
- OP: Any entity (EV or EAG) attempting to join the V2V-charging system must register its identifying information via the OP, which is the initializer of the proposed protocol. Since the OP acts as a certificate producer (trusted third party), authorized EVs can acquire access to other EVs’ energy-trading services and establish trust between them. Furthermore, the OP has the authority to reveal the identities of malicious or misbehaving entities.
- EAG: A data aggregator is a smart device or a collection of connected devices that gathers an available EV’s energy information during charging. It acts as an energy broker and matcher to handle V2V energy-trading requests. Additionally, it manages energy trading and offers wireless communication to EVs and EVCSs. The EAG has an authentication mechanism in place in order to identify authorized EVs and coordinate V2V charging.
- EV: Electric vehicles are smart devices that submit charging requests to the EAG and mutually confirm the EV’s legitimacy to use its services (charging). Depending on their energy needs, EVs act as either energy supplier (), demander (), or idle EV (do not participate in energy trading). EVs can interact with EAGs for energy trading thanks to the onboard unit’s (OBU) communication and computing capabilities. The offers its excess energy to other electric vehicles in need and receives an incentive in return. Moreover, when the demands energy, it makes a request to the local EAGs. We assume that the communication takes place in this environment via the dedicated-short-range-communication (DSRC) protocol, and the Internet and EV have a controlled-area-network (CAN) bus linked to the charging port.
- Smart meter: It is a device that is used to keep track of and compute the amount of energy exchanged between energy nodes. According to smart-meter statistics, energy demanders pay the suppliers the corresponding amount. For the proposed solution, it is considered that each EV has a smart meter installed within the vehicle. We presume that the EV’s smart meter has a tamper-resistant seal. We assume that the EAG is responsible for reading the traded energy from each EV’s smart meter, and accordingly generates the payment method.
4.2. Initialization Phase
- Step 1
- The OP chooses the base point on the elliptic curve with order , with being a large prime number. It chooses the curve coefficients and , for the field size and for the cofactor, where is the elliptic curve’s number of points (these are the domain parameters for an elliptic curve).
- Step 2
- A hash function that has been approved is chosen. During the certificate-request/generation operations, the OP and certificate requester pick the random-number generator that will be used to generate the private keys.
- Step 3
- The elliptic curve domain parameters are coupled with an EC key pair () that the OP obtains (constructed in step 1).
- Step 4
- The EV and EAG acquire the EC domain parameters and (OP’s public key) in an authentic manner.
4.3. Registration Phase
4.3.1. EV Registration
- Step 1
- The EV picks its identity and creates an EC key pair (), with and . To maintain integrity, it calculates , then encrypts with (OP’s public key) and sends it to the OP.
- Step 2
- The OP uses its private key to obtain the message’s content and verifies . Then, it selects and constructs the implicit certificate for the EV (). It computes the hash of the certificate and the EV’s private-key-construction data . To produce the EV’s pseudo-identity, the OP uses Formula (1) and signs it with the OP’s private key, where the EV’s real identity is hidden with to ensure anonymity, and the pseudo-identity is negotiated to be sequentially incremented () by the EV itself each time it demands a service. Using Formula (2), the OP computes the EV’s authenticator, which contains the issued , , as well as its time life () signed by the OP’s private key. To maintain integrity, it calculates . It then calculates a registration key (temporary key) that is exclusively shared by the OP and EV. Then, it encrypts with and sends it to the EV. Finally, the OP should destroy , , and to hinder the adversary from obtaining the EV’s secret key.
- Step 3
- The EV calculates the shared registration key to obtain , uses the OP’s public key to verify them, and checks . It computes , and uses Formulas (3) and (4) to construct its private/public-key pair /.
4.3.2. EAG Registration
- Step 1
- The EAG picks its identity , and creates the EC key pair () with and . To maintain integrity, it calculates . Then, it encrypts with and sends it to the OP.
- Step 2
- The OP uses its private key to obtain the message’s content and verifies . Then, it selects and constructs the implicit certificate for the EAG (). It computes the hash of the certificate and the EAG’s private-key-construction data . Using Formula (8), the OP computes the EAG’s authenticator, which contains the issued , , as well as its time life () signed by the OP’s private key. To maintain integrity, it calculates . Then, it calculates a registration key (temporary key) that is exclusively shared by the OP and EAG. Then, it encrypts with and sends it to the EAG. Finally, the OP should destroy , , and to hinder an adversary from obtaining the EAG’s secret key.
- Step 3
- The EAG calculates the shared registration key to obtain , uses the OP’s public key to verify it, and checks . It computes and uses Formulas (9) and (10) to construct its private/public-key pair /.
4.4. Authentication Phase
4.4.1. Mutual-Authentication Protocol
- Step 1
- The generates the charging request , a random number , and a time stamp , where “” states the amount of power needed, “” states the price is willing to pay for the traded energy, and “” states ’s distance from the local EAG in order to maintain its current location privacy. To obtain a unique anonymous identity for the session, the sequentially increments the counter (adds 1 to the previous ’s pseudo-ID) and hashes it. The signs using its private key, encrypts with , and sends it to the local EAG.
- Step 2
- The EAG decrypts the message using its own private key to retrieve the content. It uses the OP’s signature to verify and checks to ensure it is not a replayed message. Then, it computes to extract the ’s public key . It verifies by ’s signature along with the OP’s signature. After verification, the EAG generates a supply request and broadcasts it to nearby EVs.
- Step 3
- Nearby EVs that receive the verify the supply request through the EAG’s signature, and EVs with excess energy that are interested in selling it to other EVs generate a random number , a time stamp , and , where “” is the amount of energy is offering to sell, and “” states the price that is demanding for the traded energy. The signs using its private key and encrypts with , then sends it to the local EAG.
- Step 4
- The EAG decrypts the message using its own private key to retrieve the content. Then, it uses the OP’s signature to verify and checks to ensure it is not a replayed message. It computes to extract the ’s public key . It verifies by the ’s signature along with OP’s signature. The EAG matches to the best-fit and schedules a V2V-charging location () for them. After matching, the EAG computes and temporary keys for both sides. For , the EAG computes to be further used in the / mutual authentication, and computes to protect the transmission of to . For , the EAG compute to be further used in / mutual authentication, and computes to protect the transmission of to .
- Step 5
- Both / generate their corresponding temporary keys to retrieve the content of the message. retrieves the matched ’s public key and verifies its by the ’s signature and that is included in it along with the OP’s signature. When both and arrive at the specified location (), generates a new random number and time stamp . It then generates the shared master key and the first initial key using Formulas (14) and (15), respectively. Then, it encrypts with and sends it to over DSRC.
- Step 6
- generates , the master key and the first initial key using Formulas (14) and (15), respectively. It retrieves and verifies by ’s signature along with the OP’s signature, and checks the validity of to ensure it is not a replayed message. To obtain a unique anonymous identity for this session, sequentially increments the counter (adds 1 to the previous ’s pseudo-ID) and hashes it. After verification, generates a new random number , a time stamp , and the second initial key using Formula (16). generates , which is the authorization token for , and the session key using Formulas (17) and (18), respectively. Then, it sends it to encrypted by , and begins the V2V-charging service for , which is protected by . Lastly, it updates the in the memory.
- Step 7
- generates and the second initial key using Formula (16) to retrieve , and checks the validity of . Then, using Formula (18), it generates the session key to be used during the charging session. Lastly, it stores the issued by and updates the in the memory. By the completion of this procedure, and will have a trust relationship established and will no longer need to rely on the OP for future session authentication.
4.4.2. Lightweight Mutual-Re-Authentication Protocol
- Step 1
- generates the charging request , a random number , and a time stamp , where “” states the amount of power needed, “” states the price is willing to pay for the traded energy, and “” states ’s distance from the local EAG in order to maintain its current location privacy. To obtain a unique anonymous identity for this session, sequentially increments the counter (adds 1 to the previous ’s pseudo-ID) and hashes it. However, since has a valid authorization token , this time it includes the of the corresponding in the request. signs using its private key and encrypts with , then sends it to the local EAG.
- Step 2
- The EAG decrypts the message using its own private key to retrieve the content. Then, it uses the OP’s signature to verify , and checks to ensure it is not a replayed message. It computes to extract ’s public key . Next, it verifies by ’s signature along with the OP’s signature. The EAG checks if the specified is available within its area. After verification, the EAG generates a supply request . and sends it to that .
- Step 3
- The that received the verifies the supply request through the EAG’s signature, and if the has excess energy and is interested in selling it to the other , then it generates a time stamp and , where “” is the amount of energy is offering to sell, and “” states the price is demanding for the traded energy. signs using its private key and encrypts with , then sends it to the local EAG.
- Step 4
- The EAG decrypts the message using its own private key to retrieve the content. Then, it uses the OP’s signature to verify , and checks to ensure it is not a replayed message. It computes to extract ’s public key . Next, it verifies by ’s signature along with the OP’s signature. The EAG matches to and schedules a V2V-charging location () for them. After matching, the EAG computes temporary keys for both sides. For , the EAG computes to protect the transmission of to . For , the EAG compute to protect the transmission of to .
- Step 5
- Both / generate their corresponding temporary keys to retrieve the content of the message. retrieves the matched ’s public key and verifies its with the one included within . When both and arrive at the specified location (), generates new random numbers, and , and computes the previous session key using Formula (18), to be used in encryption, and sends , , and to over DSRC.
- Step 6
- verifies the validity of through the signature using and . It decrypts the using to retrieve . needs to compute to obtain , and to ensure that the was sent by the authorized . To obtain a unique anonymous identity for this session, sequentially increments the counter (adds 1 to the previous ’s pseudo-ID) and hashes it. Then, it uses to generate the temporary key using Formula (19). It then generates , , and a new session key such as in Formula (20). then sends encrypted by to and begins the V2V-charging service for , which is protected by . Lastly, it updates the in the memory.
- Step 7
- generates the to retrieve and verifies . Then, it generates using Formula (20), to be used during the charging session, and updates .
4.5. V2V-Charging Phase
4.6. Revocation Protocol
- Step 1
- The EV creates the revocation request for ’s, , uses the OP’s public key to encrypt it, and forwards it to the OP.
- Step 2
- The OP uses its private key to decrypt the revocation request, then verifies using and , which is within . The OP should also check whether is valid in order to avoid a replay attack. Finally, the OP changes the status of to revoked. Because the EV’s signature is required, the adversary cannot create a fake revocation request.
5. Security Analysis
5.1. Informal Security Analysis
5.1.1. Mutual Authentication
5.1.2. Anonymity
5.1.3. Un-Linkability
5.1.4. Traceability
5.1.5. Forward/Backward Security
5.1.6. Joint Key Control
5.1.7. Non-Repudiation
5.1.8. Effective Re-Authentication
5.1.9. Revocation Functionality
5.1.10. Resist MITM/Replay Attack
5.1.11. Resist Impersonation Attack
6. Comparison with Related Schemes
6.1. Security and Functional-Feature Comparison
6.2. Computational Cost Comparison
6.3. Limitations
- The proposed scheme does not consider any parameter that is sent (between entities) and is not relevant to the authentication process in terms of shared key, identity, or security parameters.
- The proposed scheme is limited to the proposed EV-charging architecture, and any IoV architecture that can outperform EV-charging systems in terms of performance is not considered.
- The proposed scheme is a centralized authentication protocol; other authentication models, such as distributed and hybrid, were not investigated.
- The proposed scheme combines asymmetric and symmetric key structures, so any authentication technique based solely on the symmetric-key structure was not considered.
7. Conclusions
Author Contributions
Funding
Informed Consent Statement
Acknowledgments
Conflicts of Interest
References
- Ahmadi, P. Environmental Impacts and Behavioral Drivers of Deep Decarbonization for Transportation through Electric Vehicles. J. Clean. Prod. 2019, 225, 1209–1219. [Google Scholar] [CrossRef]
- Nereim, V. Saudi Arabia to Start Electric-Vehicle Push in Capital Riyadh; Bloomberg: New York, NY, USA, 2021. [Google Scholar]
- Global EV Outlook 2021—Analysis. IEA. Available online: https://www.iea.org/reports/global-ev-outlook-2021 (accessed on 2 November 2021).
- Kester, J.; Sovacool, B.K.; Noel, L.; Zarazua de Rubens, G. Rethinking the Spatiality of Nordic Electric Vehicles and Their Popularity in Urban Environments: Moving beyond the City? J. Transp. Geogr. 2020, 82, 102557. [Google Scholar] [CrossRef]
- Fu, Z.; Dong, P.; Ju, Y. An Intelligent Electric Vehicle Charging System for New Energy Companies Based on Consortium Blockchain. J. Clean. Prod. 2020, 261, 121219. [Google Scholar] [CrossRef]
- Kabir, M.E.; Sorkhoh, I.; Moussa, B.; Assi, C. Routing and Scheduling of Mobile EV Chargers for Vehicle to Vehicle (V2V) Energy Transfer. In Proceedings of the 2020 IEEE Power Energy Society General Meeting (PESGM), Montreal, QC, Canada, 2–6 August 2020; pp. 1–5. [Google Scholar] [CrossRef]
- AAA Says That Its Emergency Electric Vehicle Charging Trucks Served “Thousands” of EVs without Power-Electrek. Available online: https://electrek.co/2016/09/06/aaa-ev-emergency-charging-truck/ (accessed on 28 March 2022).
- Sadiq, A.; Javed, M.U.; Khalid, R.; Almogren, A.; Shafiq, M.; Javaid, N. Blockchain Based Data and Energy Trading in Internet of Electric Vehicles. IEEE Access 2021, 9, 7000–7020. [Google Scholar] [CrossRef]
- Liu, H.; Zhang, Y.; Yang, T. Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing. IEEE Netw. 2018, 32, 78–83. [Google Scholar] [CrossRef]
- Nedyalkov, I.; Arnaudov, D. Attacks and Security Measures of the Exchanged Information in the Charging Infrastructure for Electromobiles. In Proceedings of the 2019 IEEE XXVIII International Scientific Conference Electronics (ET), Sozopol, Bulgaria, 12–14 September 2019; pp. 1–4. [Google Scholar] [CrossRef]
- Kilari, V.T.; Yu, R.; Misra, S.; Xue, G. Robust Revocable Anonymous Authentication for Vehicle to Grid Communications. IEEE Trans. Intell. Transp. Syst. 2020, 21, 4845–4857. [Google Scholar] [CrossRef]
- Unterweger, A.; Knirsch, F.; Engel, D.; Musikhina, D.; Alyousef, A.; de Meer, H. An Analysis of Privacy Preservation in Electric Vehicle Charging. Energy Inform. 2022, 5, 3. [Google Scholar] [CrossRef]
- Saxena, N.; Grijalva, S.; Chukwuka, V.; Vasilakos, A.V. Network Security and Privacy Challenges in Smart Vehicle-to-Grid. IEEE Wirel. Commun. 2017, 24, 88–98. [Google Scholar] [CrossRef]
- Mustafa, M.A.; Zhang, N.; Kalogridis, G.; Fan, Z. Smart Electric Vehicle Charging: Security Analysis. In Proceedings of the 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 24–27 February 2013; pp. 1–6. [Google Scholar] [CrossRef]
- Hansen, M.; Jensen, M.; Rost, M. Protection Goals for Privacy Engineering. In Proceedings of the 2015 IEEE Security and Privacy Workshops, San Jose, CA, USA, 21–22 May 2015; pp. 159–166. [Google Scholar] [CrossRef]
- Mundhe, P.; Verma, S.; Venkatesan, S. A Comprehensive Survey on Authentication and Privacy-Preserving Schemes in VANETs. Comput. Sci. Rev. 2021, 41, 100411. [Google Scholar] [CrossRef]
- Zhang, J.; Cui, J.; Zhong, H.; Chen, Z.; Liu, L. PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks. IEEE Trans. Dependable Secur. Comput. 2021, 18, 722–735. [Google Scholar] [CrossRef]
- Koblitz, N.; Menezes, A.; Vanstone, S. The State of Elliptic Curve Cryptography. Des. Codes Cryptogr. 2000, 19, 173–193. [Google Scholar] [CrossRef]
- Brown, D.R.L.; Gallant, R.; Vanstone, S.A. Provably Secure Implicit Certificate Schemes. In Financial Cryptography; Syverson, P., Ed.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2002; pp. 156–165. [Google Scholar] [CrossRef]
- Ha, D.A.; Nguyen, K.T.; Zao, J.K. Efficient Authentication of Resource-Constrained IoT Devices Based on ECQV Implicit Certificates and Datagram Transport Layer Security Protocol. In Seventh Symposium on Information and Communication Technology; SoICT ’16; Association for Computing Machinery: New York, NY, USA, 2016; pp. 173–179. [Google Scholar] [CrossRef]
- Campagna, M. Sec 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (Ecqv). Stand. Effic. Cryptogr. Version 2013, 1, 5–11. [Google Scholar]
- Kim, O.T.T.; Tran, N.H.; Nguyen, V.; Kang, S.M.; Hong, C.S. Cooperative between V2C and V2V Charging: Less Range Anxiety and More Charged EVs. In Proceedings of the 2018 International Conference on Information Networking (ICOIN), Chiang Mai, Thailand, 10–12 January 2018; pp. 679–683. [Google Scholar] [CrossRef]
- Li, G.; Sun, Q.; Boukhatem, L.; Wu, J.; Yang, J. Intelligent Vehicle-to-Vehicle Charging Navigation for Mobile Electric Vehicles via VANET-Based Communication. IEEE Access 2019, 7, 170888–170906. [Google Scholar] [CrossRef]
- Li, G.; Boukhatem, L.; Zhao, L.; Wu, J. Direct Vehicle-to-Vehicle Charging Strategy in Vehicular Ad-Hoc Networks. In Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 26–28 February 2018; pp. 1–5. [Google Scholar] [CrossRef]
- Yucel, F.; Bulut, E.; Akkaya, K. Privacy Preserving Distributed Stable Matching of Electric Vehicles and Charge Suppliers. In Proceedings of the 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), Chicago, IL, USA, 27–30 August 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Yucel, F.; Akkaya, K.; Bulut, E. Efficient and Privacy Preserving Supplier Matching for Electric Vehicle Charging. Ad Hoc Netw. 2019, 90, 101730. [Google Scholar] [CrossRef]
- Sun, G.; Dai, M.; Zhang, F.; Yu, H.; Du, X.; Guizani, M. Blockchain-Enhanced High-Confidence Energy Sharing in Internet of Electric Vehicles. IEEE Internet Things J. 2020, 7, 7868–7882. [Google Scholar] [CrossRef]
- Li, H.; Dán, G.; Nahrstedt, K. FADEC: Fast Authentication for Dynamic Electric Vehicle Charging. In Proceedings of the 2013 IEEE Conference on Communications and Network Security (CNS), National Harbor, MD, USA, 14–16 October 2013; pp. 369–370. [Google Scholar] [CrossRef]
- Huang, X.; Xu, C.; Wang, P.; Liu, H. LNSC: A Security Model for Electric Vehicle and Charging Pile Management Based on Blockchain Ecosystem. IEEE Access 2018, 6, 13565–13574. [Google Scholar] [CrossRef]
- Li, H.; Dán, G.; Nahrstedt, K. Portunes+: Privacy-Preserving Fast Authentication for Dynamic Electric Vehicle Charging. IEEE Trans. Smart Grid 2017, 8, 2305–2313. [Google Scholar] [CrossRef]
- Diffie, W.; Hellman, M. New Directions in Cryptography. IEEE Trans. Inf. Theory 1976, 22, 644–654. [Google Scholar] [CrossRef]
- Roberts, B.; Akkaya, K.; Bulut, E.; Kisacikoglu, M. An Authentication Framework for Electric Vehicle-to-Electric Vehicle Charging Applications. In Proceedings of the 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Orlando, FL, USA, 22–25 October 2017; pp. 565–569. [Google Scholar] [CrossRef]
- Aitzhan, N.Z.; Svetinovic, D. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams. IEEE Trans. Dependable Secur. Comput. 2018, 15, 840–852. [Google Scholar] [CrossRef]
- Kang, J.; Yu, R.; Huang, X.; Maharjan, S.; Zhang, Y.; Hossain, E. Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains. IEEE Trans. Ind. Inform. 2017, 13, 3154–3164. [Google Scholar] [CrossRef]
- Chaudhary, R.; Jindal, A.; Aujla, G.S.; Aggarwal, S.; Kumar, N.; Choo, K.-K.R. BEST: Blockchain-Based Secure Energy Trading in SDN-Enabled Intelligent Transportation System. Comput. Secur. 2019, 85, 288–299. [Google Scholar] [CrossRef]
- Yahaya, A.S.; Javaid, N.; Javed, M.U.; Shafiq, M.; Khan, W.Z.; Aalsalem, M.Y. Blockchain-Based Energy Trading and Load Balancing Using Contract Theory and Reputation in a Smart Community. IEEE Access 2020, 8, 222168–222186. [Google Scholar] [CrossRef]
- Li, Y.; Hu, B. An Iterative Two-Layer Optimization Charging and Discharging Trading Scheme for Electric Vehicle Using Consortium Blockchain. IEEE Trans. Smart Grid 2020, 11, 2627–2637. [Google Scholar] [CrossRef]
- Long, Y.; Chen, Y.; Ren, W.; Dou, H.; Xiong, N.N. DePET: A Decentralized Privacy-Preserving Energy Trading Scheme for Vehicular Energy Network via Blockchain and K-Anonymity. IEEE Access 2020, 8, 192587–192596. [Google Scholar] [CrossRef]
- Javed, M.U.; Javaid, N.; Malik, M.W.; Akbar, M.; Samuel, O.; Yahaya, A.S.; Othman, J.B. Blockchain Based Secure, Efficient and Coordinated Energy Trading and Data Sharing between Electric Vehicles. Clust. Comput. 2021, 25, 1839–1867. [Google Scholar] [CrossRef]
- Cui, Z.; XUE, F.; Zhang, S.; Cai, X.; Cao, Y.; Zhang, W.; Chen, J. A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN. IEEE Trans. Serv. Comput. 2020, 13, 241–251. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Decentralized Bus. Rev. 2008, 4, 21260. [Google Scholar]
- Halpin, H.; Piekarska, M. Introduction to Security and Privacy on the Blockchain. In Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS PW), Paris, France, 26–28 April 2017; pp. 1–3. [Google Scholar] [CrossRef]
- Piao, Y.; Ye, K.; Cui, X. A Data Sharing Scheme for GDPR-Compliance Based on Consortium Blockchain. Future Internet 2021, 13, 217. [Google Scholar] [CrossRef]
- Xia, S.; Lin, F.; Chen, Z.; Tang, C.; Ma, Y.; Yu, X. A Bayesian Game Based Vehicle-to-Vehicle Electricity Trading Scheme for Blockchain-Enabled Internet of Vehicles. IEEE Trans. Veh. Technol. 2020, 69, 6856–6868. [Google Scholar] [CrossRef]
- Khan, A.G.; Basharat, S.; Riaz, M.U. Analysis of Asymmetric Cryptography in Information Security Based on Computational Study to Ensure Confidentiality during Information Exchange. Int. J. Sci. Eng. Res. 2018, 9, 992–999. [Google Scholar]
- Bokhari, M.U.; Shallal, Q.M. A Review on Symmetric Key Encryption Techniques in Cryptography. Int. J. Comput. Appl. 2016, 147, 43–48. [Google Scholar]
- Al-Shareeda, M.A.; Anbar, M.; Hasbullah, I.H.; Manickam, S. Survey of Authentication and Privacy Schemes in Vehicular Ad Hoc Networks. IEEE Sens. J. 2021, 21, 2422–2433. [Google Scholar] [CrossRef]
- Braeken, A.; Touhafi, A. AAA—Autonomous Anonymous User Authentication and Its Application in V2G. Concurr. Comput. Pract. Exp. 2018, 30, e4303. [Google Scholar] [CrossRef]
- Ali, F.S.; Aloqaily, M.; Alfandi, O.; Ozkasap, O. Cyberphysical Blockchain-Enabled Peer-to-Peer Energy Trading. Computer 2020, 53, 56–65. [Google Scholar] [CrossRef]
- Azam, F.; Yadav, S.K.; Priyadarshi, N.; Padmanaban, S.; Bansal, R.C. A Comprehensive Review of Authentication Schemes in Vehicular Ad-Hoc Network. IEEE Access 2021, 9, 31309–31321. [Google Scholar] [CrossRef]
- Baee, M.A.R.; Simpson, L.; Foo, E.; Pieprzyk, J. Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2. IEEE Trans. Veh. Technol. 2019, 68, 11577–11587. [Google Scholar] [CrossRef]
- Almuhaideb, A.M. Re-AuTh: Lightweight Re-Authentication with Practical Key Management for Wireless Body Area Networks. Arab. J. Sci. Eng. 2021, 46, 8189–8202. [Google Scholar] [CrossRef]
- CHAdeMO. Available online: https://www.chademo.com/ (accessed on 2 April 2022).
- Kumar, G.; Saha, R.; Rai, M.K.; Buchanan, W.J.; Thomas, R.; Geetha, G.; Hoon-Kim, T.; Rodrigues, J.J.P.C. A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption. IEEE Trans. Veh. Technol. 2020, 69, 7707–7722. [Google Scholar] [CrossRef]
- Kilinc, H.H.; Yanik, T. A Survey of SIP Authentication and Key Agreement Schemes. IEEE Commun. Surv. Tutor. 2014, 16, 1005–1023. [Google Scholar] [CrossRef]
Notations | Meaning |
---|---|
EV | Electric vehicle |
Demander/Supplier electric vehicle | |
EAG | Energy aggregator |
OP | Electricity operator |
Elliptic curve (EC) over a finite field, where is a large prime number | |
G | Base point in with order |
, | Real identity of EV/EAG |
EC key pair for entity | |
Private-key-construction data of entity | |
Certificates of entity | |
() | Signing a message with entity ’s private key |
Encrypting a message with entity ’s public key | |
Authenticator of entity | |
Hash of authenticator of entity | |
Time stamp generated by | |
TL | Time life |
Hash of certificate | |
Public key/Private key for entity | |
RK, RK’ | Registration key between EV and OP/EAG and OP |
Anonymous identity of EV issued by OP | |
Counter of , incremented by EV | |
Nonce generated by | |
An authorization token, issued by EAG to EV | |
Symmetric master key shared between EV and EAG | |
Symmetric initial key shared between EV and EAG | |
Symmetric temporary key shared between EV and EAG | |
Symmetric session key shared between EV and EAG | |
One-way hash function | |
Concatenation operation |
Feature/Approach | Sadiq et al. [8] | Sun et al. [27] | Roberts et al. [32] | Aitzhan and Svetinovic [33] | Kang et al. [34] | Chaudhary et al. [35] | Yahaya et al. [36] | Li and Hu [37] | Long et al. [38] | Javed et al. [39] | Cui et al. [44] | Proposed |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2021 | 2020 | 2017 | 2016 | 2017 | 2019 | 2020 | 2019 | 2020 | 2021 | 2020 | 2022 | |
Mutual Authentication | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | × | ✓ | × | ✓ | ✓ |
Forward security | × | × | ✓ | ✓ | × | × | × | × | × | × | × | ✓ |
Anonymity | ✓ | × | × | ✓ | ✓ | × | × | ✓ | ✓ | × | ✓ | ✓ |
Resist replay attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | × | ✓ | ✓ | ✓ |
Resist impersonation attack | ✓ | × | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | × | ✓ | ✓ | ✓ |
Resist MITM attack | × | × | ✓ | ✓ | × | ✓ | ✓ | ✓ | ✓ | × | × | ✓ |
Un-linkability | × | × | × | ✓ | ✓ | ✓ | ✓ | ✓ | × | × | × | ✓ |
Traceability | ✓ | ✓ | × | ✓ | ✓ | ✓ | ✓ | ✓ | × | ✓ | × | ✓ |
Effective Re-authentication | × | × | × | × | × | × | × | × | × | × | × | ✓ |
Revocation method | × | × | × | × | × | × | × | × | × | × | × | ✓ |
Joint key control | × | × | × | × | × | × | × | × | × | × | × | ✓ |
Non-Repudation | ✓ | ✓ | × | ✓ | × | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Number of Messages (EV) | 2 | 1 | 5 | 2 | 2 | 3 | 1 | 1 | 1 | 2 | 1 | 2 |
Notation/ Operation | Elliptic-Curve Encryption | Symmetric | Scalar Multiplication | Modular Exponentiation | |
---|---|---|---|---|---|
Time (ms) | 0.43 | 0.0023 | 0.0046 | 2.226 | 3.85 |
Approach/Efficiency Feature | Computational Cost of EV | |
---|---|---|
Authentication Phase | Re-Authentication Phase | |
Roberts et al. ‘s scheme [32] | ||
Proposed scheme |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Almuhaideb, A.M.; Algothami, S.S. Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV. J. Sens. Actuator Netw. 2022, 11, 28. https://doi.org/10.3390/jsan11020028
Almuhaideb AM, Algothami SS. Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV. Journal of Sensor and Actuator Networks. 2022; 11(2):28. https://doi.org/10.3390/jsan11020028
Chicago/Turabian StyleAlmuhaideb, Abdullah M., and Sammar S. Algothami. 2022. "Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV" Journal of Sensor and Actuator Networks 11, no. 2: 28. https://doi.org/10.3390/jsan11020028
APA StyleAlmuhaideb, A. M., & Algothami, S. S. (2022). Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV. Journal of Sensor and Actuator Networks, 11(2), 28. https://doi.org/10.3390/jsan11020028