面向雾辅助V2G网络的匿名认证方案
Anonymous Authentication Scheme for Fog-Assisted V2G Networks
DOI: 10.12677/csa.2024.146138, PDF,   
作者: 毕 雪, 岳笑含:沈阳工业大学信息科学与工程学院,辽宁 沈阳
关键词: V2G网络匿名认证隐私保护V2G Networks Anonymous Authentication Privacy-Preserving
摘要: 车辆到电网(Vehicle-to-grid, V2G)作为一种新的智能电网模式,可以与可再生能源相结合,提供电力服务,管理电力需求,并建立双向互动的服务模式。电动汽车在请求充放电服务时,需要先向充电站发送带有可识别信息的身份认证信息,从而引起一些安全与隐私方面的威胁。因此,针对此类问题,本文结合密码学匿名凭证思想,提出了一种面向雾辅助V2G网络的匿名认证方案,满足匿名性、不可伪造性、可追踪性、可撤销性等安全需求。在性能方面,给出了方案的功能性分析和性能测试结果,对不同阶段各实体的计算代价进行分析,结果表明所提出的方案在功能性和性能两个方面都具有实际意义。综上,提出的方案可为V2G网络提供一种高效、隐私且安全的认证方案。
Abstract: Vehicle-to-grid (V2G), as a new smart grid model, can be combined with renewable energy sources to provide electricity services, manage electricity demand, and establish a two-way interactive service model. When electric vehicles request charging and discharging services, they need to send identification information with identifiable information to the charging station, which causes some security and privacy threats. Therefore, in order to solve such problems, this paper proposes an anonymous authentication scheme for fog-assisted V2G network based on the idea of anonymous credential in cryptography, which meets the security requirements of anonymity, unforgeability, traceability, revocation and so on. In terms of performance, the functional analysis and performance test results of the scheme are given, and the computational cost of each entity in different stages is analyzed. The results show that the proposed scheme has practical significance in both functionality and performance. In summary, the proposed scheme can provide an efficient, private and secure authentication scheme for V2G networks.
文章引用:毕雪, 岳笑含. 面向雾辅助V2G网络的匿名认证方案[J]. 计算机科学与应用, 2024, 14(6): 25-31. https://doi.org/10.12677/csa.2024.146138

参考文献

[1] 王睿涛. 基于区块链的V2G安全认证技术研究[D]: [硕士学位论文]. 北京: 华北电力大学, 2023.
[2] Guille, C. and Gross, G. (2009) A Conceptual Framework for the Vehicle-to-Grid (V2G) Implementation. Energy Policy, 37, 4379-4390. [Google Scholar] [CrossRef
[3] Hussain, S.M.S., Ustun, T.S., Nsonga, P. and Ali, I. (2018) IEEE 1609 WAVE and IEC 61850 Standard Communication Based Integrated EV Charging Management in Smart Grids. IEEE Transactions on Vehicular Technology, 67, 7690-7697. [Google Scholar] [CrossRef
[4] 中华人民共和国国家发展和改革委员会. 国家发展改革委等部门关于加强新能源汽车与电网融合互动的实施意见[EB/OL].
https://www.ndrc.gov.cn/xxgk/zcfb/tz/202401/t20240104_1363096_ext.html, 2023-12-23.
[5] Saxena, N., Grijalva, S., Chukwuka, V. and Vasilakos, A.V. (2017) Network Security and Privacy Challenges in Smart Vehicle-to-Grid. IEEE Wireless Communications, 24, 88-98. [Google Scholar] [CrossRef
[6] Galbraith, S.D., Paterson, K.G. and Smart, N.P. (2008) Pairings for Cryptographers. Discrete Applied Mathematics, 156, 3113-3121. [Google Scholar] [CrossRef
[7] Menezes, A. and Menezes, A. (1993) The Discrete Logarithm Problem. Elliptic Curve Public Key Cryptosystems, 49-59.
[8] Boneh, D. (1998) The Decision Diffie-Hellman Problem. Algorithmic Number Theory: Third International Symposium, Oregon, 48-63. [Google Scholar] [CrossRef
[9] Pointcheval, D. and Sanders, O. (2016) Short Randomizable Signatures. CT-RSA. CryptographersTrack at the RSA Conference, Springer, Berlin, 111-126. [Google Scholar] [CrossRef
[10] Angelo, D. and Vincenzo, C. (2011) Java Pairing Based Cryptography. 16th IEEE Symposium on Computers and Communications (ISCC), Kerkyra, 850-855.