Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2512921.2512926acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Security and privacy of electric vehicles in the smart grid context: problem and solution

Published: 03 November 2013 Publication History

Abstract

The technology, security and privacy requirements of the electric vehicle (EV) in the smart grid (SG) context, especially when the EV acts as mobile power storage, have gained much attention from the research community and market recently. This role of the EV is motivated by the increase in capacity of the power storages in the EV. In this paper, first we present different situations that an EV can be in the SG context and their privacy issues. Then, we provide two authentication schemes, first one between the EV and a trusted SG server directly, and second one via a non-trusted third party entity with a robust privacy-preserving agenda. Our analysis shows that our mechanisms are secure and robust enough to make sure the privacy of the customers is fully preserved, and at the same time, are efficient since they consume very limited resources.

References

[1]
NIST Smart Grid, Cyber Security Working Group, "Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security," Guideline, Sep. 2010. {Online}. Available: www.nist.gov/smartgrid
[2]
H. Khurana, M. Hadley, N. Lu, and D. Frincke, "Smart-grid security issues," IEEE Security & Privacy, vol. 8, no. 1, pp. 81--85, 2010.
[3]
NIST Smart Grid, Cyber Security Working Group, "Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements," Guideline, Aug. 2010. {Online}. Available: www.nist.gov/smartgrid
[4]
W. Su, H. Eichi, W. Zeng, and M. Chow, "A survey on the electrification of transportation in a smart grid environment," IEEE Transactions on Industrial Informatics, vol. 8, no. 1, pp. 1--10, 2012.
[5]
H. Chaudhry and T. Bohn, "Security concerns of a plug-in vehicle," in IEEE PES Innovative Smart Grid Technologies (ISGT). IEEE, 2012, pp. 1--6.
[6]
S. Han, S. Han, and K. Sezaki, "Estimation of Achievable Power Capacity From Plug-in Electric Vehicles for V2G Frequency Regulation: Case Studies for Market Participation," IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 632--641, 2011.
[7]
J. Keiser, J. Glass, N. Masuch, M. Lutzenberger, and S. Albayrak, "A distributed multi-operator W2V2G management approach," in IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, 2011, pp. 273--278.
[8]
H. Nicanfar, P. Jokar, K. Beznosov, and V. Leung, "Efficient authentication and key management mechanisms for smart grid communications," Systems Journal, IEEE, vol. PP, no. 99, pp. 1--12, 2013.
[9]
A. Shamir, "Identity-based Cryptosystems and Signature Schemes," in Advances in Cryptology-CRYPTO 1984. Springer, 1984, pp. 47--53.
[10]
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Advances in Cryptology-CRYPTO 2001. Springer, 2001, pp. 213--229.
[11]
H. Nicanfar and V. C. M. Leung, "EIBC: Enhanced Identity-Based Cryptography, a Conceptual Design," in Proc. IEEE SysCon, Vancouver, BC, Mar. 2012.
[12]
P. TalebiFard and V. Leung, "A content centric approach to dissemination of information in vehicular networks," in Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications. ACM, 2012, pp. 17--24.
[13]
P. TalebiFard and V. C.M.Leung, "Towards a Content-Centric Approach to Crowd-sensing in Vehicular Cloud," Special Issue on Advanced Smart Vehicular Communication System and Applications, Journal of Systems Architecture,2013.
[14]
X. Hu, J. Zhao, D. Zhou, and V. Leung, "A semantics-based multi-agent framework for vehicular social network development," in Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications. ACM, 2011, pp. 87--96.
[15]
H. Nicanfar, S. Hosseininezhad, P. TalebiFard, and V. Leung, "Robust privacy-preserving authentication scheme for communication between electric vehicle as power energy storage and power stations," in Computer Communications Workshops (INFOCOM WKSHPS), 2013 IEEE Conference on. IEEE, 2013, pp. 55--60.
[16]
T. Wu phet al., "SRP-6: Improvements and Refinements to the Secure Remote Password Protocol," P1363.2 working group,.
[17]
NIST Smart Grid, Cyber Security Working Group, "Guidelines for Smart Grid Cyber Security: Vol. 2, Privacy and the Smart Grid," Guideline, Aug. 2010. {Online}. Available: www.nist.gov/smartgrid
[18]
A. Pfitzmann and M. Hansen, "A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management," http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf, Aug. 2010, v0.34. {Online}. Available: http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf
[19]
D. Zheng, F. R. Yu, and A. Boukerche, "Security and quality of service (QoS) co-design using game theory in cooperative wireless ad hoc networks," in Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications. ACM, 2012, pp. 139--146.
[20]
A. Adigun, B. Amar Bensaber, and I. Biskri, "Proof of concept of a security based on lifetime of communication's pseudonyms for the VANETs," in Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications. ACM, 2012, pp. 111--114.
[21]
M. Stegelmann and D. Kesdogan, "Location privacy for vehicle-to-grid interaction through battery management," in Ninth International Conference on Information Technology: New Generations (ITNG). IEEE, 2012, pp. 373--378.
[22]
Z. Yang, S. Yu, W. Lou, and C. Liu, "P2: Privacy-preserving communication and precise reward architecture for V2G networks in smart grid," IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 697--706, 2011.
[23]
H. Tseng, "A secure and privacy-preserving communication protocol for v2g networks," in IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2012, pp. 2706--2711.
[24]
J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "An identity-based security system for user privacy in vehicular ad hoc networks," Parallel and Distributed Systems, IEEE Transactions on, vol. 21, no. 9, pp. 1227--1239, 2010.
[25]
Z. Sun and J. Ma, "Efficient key management for advanced distribution automation system," in 2nd IEEE International Conference on Network Infrastructure and Digital Content. IEEE, 2010, pp. 794--798.
[26]
J. Martinez, P. Ruiz, and R. Marin, "Impact of the Pre-Authentication Performance in Vehicular Networks," in Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd. IEEE, 2010, pp. 1--5.
[27]
J. Huang, L. Yeh, and H. Chien, "ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks," Vehicular Technology, IEEE Transactions on, vol. 60, no. 1, pp. 248--262, 2011.
[28]
V. Paruchuri and A. Durresi, "PAAVE: Protocol for Anonymous Authentication in Vehicular Networks using Smart Cards," in Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE. IEEE, 2010, pp. 1--5.
[29]
S. Chang, Y. Qi, H. Zhu, J. Zhao, and X. Shen, "Footprint: Detecting Sybil Attacks in Urban Vehicular Networks," Parallel and Distributed Systems, IEEE Transactions on, vol. 23, no. 6, pp. 1103--1114, 2012.
[30]
"AVISPA-Automated Validation of Internet Security Protocols." {Online}. Available: http://www.avispa-project.org
[31]
H. Guo, Y. Wu, F. Bao, H. Chen, and M. Ma, "UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications," IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 707--714, 2011.
[32]
A. Boukerche and X. Li, "An agent-based trust and reputation management scheme for wireless sensor networks," in Global Telecommunications Conference, 2005. GLOBECOM'05. IEEE, vol. 3. IEEE, 2005, pp. 5--pp.
[33]
Y. Ota, H. Taniguchi, T. Nakajima, K. Liyanage, J. Baba, and A. Yokoyama, "Autonomous Distributed V2G (Vehicle-to-Grid) Satisfying Scheduled Charging," IEEE Transactions on Smart Grid, vol. 3, no. 1, pp. 559--564, 2012.

Cited By

View all
  • (2024)Evaluation Framework for Electric Vehicle Security Risk AssessmentIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.330766025:1(33-56)Online publication date: Jan-2024
  • (2021)Cyber-Physical Review of a Battery Electric Vehicle Power Train: Vulnerabilities and Challenges2021 IEEE PES Innovative Smart Grid Technologies Conference - Latin America (ISGT Latin America)10.1109/ISGTLatinAmerica52371.2021.9543036(1-5)Online publication date: 15-Sep-2021
  • (2021)A Mutual Authentication and Key Agreement Protocol for Vehicle to Grid TechnologyInnovations in Electrical and Electronic Engineering10.1007/978-981-16-0749-3_66(863-875)Online publication date: 25-May-2021
  • Show More Cited By

Index Terms

  1. Security and privacy of electric vehicles in the smart grid context: problem and solution

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    DIVANet '13: Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications
    November 2013
    170 pages
    ISBN:9781450323581
    DOI:10.1145/2512921
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 November 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. electric vehicle
    2. privacy
    3. security
    4. smart grid

    Qualifiers

    • Research-article

    Conference

    MSWiM '13
    Sponsor:

    Acceptance Rates

    DIVANet '13 Paper Acceptance Rate 16 of 110 submissions, 15%;
    Overall Acceptance Rate 70 of 308 submissions, 23%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)19
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Evaluation Framework for Electric Vehicle Security Risk AssessmentIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.330766025:1(33-56)Online publication date: Jan-2024
    • (2021)Cyber-Physical Review of a Battery Electric Vehicle Power Train: Vulnerabilities and Challenges2021 IEEE PES Innovative Smart Grid Technologies Conference - Latin America (ISGT Latin America)10.1109/ISGTLatinAmerica52371.2021.9543036(1-5)Online publication date: 15-Sep-2021
    • (2021)A Mutual Authentication and Key Agreement Protocol for Vehicle to Grid TechnologyInnovations in Electrical and Electronic Engineering10.1007/978-981-16-0749-3_66(863-875)Online publication date: 25-May-2021
    • (2018)Scheduling of EV Battery Swapping–Part II: Distributed SolutionsIEEE Transactions on Control of Network Systems10.1109/TCNS.2017.27740125:4(1920-1930)Online publication date: Dec-2018
    • (2017)Secure Plug-in Electric Vehicle (PEV) Charging in a Smart Grid NetworkEnergies10.3390/en1007102410:7(1024)Online publication date: 19-Jul-2017
    • (2017)Utilizing Advanced Metering Infrastructure to Build a Public Key Infrastructure for Electric VehiclesProceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications10.1145/3132340.3132359(91-98)Online publication date: 21-Nov-2017
    • (2017)Secure Optimal Itinerary Planning for Electric Vehicles in the Smart GridIEEE Transactions on Industrial Informatics10.1109/TII.2017.274134713:6(3236-3245)Online publication date: Dec-2017
    • (2017)Secure charging and payment protocol (SCPP) for roaming plug-in electric vehicles2017 4th International Conference on Control, Decision and Information Technologies (CoDIT)10.1109/CoDIT.2017.8102586(0173-0178)Online publication date: Apr-2017
    • (2017)Survey of Security Advances in Smart Grid: A Data Driven ApproachIEEE Communications Surveys & Tutorials10.1109/COMST.2016.261644219:1(397-422)Online publication date: Sep-2018
    • (2017)Balanced anonymity and traceability for outsourcing small‐scale data linear aggregation in the smart gridIET Information Security10.1049/iet-ifs.2016.015011:3(131-138)Online publication date: May-2017
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media