Font Size: a A A

Research On User Privacy Protection In V2G Networks

Posted on:2021-02-17Degree:MasterType:Thesis
Country:ChinaCandidate:M OuFull Text:PDF
GTID:2492306470986309Subject:Traffic and Transportation Engineering
Abstract/Summary:PDF Full Text Request
Electric vehicle to grid technology(V2G,Vehicle-to-Grid)combined smart grids with electric vehicles,enabling electric vehicle groups to as energy storage to provide a buffer for the grid and new energy sources,reducing the cost of power generation facilities in the grid,and improving environmental problems.V2 G technology can not only realize the intelligent charging of electric vehicles,but also provide the grid with fast store and release electrical energy.However,electric vehicles reported their status information to local aggregators through wireless communication technology or pay with the grid wirelessly/Charge operation,and the wireless communication network is an open network,which is susceptible to various network security attacks,so that the relevant information of electric vehicles(EV)may be completely exposed to the attacker.The attackers can easily obtain information such as the work location,home location,entertainment behavior,and lifestyle habits of users,which in turn posed a series of threats to the life and property of users.Therefore,it was very important to ensure the secure transmission of the user’s privacy in the V2 G network.We researched user privacy preserve in the V2 G network from the perspective of anonymous authentication and secure payment.The main research contents are as follows:First,given the privacy issues involved in the process of information reporting when electric vehicles joined the power grid,proposed an authentication scheme for conditional privacy-preserving in the V2 G network that supported forward security.In the scheme,aggregators periodically broadcasted the authentication message to the electric vehicles in the area.The electric vehicles responded to the authentication message sent by the aggregator and completed the mutual authentication process with the LAG and established a shared secret key and through the shared session key for secure communication.Secondly,we proposed a new forward-secure anonymous authentication scheme that does not use certificates in V2 G.The innovation of this scheme was that the LAG in the system no longer used the TA for the certificate issued by it to perform the mutual authentication process with the EV,eliminating the certificate management problems caused by the update and storage of the certificate and overhead issues caused by certificate query and verification during authentication.Finally,given the security payment problem in the charging and discharging process of electric vehicles in the V2 G network,a traceable anonymous charging and discharging payment privacy protection scheme for the V2 G network was proposed.By introducing the participation of trusted third parties,realized the privacy-preserving of the electric vehicle payment process in the two-way charging and discharging scenario for the V2 G network.Security analysis showed that this payment scheme can not only meet anonymity,Irrelevance,message confidentiality,and integrity,but can also track malicious users who used the same virtual currency for double payment behaviors.Performance analysis showed that the scheme had lower computational overhead and communication overhead.
Keywords/Search Tags:V2G, privacy protection, anonymous authentication, forward security, secure payment
PDF Full Text Request
Related items