AccessAuth: Capacity-aware security access authentication in federated-IoT-enabled V2G networks

Abstract Vehicle-to-Grid (V2G) systems promoted by the federated Internet of Things (IoT) technology will be ubiquitous in the future; therefore, it is crucial to provide trusted, flexible and efficient operations for V2G services using high-quality measures for security and privacy. These can be achieved by access and authority authentication. This paper presents a lightweight protocol for capacity-based security access authentication named A c c e s s A u t h . Considering the overload probability and system capacity constraints of the V2G network domain, as well as the mobility of electric vehicles, the ideal number of admissible access requests is first calculated adaptively for each V2G network domain to actively achieve capacity-based access admission control. Subsequently, to provide mutual authentication and maintain the data privacy of admitted sessions, by considering whether there is prior knowledge of the trust relationship between the relevant V2G network domains, a high-level authentication model with specific authentication procedures is presented to enforce strict access authentication such that the sessions are conducted only by authorized requesters. Additionally, efficient session revocation with forward security and session recovery with no extra authentication delay are also discussed. Finally, analytical and evaluation results are presented to demonstrate the performance of A c c e s s A u t h .

[1]  Chakib Bekara,et al.  Security Issues and Challenges for the IoT-based Smart Grid , 2014, FNC/MobiSPC.

[2]  Mohammad Ahsan Chishti,et al.  DiffServ-aware Multi Protocol Label Switching based quality of service in Next Generation Networks , 2014, 2014 IEEE International Advance Computing Conference (IACC).

[3]  Martin Maier,et al.  Integrated V2G, G2V, and Renewable Energy Sources Coordination Over a Converged Fiber-Wireless Broadband Access Network , 2013, IEEE Transactions on Smart Grid.

[4]  Bradley R. Schmerl,et al.  Supporting Heterogeneity in Cyber-Physical Systems Architectures , 2014, IEEE Transactions on Automatic Control.

[5]  A. Fachechi,et al.  A new vehicle-to-grid system for battery charging exploiting IoT protocols , 2015, 2015 IEEE International Conference on Industrial Technology (ICIT).

[6]  Bin Liu,et al.  HyCPK: Securing Identity Authentication in Ubiquitous Computing , 2015, 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom).

[7]  Michele Zorzi,et al.  The internet of energy: a web-enabled smart grid system , 2012, IEEE Network.

[8]  Maode Ma,et al.  UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications , 2011, IEEE Transactions on Smart Grid.

[9]  Mohsen Guizani,et al.  Securing vehicle-to-grid communications in the smart grid , 2013, IEEE Wireless Communications.

[10]  Jianhua Ma,et al.  Cybermatics: Cyber-physical-social-thinking hyperspace based science and technology , 2016, Future Gener. Comput. Syst..

[11]  Mianxiong Dong,et al.  Multiobjective Network Opportunistic Access for Group Mobility in Mobile Internet , 2018, IEEE Systems Journal.

[12]  Xuemin Shen,et al.  PMQC: A privacy-preserving multi-quality charging scheme in V2G network , 2014, 2014 IEEE Global Communications Conference.

[13]  Siu-Ming Yiu,et al.  Related Randomness Attacks for Public Key Cryptosystems , 2015, AsiaCCS.

[14]  Josep Domingo-Ferrer,et al.  TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids , 2015, IEEE Transactions on Information Forensics and Security.

[15]  Kaoru Ota,et al.  Event-oriented dynamic security service for demand response in smart grid employing mobile networks , 2015, China Communications.

[16]  Mianxiong Dong,et al.  Towards Fault-Tolerant Fine-Grained Data Access Control for Smart Grid , 2014, Wirel. Pers. Commun..

[17]  Nenghai Yu,et al.  A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.

[18]  Laurence T. Yang,et al.  Role-Dependent Privacy Preservation for Secure V2G Networks in the Smart Grid , 2014, IEEE Transactions on Information Forensics and Security.

[19]  Mohsen Guizani,et al.  Battery Status-aware Authentication Scheme for V2G Networks in Smart Grid , 2013, IEEE Transactions on Smart Grid.

[20]  Laurence T. Yang,et al.  Aggregated-Proofs Based Privacy-Preserving Authentication for V2G Networks in the Smart Grid , 2012, IEEE Transactions on Smart Grid.

[21]  Duncan S. Wong,et al.  Efficient Group Signature with Forward Secure Revocation , 2009, FGIT-SecTech.

[22]  Huei-Ru Tseng,et al.  A secure and privacy-preserving communication protocol for V2G networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[23]  Mohsen Guizani,et al.  Secure service provision in smart grid communications , 2012, IEEE Communications Magazine.

[24]  Mischa Schwartz,et al.  Distributed call admission control in mobile/wireless networks , 1996, IEEE J. Sel. Areas Commun..

[25]  Neetesh Saxena,et al.  Authentication Scheme for Flexible Charging and Discharging of Mobile Vehicles in the V2G Networks , 2016, IEEE Transactions on Information Forensics and Security.

[26]  Yang Li,et al.  SA-PSO based optimizing reader deployment in large-scale RFID Systems , 2015, J. Netw. Comput. Appl..

[27]  Beibei Li,et al.  Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system , 2017, J. Parallel Distributed Comput..

[28]  P. T. Krein,et al.  Review of the Impact of Vehicle-to-Grid Technologies on Distribution Systems and Utility Interfaces , 2013, IEEE Transactions on Power Electronics.

[29]  Qun Jin,et al.  User role identification based on social behavior and networking analysis for information dissemination , 2017, Future Gener. Comput. Syst..

[30]  Mianxiong Dong,et al.  Foud: Integrating Fog and Cloud for 5G-Enabled V2G Networks , 2017, IEEE Network.

[31]  Xuemin Shen,et al.  Lightweight Security and Privacy-Preserving Scheme for V2G Connection , 2014, GLOBECOM 2014.

[32]  Chun Chen,et al.  Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks , 2013, IEEE Transactions on Computers.

[33]  H. T. Mouftah,et al.  Security and Privacy-Preserving Mechanism for Aggregator Based Vehicle-to-Grid Network , 2014, ADHOCNETS.

[34]  Salman Habib,et al.  Impact analysis of vehicle-to-grid technology and charging strategies of electric vehicles on distribution networks – A review , 2015 .

[35]  H. T. Mouftah,et al.  Multi-domain Public key infrastructure for Vehicle-to-Grid network , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[36]  Zhenyu Yang,et al.  $P^{2}$ : Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid , 2011, IEEE Transactions on Smart Grid.