Unlock instant, AI-driven research and patent intelligence for your innovation.

Forward-secure certificateless anonymous authentication method in v2g environment

A technology of forward security and anonymous authentication, applied in the field of V2G security, can solve complex certificate management and other problems, and achieve the effect of satisfying forward security

Active Publication Date: 2021-08-24
CHANGAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to protect the privacy of EV, the certificate can only be used for a limited number of times, so the certificate needs to be updated regularly, resulting in the need for complex certificate management in the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Forward-secure certificateless anonymous authentication method in v2g environment
  • Forward-secure certificateless anonymous authentication method in v2g environment
  • Forward-secure certificateless anonymous authentication method in v2g environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention will be further described in detail below in conjunction with specific embodiments, which are explanations of the present invention rather than limitations.

[0050] Such as figure 1 As shown, a forward-secure certificateless anonymous authentication method in a V2G environment includes the following steps:

[0051] 1) System initialization: it includes the stage of TA setting system parameters. The specific process is as follows:

[0052] TA (Trust Authority, trusted organization) generates bilinear parameters (G, G T , g, e, q, p) satisfy q|p-1 (| means divisibility). TA randomly selects system parameters Order g η =g η , G,G T is a multiplicative cyclic group of prime p order, q is its generator, A range is generated for the parameters, called a multiplicative group, e refers to the bilinear pairing operation, and n is the number of limiting parameters chosen, similar to degrees of freedom. η is called the revocation factor, which i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a forward secure certificateless anonymous authentication method in a V2G environment. On the premise that both EV and LAG do not use certificates, EV and LAG can also verify the legitimacy of each other and establish a session key, which realizes Two-way authentication between EV and LAG. In this process, EV only needs to pass the private key information distributed by TA and process the private key information to prove that it is a legitimate registered EV during the communication process. No certificate is used. At the same time, the LAG does not use any certificates, so there is no complicated certificate update and management process in the present invention.

Description

technical field [0001] The invention belongs to the technical field of V2G (vehicle-to-grid vehicle-to-grid) security, and in particular relates to a forward-safe anonymous authentication method without a certificate under the V2G environment. Background technique [0002] Electric vehicles connected to the grid technology (V2G, Vehicle-to-Grid) combines smart grids with electric vehicles. By sharing the power storage capacity of batteries on electric vehicles, electric vehicles can be used as energy storage to adjust grid load fluctuations and provide more efficient electricity supply. In order to ensure that only legitimate EVs participate in the V2G system, the system needs to authenticate the identity of the EV. Since the wireless communication network between the EV and the power grid in V2G is an open network, it is vulnerable to various network attacks such as forgery attacks, impersonation attacks, and association attacks. Status (SoC, State of Charge), current loc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L9/085H04L9/0866H04L9/0869H04L9/3236H04L63/0421H04L63/08H04L63/083
Inventor 王青龙姚谷笛张凯莉段宗涛樊娜朱依水王路阳
Owner CHANGAN UNIV