A Secure Charging System for Electric Vehicles Based on Blockchain

Smart grids incorporating internet-of-things are emerging solutions to provide a reliable, sustainable and efficient electricity supply, and electric vehicle drivers can access efficient charging services in the smart grid. However, traditional electric vehicle charging systems are vulnerable to distributed denial of service and privileged insider attacks when the central charging server is attacked. The blockchain-based charging systems have been proposed to resolve these problems. In 2018, Huang et al. proposed the electric vehicle charging system using lightning network and smart contract. However, their system has an inefficient charging mechanism and does not guarantee security of key. We propose a secure charging system for electric vehicles based on blockchain to resolve these security flaws. Our charging system ensures the security of key, secure mutual authentication, anonymity, and perfect forward secrecy, and also provides efficient charging. We demonstrate that our proposed system provides secure mutual authentication using Burrows–Abadi–Needham logic and prevents replay and man-in-the-middle attacks using automated validation of internet security protocols and applications simulation tool. Furthermore, we compare computation and communication costs with previous schemes. Therefore, the proposed charging system efficiently applies to practical charging systems for electric vehicles.

[1]  Andreas Unterweger,et al.  Privacy-preserving blockchain-based electric vehicle charging with dynamic tariff decisions , 2018, Computer Science - Research and Development.

[2]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[3]  Ashok Kumar Das,et al.  2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment , 2018, IEEE Access.

[4]  Lai Tu,et al.  Real-Time Charging Station Recommendation System for Electric-Vehicle Taxis , 2016, IEEE Transactions on Intelligent Transportation Systems.

[5]  Marko Hölbl,et al.  A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.

[6]  David von Oheimb The High-Level Protocol Specification Language HLPSL developed in the EU project AVISPA , 2005 .

[7]  Sebastian Mödersheim,et al.  OFMC: A symbolic model checker for security protocols , 2005, International Journal of Information Security.

[8]  Ruhul Amin,et al.  Design of authentication protocol for wireless sensor network-based smart vehicular system , 2017, Veh. Commun..

[9]  Ruhul Amin,et al.  A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks , 2016, Ad Hoc Networks.

[10]  Wen-Long Chin,et al.  Energy Big Data Security Threats in IoT-Based Smart Grid Communications , 2017, IEEE Communications Magazine.

[11]  Robert H. Sloan,et al.  Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.

[12]  Jianhua Li,et al.  A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle , 2017, IEEE Internet of Things Journal.

[13]  Jian Shen,et al.  Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things , 2018, IEEE Internet of Things Journal.

[14]  Joonho Kwon,et al.  Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks , 2017, Sensors.

[15]  Xiong Li,et al.  An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks , 2016, Secur. Commun. Networks.

[16]  Bitcoin Proof of Stake: A Peer-to-Peer Electronic Cash System , 2020 .

[17]  Dongwoo Kang,et al.  An improved anonymous authentication scheme for roaming in ubiquitous networks , 2018, PloS one.

[18]  Ming-Syan Chen,et al.  Operating electric taxi fleets: A new dispatching strategy with charging plans , 2012, 2012 IEEE International Electric Vehicle Conference.

[19]  YoungHo Park,et al.  Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications , 2018, Sensors.

[20]  Jia-Lun Tsai,et al.  An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings , 2016, IEEE Transactions on Intelligent Transportation Systems.

[21]  Xiaohong Huang,et al.  LNSC: A Security Model for Electric Vehicle and Charging Pile Management Based on Blockchain Ecosystem , 2018, IEEE Access.

[22]  Ufuk Topcu,et al.  Optimal decentralized protocol for electric vehicle charging , 2011, IEEE Transactions on Power Systems.

[23]  Cristina Alcaraz,et al.  Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..

[24]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[25]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[26]  James H. Burrows,et al.  Secure Hash Standard , 1995 .

[27]  Xiaojiang Du,et al.  Content Protection in Named Data Networking: Challenges and Potential Solutions , 2018, IEEE Communications Magazine.

[28]  Lang Tong,et al.  Dynamic Scheduling for Charging Electric Vehicles: A Priority Rule , 2016, IEEE Transactions on Automatic Control.

[29]  Bidi Ying,et al.  Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography , 2019, J. Netw. Comput. Appl..

[30]  Wanrong Tang,et al.  A Model Predictive Control Approach for Low-Complexity Electric Vehicle Charging Scheduling: Optimality and Scalability , 2015, IEEE Transactions on Power Systems.

[31]  Yanbing Liu,et al.  Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm , 2017, IEEE Transactions on Intelligent Transportation Systems.

[32]  Kim-Kwang Raymond Choo,et al.  Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices , 2017, IEEE Access.

[33]  Zhetao Li,et al.  Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[34]  Mathieu Turuani,et al.  The CL-Atse Protocol Analyser , 2006, RTA.

[35]  Shui Yu,et al.  An Efficient Privacy-Preserving Mutual Authentication Scheme for Secure V2V Communication in Vehicular Ad Hoc Network , 2019, IEEE Access.

[36]  Antoine Wehenkel,et al.  An App-based Algorithmic Approach for Harvesting Local and Renewable Energy using Electric Vehicles , 2017, ICAART.

[37]  Ashok Kumar Das,et al.  Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks , 2017, IEEE Access.

[38]  Yi Jiang,et al.  An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks , 2017, Sensors.

[39]  Mohammad S. Obaidat,et al.  A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs , 2017, Future Gener. Comput. Syst..

[40]  Lixiang Li,et al.  An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks , 2016, Sensors.

[41]  Peter McBurney,et al.  Validation and Verification of Smart Contracts: A Research Agenda , 2017, Computer.

[42]  Vanga Odelu,et al.  Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks , 2017, IEEE Access.

[43]  Hye-Jin Kim,et al.  An Efficient Scheduling Scheme on Charging Stations for Smart Transportation , 2010, SUComS.

[44]  Xuemin Shen,et al.  Secure machine-type communications in LTE networks , 2016, Wirel. Commun. Mob. Comput..

[45]  Maode Ma,et al.  A proxy signature-based handover authentication scheme for LTE wireless networks , 2017, J. Netw. Comput. Appl..