Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

User-empowered Privacy-preserving Authentication Protocol for Electric Vehicle Charging Based on Decentralized Identity and Verifiable Credential

Published: 10 August 2022 Publication History

Abstract

The use of Electric Vehicles (EVs) has been gaining traction in recent years due to various reasons. While charging their EVs, users expose their identity and personal details, and an adversary being able to identify and track where users charge their EVs is a potential privacy threat. In this article, we propose a user-empowered privacy-preserving authentication protocol for EV charging based on Decentralized Identifier (DID) and Verifiable Credential (VC) to provide Zero-Knowledge Proof (ZKP)-security. The proposed method gives users full control over their identities and allows them to remain anonymous while charging from any station. Giving control over their identities empowers users. At the same time, by making use of the concept of VC, other parties can verify that a user is legitimate and authenticate the user before providing charging services. Hence, the proposed protocol makes the charging service available in a secure way, while empowering users and preserving their privacy.

References

[1]
Joseph Antoun, Mohammad Ekramul Kabir, Bassam Moussa, Ribal Atallah, and Chadi Assi. 2020. A detailed security assessment of the EV charging ecosystem. IEEE Network 34, 3 (2020), 200–207. DOI:DOI:
[2]
Michael Burrows, Martin Abadi, and Roger Michael Needham. 1989. A logic of authentication. Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences 426, 1871 (1989), 233–271.
[3]
C. C. Chan and K. T. Chau. 1997. An overview of power electronics in electric vehicles. IEEE Transactions on Industrial Electronics 44, 1 (1997), 3–13. DOI:DOI:
[4]
Melissa Chase, Esha Ghosh, Srinath Setty, and Daniel Buchner. 2020. Zero-knowledge credentials with deferred revocation checks. White Paper. Microsoft Corporation. https://github.com/decentralized-identity/snark-credentials/blob/master/whitepaper.pdf/.
[5]
Marc Eisenstadt, Manoharan Ramachandran, Niaz Chowdhury, Allan Third, and John Domingue. 2020. COVID-19 antibody test/vaccination certification: There’s an app for that. IEEE Open Journal of Engineering in Medicine and Biology 1 (2020), 148–155. DOI:DOI:
[6]
Sahil Garg, Kuljeet Kaur, Georges Kaddoum, Joel J. P. C. Rodrigues, and Mohsen Guizani. 2020. Secure and lightweight authentication scheme for smart metering infrastructure in smart grid. IEEE Transactions on Industrial Informatics 16, 5 (2020), 3548–3557. DOI:DOI:
[7]
Prosanta Gope and Biplab Sikdar. 2019. An efficient privacy-preserving authentication scheme for energy internet-based vehicle-to-grid communication. IEEE Transactions on Smart Grid 10, 6 (2019), 6607–6618. DOI:DOI:
[8]
Anish Jindal, Neeraj Kumar, and Mukesh Singh. 2020. Internet of energy-based demand response management scheme for smart homes and PHEVs using SVM. Future Generation Computer Systems 108 (2020), 1058–1068. DOI:DOI:
[9]
Vishnu Teja Kilari, Satyajayant Misra, and Guoliang Xue. 2016. Revocable anonymity based authentication for vehicle to grid (V2G) communications. In Proceedings of the 2016 IEEE International Conference on Smart Grid Communications. IEEE, 351–356. DOI:DOI:
[10]
Yki Kortesniemi, Dmitrij Lagutin, Tommi Elo, and Nikos Fotiou. 2019. Improving the privacy of IoT with decentralised identifiers (DIDs). Journal of Computer Networks and Communications (2019), 10 pp.DOI:DOI:
[11]
John Krumm. 2007. Inference attacks on location tracks. In Proceedings of the International Conference on Pervasive Computing. Microsoft Research, 127–143. DOI:DOI:
[12]
Hongzhi Li, Dezhi Han, and Mingdong Tang. 2021. A privacy-preserving charging scheme for electric vehicles using blockchain and fog computing. IEEE Systems Journal 15, 3 (2021), 3189–3200. DOI:DOI:
[13]
LTA. 2022. Electric Vehicles. Land Transport Authority, Singapore. Retrieved on Jan 2022 https://www.lta.gov.sg/content/ltagov/en/industry_innovations/technologies/electric_vehicles.html.
[14]
Microsoft. 2020. Own Your Digital Identity. Microsoft Corporation. Retrieved Dec 2021 from https://www.microsoft.com/en-sg/security/business/identity-access-management/decentralized-identity-blockchain.
[15]
Amin Mohammadali, Mohammad Sayad Haghighi, Mohammad Hesam Tadayon, and Alireza Mohammadi-Nodooshan. 2018. A novel identity-based key establishment method for advanced metering infrastructure in smart grid. IEEE Transactions on Smart Grid 9, 4 (2018), 2834–2842. DOI:DOI:
[16]
Eduardo Morais, Tommy Koens, Cees Van Wijk, and Aleksei Koren. 2019. A survey on zero knowledge range proofs and applications. SN Applied Sciences 1, 8 (2019), 1–17. DOI:DOI:
[17]
Mustafa A. Mustafa, Ning Zhang, Georgios Kalogridis, and Zhong Fan. 2014. Roaming electric vehicle charging and billing: An anonymous multi-user protocol. In Proceedings of the 2014 IEEE International Conference on Smart Grid Communications. IEEE, 939–945. DOI:DOI:
[18]
Hasen Nicanfar, Seyedali Hosseininezhad, Peyman TalebiFard, and Victor C. M. Leung. 2013. Robust privacy-preserving authentication scheme for communication between electric vehicle as power energy storage and power stations. In Proceedings of the 2013 IEEE INFOCOM. IEEE, 3429–3434. DOI:DOI:
[19]
Vanga Odelu, Ashok Kumar Das, Mohammad Wazid, and Mauro Conti. 2018. Provably secure authenticated key agreement scheme for smart grid. IEEE Transactions on Smart Grid 9, 3 (2018), 1900–1910. DOI:DOI:
[20]
Eman Mohammed Radi, Noureddine Lasla, Spiridon Bakiras, and Mohamed Mahmoud. 2019. Privacy-preserving electric vehicle charging for peer-to-peer energy trading ecosystems. In Proceedings of the ICC 2019-2019 IEEE International Conference on Communications. IEEE, 1–6. DOI:DOI:
[21]
Neetesh Saxena, Bong Jun Choi, and Shinyoung Cho. 2015. Lightweight privacy-preserving authentication scheme for V2G networks in the smart grid. In Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, 604–611. DOI:DOI:
[22]
Bill Schilit, Jason Hong, and Marco Gruteser. 2003. Wireless location privacy protection. Computer 36, 12 (2003), 135–137. DOI:DOI:
[23]
Soram Ranbir Singh, Ajoy Kumar Khan, and Soram Rakesh Singh. 2016. Performance evaluation of RSA and Elliptic Curve Cryptography. In Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics. IEEE, 302–306. DOI:DOI:
[24]
Yixin Su, Gang Shen, and Mingwu Zhang. 2020. A novel privacy-preserving authentication scheme for V2G networks. IEEE Systems Journal 14, 2 (2020), 1963–1971. DOI:DOI:
[25]
W3C. 2021. Decentralized Identifiers (DIDs). The World Wide Web Consortium. Retrieved Dec 2021 from https://www.w3.org/TR/did-core/.
[26]
W3C. 2021. Verifiable Credentials Data Model v 1.1. The World Wide Web Consortium. Retrieved Dec 2021 from https://www.w3.org/TR/vc-data-model/.
[27]
Dapeng Wu and Chi Zhou. 2011. Fault-tolerant and scalable key management for smart grid. IEEE Transactions on Smart Grid 2, 2 (2011), 375–381. DOI:DOI:
[28]
Jinyue Xia and Yongge Wang. 2012. Secure key distribution for the smart grid. IEEE Transactions on Smart Grid 3, 3 (2012), 1437–1443. DOI:DOI:

Cited By

View all
  • (2025)Electric vehicle charging network security: A surveyJournal of Systems Architecture10.1016/j.sysarc.2025.103337(103337)Online publication date: Jan-2025
  • (2025)TAVA: Traceable anonymity-self-controllable V2X Authentication over dynamic multiple charging-service providersAd Hoc Networks10.1016/j.adhoc.2024.103666166(103666)Online publication date: Jan-2025
  • (2025)Decentralized Identity for IoT SystemsEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1801(593-598)Online publication date: 8-Jan-2025
  • Show More Cited By

Index Terms

  1. User-empowered Privacy-preserving Authentication Protocol for Electric Vehicle Charging Based on Decentralized Identity and Verifiable Credential

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Transactions on Management Information Systems
        ACM Transactions on Management Information Systems  Volume 13, Issue 4
        December 2022
        255 pages
        ISSN:2158-656X
        EISSN:2158-6578
        DOI:10.1145/3555789
        Issue’s Table of Contents

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 10 August 2022
        Online AM: 02 May 2022
        Accepted: 01 April 2022
        Revised: 01 April 2022
        Received: 01 December 2021
        Published in TMIS Volume 13, Issue 4

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Electric vehicle charging
        2. privacy
        3. anonymity
        4. user-empowered authentication
        5. DID
        6. VC
        7. blockchain

        Qualifiers

        • Research-article
        • Refereed

        Funding Sources

        • Ministry of Education, Singapore
        • Academic Research Fund

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)240
        • Downloads (Last 6 weeks)15
        Reflects downloads up to 25 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2025)Electric vehicle charging network security: A surveyJournal of Systems Architecture10.1016/j.sysarc.2025.103337(103337)Online publication date: Jan-2025
        • (2025)TAVA: Traceable anonymity-self-controllable V2X Authentication over dynamic multiple charging-service providersAd Hoc Networks10.1016/j.adhoc.2024.103666166(103666)Online publication date: Jan-2025
        • (2025)Decentralized Identity for IoT SystemsEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1801(593-598)Online publication date: 8-Jan-2025
        • (2024)A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETsFuture Internet10.3390/fi1609032816:9(328)Online publication date: 9-Sep-2024
        • (2024)Private Metering in EV Charging Infrastructure: An OCPP ExtensionIEEE Transactions on Vehicular Technology10.1109/TVT.2024.340345573:10(15456-15466)Online publication date: Oct-2024
        • (2024)A Physician’s Privacy-Preserving Authentication and Key Agreement Protocol Based on Decentralized Identity for Medical Data Sharing in IoMTIEEE Internet of Things Journal10.1109/JIOT.2024.340656111:17(29174-29189)Online publication date: 1-Sep-2024
        • (2024)Distributed Authentication using Self Sovereign Identities2024 1st International Conference on Emerging Technologies for Dependable Internet of Things (ICETI)10.1109/ICETI63946.2024.10777147(1-8)Online publication date: 25-Nov-2024
        • (2024)Privacy-preserving data fusion for traffic state estimation: A vertical federated learning approachTransportation Research Part C: Emerging Technologies10.1016/j.trc.2024.104743168(104743)Online publication date: Nov-2024
        • (2024)User-empowered secure privacy-preserving authentication scheme for Digital TwinComputers and Security10.1016/j.cose.2024.103793140:COnline publication date: 1-May-2024
        • (2023)A Privacy-Preserving Authenticated Key Exchange Protocol for V2G Communications Using SSIIEEE Transactions on Vehicular Technology10.1109/TVT.2023.3281371(1-16)Online publication date: 2023
        • Show More Cited By

        View Options

        Login options

        Full Access

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        Full Text

        HTML Format

        View this article in HTML Format.

        HTML Format

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media