Font Size: a A A

Research On User Identity Authentication And Privacy Protection Methods Under V2G

Posted on:2022-07-08Degree:MasterType:Thesis
Country:ChinaCandidate:Z Z DuFull Text:PDF
GTID:2492306566476504Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
With the gradual popularization of electric vehicles(EV),the V2 G network,as an important component of the smart grid,has shown great potential in providing valuable auxiliary services(such as peak shaving and valley filling).More and more EVs join the V2 G network,and user privacy is easily leaked after malicious saboteurs attack.Therefore,secure mutual authentication for V2 G has become crucial.After the charging or discharging operation,a real-time pricing system needs to be implemented immediately for billing.In the current scenario of the V2 G system,the real-time state of charge(So C)information of each battery is transmitted to the controller or aggregator to calculate the real-time The price of the charging or discharging power unit.Malicious opponents can infer the identity information of the EV user based on the billing data and battery information,as well as the privacy of life routines and entertainment preferences,and the personal location is also easily exposed.Therefore,the V2 G system needs a safe and reliable privacy protection payment system to adapt to the charging and discharging transactions of a large number of vehicles in the network.In the case of processing a large number of frequent transactions,it must also provide anonymity while protecting the privacy of car owners.This shows that to develop V2 G networks,the security and privacy issues that users care about must be resolved.First of all,in response to the problem of privacy leakage during the charging/discharging phase of EVs,a lightweight,dynamic anonymous user identity authentication and session key agreement scheme for V2 G networks is proposed.Before charging/discharging,the fuzzy extractor and the third-party key are used to complete the dynamic anonymous identity authentication of the user,and the key agreement process is designed.The theory proves that this scheme can resist malicious attacks such as impersonation and offline password guessing,and can also ensure the secure mutual authentication of participants and the security of the session key.Compared with other authentication schemes,experimental analysis proves that this scheme has less time overhead and With higher security,it can be effectively deployed in the actual V2 G network environment.Then,in view of the problem that personal privacy is easily leaked during the two-way payment process after the charge/discharge is over,an anonymous payment model based on permissioned blockchain and group intelligence perception platform is designed.The model includes a novel strategy to ensure that participants send encrypted wallet addresses to Crowdchain,and send data that does not contain user identification to the group intelligence perception platform,making partici pants anonymous on the platform.Finally,in view of the applicability of the proposed anonymous payment mode l in the V2 G network,a V2 G privacy protection anonymous payment system based on the permissioned blockchain is designed.The programming realizes the anonymous payment process of the system.The theory proves that the scheme meets unforgeability,confidentiality and unconditional anonymity,and has more efficient security functions compared with the existing scheme;experimental analysis proves that the computational cost is less and it is suitable for intelligence The grid efficiently handles the situation where a large number of electric vehicles join.
Keywords/Search Tags:V2G, anonymous identity authentication, blockchain, anonymous payment, privacy protection
PDF Full Text Request
Related items