Unlock instant, AI-driven research and patent intelligence for your innovation.

Certificateless anonymous authentication method for forward security in V2G environment

A forward security and anonymous authentication technology, applied in the field of V2G security, can solve complex certificate management and other issues

Active Publication Date: 2020-02-11
CHANGAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to protect the privacy of EV, the certificate can only be used for a limited number of times, so the certificate needs to be updated regularly, resulting in the need for complex certificate management in the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificateless anonymous authentication method for forward security in V2G environment
  • Certificateless anonymous authentication method for forward security in V2G environment
  • Certificateless anonymous authentication method for forward security in V2G environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention will be further described in detail below in conjunction with specific embodiments, which are for explanation rather than limitation of the present invention.

[0050] Such as figure 1 As shown, a forward-secure certificateless anonymous authentication method in a V2G environment includes the following steps:

[0051] 1) System initialization: including the TA setting system parameter stage. The specific process is as follows:

[0052] TA (Trust Authority) generates bilinear parameters (G, G T ,g,e,q,p) satisfies q|p-1 (| means division). TA randomly selects system parameters Let g η =g η , G,G T Is the multiplicative cyclic group of prime number p, q is its generator, It is the parameter generation range, called the multiplicative group, e refers to the bilinear pair operation, and n is the number of limited parameters selected, similar to the degree of freedom. Call η as the revocation factor, which is used to realize forward safe revocation. It...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a certificateless anonymous authentication method for forward security in a V2G environment. On the premise that both the EV and the LAG do not use certificates, the EV and theLAG can also verify the legality of each other, a a session key is established, and bidirectional authentication between the EV and the LAG is realized; in the process, the EV can prove that the EV isa legal registered EV in the communication process only through private key information distributed by the TA and processing of the private key information, no certificate is used, and meanwhile, theLAG does not use any certificate, so that a complex certificate updating and managing process does not exist.

Description

Technical field [0001] The invention belongs to the technical field of V2G (vehicle-to-grid vehicle-to-grid) security technology, and specifically relates to a certificateless anonymous authentication method for forward security in a V2G environment. Background technique [0002] Electric vehicle access grid technology (V2G, Vehicle-to-Grid) combines smart grid with electric vehicles. By sharing the power storage capacity of batteries on electric vehicles, electric vehicle clusters can be used as energy storage to adjust grid load fluctuations and provide more effective electricity supply. In order to ensure that only legitimate EVs participate in the V2G system, the system needs to authenticate the identity of the EV. Since the wireless communication network between the EV and the power grid in V2G is an open network, it is vulnerable to various network attacks such as forgery attacks, counterfeiting attacks, and associated attacks, which makes EV users’ private information (su...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L9/085H04L9/0866H04L9/0869H04L9/3236H04L63/0421H04L63/08H04L63/083
Inventor 王青龙姚谷笛张凯莉段宗涛樊娜朱依水王路阳
Owner CHANGAN UNIV