A Conditional Privacy-Preserving Authentication Scheme for Electricity Transaction in V2G Network
DOI: 10.23977/acss.2023.070215 | Downloads: 12 | Views: 355
Author(s)
Baoyi Wang 1, Xue Guo 1, Shaomin Zhang 1
Affiliation(s)
1 School of Control and Computer Engineering, North China Electric Power University, Baoding, Hebei, 071003, China
Corresponding Author
Baoyi WangABSTRACT
The charging/discharging behavior of Electric Vehicle (EV) will naturally generate two-way electricity transactions between EV user and charging operator. Before electricity transaction, EV and Vehicle to Grid (V2G) network need to be mutually authenticated. However, wireless communication technology is usually adopted in V2G network, which easily leaks the privacy of EV user. Therefore, a conditional privacy-preserving authentication and key agreement scheme for electricity transaction in V2G network is proposed. In this scheme, the anonymity of EV user is guaranteed, and the true identity of EV user can be tracked when a transaction dispute occurs, which guarantees conditional privacy.
KEYWORDS
V2G, electricity transaction, authentication, conditional privacyCITE THIS PAPER
Baoyi Wang, Xue Guo, Shaomin Zhang. A Conditional Privacy-Preserving Authentication Scheme for Electricity Transaction in V2G Network. Advances in Computer, Signals and Systems (2023) Vol. 7: 106-111. DOI: http://dx.doi.org/10.23977/acss.2023.070215.
REFERENCES
[1] S. Aggarwal, N. Kumar, and P. Gope. An Efficient Blockchain-Based Authentication Scheme for Energy-Trading in V2G Networks [J]. IEEE Transactions on Industrial Informatics, VOL. 17, NO. 10, Pages: 6971-6980, OCT 2021.
[2] Q. Yang, D. Li, and D. An, et al. Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids [J]. IEEE Transactions on Dependable and Secure Computing, VOL. 19, NO. 1, Pages: 131-148, 2022.
[3] S. M. Danish, K. Zhang, and H. -A. Jacobsen, et al. BlockEV: Efficient and Secure Charging Station Selection for Electric Vehicles [J]. IEEE Transactions on Intelligent Transportation Systems, VOL. 22, NO. 7, Pages: 4194-4211, JUL 2021.
[4] Z. Wan, T. Zhang, W. Liu, M. Wang, and L. Zhu. Decentralized Privacy-Preserving Fair Exchange Scheme for V2G Based on Blockchain [J]. IEEE Transactions on Dependable and Secure Computing, VOL. 19, NO. 4, Pages: 2442–2456, JUL 2022.
[5] P. R. Babu, R. Amin, and A. G. Reddy, et al. Robust Authentication Protocol for Dynamic Charging System of Electric Vehicles [J]. IEEE Transactions on Vehicular Technology, VOL. 70, NO. 11, Pages: 11338-11351, NOV 2021.
[6] L. F.A. Roman, P. R.L. Gondim, and J. Lloret. Pairing-based Authentication Protocol for V2G Networks in Smart Grid [J]. Ad Hoc Networks, VOL. 90, 2018.
[7] S. Ahmed, S. Shamshad, and Z. Ghaffar, et al. Signcryption Based Authenticated and Key Exchange Protocol for EI-Based V2G Environment [J]. IEEE Transactions on Smart Grid, VOL. 12, NO. 6, Pages: 5290-5298, NOV 2021.
[8] R. Vinoth, L. J. Deborah, P. Vijayakumar and N. Kumar. Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT [J]. IEEE Internet of Things Journal, VOL. 8, NO. 5, Pages: 3801-3811, MAR 2021.
[9] N. B. Gayathri, G. Thumbur, and P. Rajesh Kumar, et al. Efficient and Secure Pairing-Free Certificateless Aggregate Signature Scheme for Healthcare Wireless Medical Sensor Networks[J]. IEEE Internet of Things Journal, VOL. 6, NO. 5, Pages: 9064-9075, OCT 2019.
Downloads: | 13683 |
---|---|
Visits: | 260404 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks