دورية أكاديمية

Traceable and Privacy-Preserving Authentication Scheme for Energy Trading in V2G Networks

التفاصيل البيبلوغرافية
العنوان: Traceable and Privacy-Preserving Authentication Scheme for Energy Trading in V2G Networks
المؤلفون: Shen, Gang, Xia, Chengliangyi, Li, Yumei, Shen, Hua, Meng, Weizhi, Zhang, Mingwu
المصدر: Shen , G , Xia , C , Li , Y , Shen , H , Meng , W & Zhang , M 2024 , ' Traceable and Privacy-Preserving Authentication Scheme for Energy Trading in V2G Networks ' , Ieee Internet of Things Journal , vol. 11 , no. 4 , pp. 6664 - 6676 . https://doi.org/10.1109/JIOT.2023.3311800Test
سنة النشر: 2024
المجموعة: Technical University of Denmark: DTU Orbit / Danmarks Tekniske Universitet
مصطلحات موضوعية: Vehicle-to-grid (V2G), Authentication, Certificateless signature, Batch verification, Random oracle model (ROM), /dk/atira/pure/sustainabledevelopmentgoals/affordable_and_clean_energy, name=SDG 7 - Affordable and Clean Energy
الوصف: With the rapid popularization of electric vehicles (EVs) in modern society, vehicle-to-grid (V2G) has been widely concerned as an emerging technology. However, various privacy and security issues arise frequently in the energy interaction between EVs and the smart grid (SG), such as the lack of secure authentication and disclosure of EVs’ identity. Although many crypto-based schemes are proposed to achieve secure authentication of V2G networks, they rely on certification authority (CA) or private key generator (PKG). In response to this problem, some certificateless signature-based schemes have been proposed. Nevertheless, most of them are not suitable for V2G networks due to the high computational cost and communication overhead, and they do not consider the problem of tracking illegal signatures. Therefore, we propose a traceable and privacy-preserving authentication scheme with supporting batch verification for energy trading in V2G networks. We use the method of binary tree level traversal to quickly track EVs with illegal signatures, which can reduce computational resources. Besides, the proposed scheme is easier to be deployed in real world because of avoiding the problems of key escrow and certificate management. Finally, we conduct a comprehensive security analysis and performance evaluation regarding our scheme. We prove that our proposed scheme is secure under the random oracle model (ROM), and the experimental results illustrate that the proposed scheme has less computational cost and communication overhead as compared to the existing schemes.
نوع الوثيقة: article in journal/newspaper
وصف الملف: application/pdf
اللغة: English
العلاقة: https://orbit.dtu.dk/en/publications/0fdea88a-dc84-4754-b5e6-2a088c4ccab9Test
DOI: 10.1109/JIOT.2023.3311800
الإتاحة: https://doi.org/10.1109/JIOT.2023.3311800Test
https://orbit.dtu.dk/en/publications/0fdea88a-dc84-4754-b5e6-2a088c4ccab9Test
https://backend.orbit.dtu.dk/ws/files/337178683/Traceable_and_Privacy-Preserving_Authentication_Scheme_for_Energy_Trading_in_V2G_Networks.pdfTest
حقوق: info:eu-repo/semantics/openAccess
رقم الانضمام: edsbas.8E2A07E9
قاعدة البيانات: BASE