| Non-renewable resources such as traditional fossil fuels such as oil and coal are gradually being depleted,forcing mankind to look for cleaner,renewable energy alternatives.In this context,green smart grids are gradually replacing traditional fossil fuel grids.Vehicle-to-Grid(V2G)technology allows electric vehicles to participate in the deployment of energy.On one hand,it provides customers with an economical,clean and interactive supply of electricity,on the other hand,it creates two-way communication between the customer and the electricity supplier.However,despite these advantages,the V2 G network still poses threats to security and privacy.Before the grid provides services to electric vehicles,mutual authentication between electric vehicles and the grid is necessary.Otherwise,malicious attackers can forge as unauthorized charging stations to obtain the location and identity information of electric vehicles.Additionally,local aggregators need to handle authentication messages from a large number of electric vehicles simultaneously,leading to bandwidth congestion and high network latency.Furthermore,there may be some untrustworthy users in the V2 G environment,making it difficult to safeguard the interests and privacy of other vehicle owners.Therefore,this thesis proposes two identity authentication protocols to address these issues.(1)Authentication key exchange protocol with conditional privacy protectionIn view of the situations that electric vehicles are resource constrained and need to interact with both the registration center and the local aggregator,this thesis proposes an authentication key exchange protocol.The protocol uses elliptic curve cryptography to construct a lightweight authentication scheme that reduces the computational overhead of the electric vehicles and simplifies the complexity of authentication.By combining the physical unclonable function and pseudonym technique,session key agreement can be achieved without revealing the true identity information of the vehicles.In addition,when malicious vehicles appear in the system,the registration center can use its stored secret value to track the target vehicles.Finally,this protocol proves the security of the protocol through formal analysis under a random oracle model and informal analysis.The experimental simulation results demonstrate that the protocol has significant performance advantages.(2)Anonymous group authentication protocol supporting dynamic operationsIn view of the problems of easy disclosure of user identity privacy and inefficient message authentication due to simultaneous authentication of a large number of electric vehicles,this thesis proposes an anonymous group authentication protocol that supports dynamic management.Firstly,the protocol makes use of three-factor authentication with password,smart card and fingerprint to avoid the shortcomings of single-factor authentication and ensure the legitimate identity of users.Secondly,the protocol introduces identity-based signature technology to achieve the unforgeability and integrity of electricity transactions.Moreover,it improves the efficiency of group authentication by aggregating the signatures of vehicles in the domain for batch verification.In addition,the protocol updates the group key with the help of the Chinese remainder theorem,enabling dynamic management of vehicles.Finally,a detailed security analysis proves that the protocol designed in this thesis can be better adapted to the V2 G environment and achieve more security features. |