Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice

Abstract As an important combination of autonomous vehicle networks (AVNs) and smart grid, the vehicle-to-grid (V2G) network can facilitate the adoption of renewable resources. Based on V2G networks, parked electric vehicles (EVs) can charge during off-peak hours and inject excess power to the grid during peak hours for earnings. However, each EV's power injection bids in V2G are sensitive and vehicle-to-vehicle (V2V) communication may be eavesdropped, which has become an obstacle to the wide deployments of AVNs. Aiming to efficiently tackle these security and privacy issues in AVNs, we propose an efficient privacy-preserving communication and power injection (ePPCP) scheme without pairings, which is suitable for vehicle networks and 5G smart grid slice. In ePPCP, each EV calculates two secret keys shared respectively by the utility company and the gateway to blind power injection bids. A novel aggregation technique called hash-then-homomorphic is used to further aggregate the blinded bids of different time slots. Our security analysis indicates that individual bids are hidden and secure V2V communication is ensured. Furthermore, extensive performance comparisons show that ePPCP is efficient in terms of the computation cost and communication overhead.

[1]  Jin Li,et al.  Anonymous attribute-based proxy re-encryption for access control in cloud computing , 2016, Secur. Commun. Networks.

[2]  Dongxi Liu,et al.  An Identity-Based Signcryption on Lattice without Trapdoor , 2019, J. Univers. Comput. Sci..

[3]  Xiaodong Lin,et al.  MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks , 2010, CMC 2010.

[4]  Qi Han,et al.  Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks , 2012, NSS.

[5]  Tong Li,et al.  GMM and CNN Hybrid Method for Short Utterance Speaker Recognition , 2018, IEEE Transactions on Industrial Informatics.

[6]  Yinghui Zhang,et al.  PADA: Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid Slice , 2017, 2017 International Conference on Networking and Network Applications (NaNA).

[7]  Yinghui Zhang,et al.  Efficient and Privacy-Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks , 2017, Mob. Inf. Syst..

[8]  Jian Shen,et al.  An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain , 2018, IEEE Access.

[9]  Zhenyu Yang,et al.  $P^{2}$ : Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid , 2011, IEEE Transactions on Smart Grid.

[10]  Ufuk Topcu,et al.  Optimal decentralized protocol for electric vehicle charging , 2013 .

[11]  H. Li,et al.  Identity-based construction for secure and efficient handoff authentication schemes in wireless networks , 2012, Secur. Commun. Networks.

[12]  Xiaohui Liang,et al.  EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid , 2014, IEEE Transactions on Parallel and Distributed Systems.

[13]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[14]  Ruhul Amin,et al.  Design of authentication protocol for wireless sensor network-based smart vehicular system , 2017, Veh. Commun..

[15]  Jian Shen,et al.  Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..

[16]  Xuemin Shen,et al.  An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid , 2014, IEEE Systems Journal.

[17]  Robert H. Deng,et al.  Blockchain based efficient and robust fair payment for outsourcing services in cloud computing , 2018, Inf. Sci..

[18]  Robert H. Deng,et al.  TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain , 2018, IEEE Access.

[19]  Jin Li,et al.  Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.

[20]  Robert H. Deng,et al.  Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers , 2018, IEEE Transactions on Dependable and Secure Computing.

[21]  Jie Wu,et al.  Sensing and Decision Making in Cyber-Physical Systems: The Case of Structural Event Monitoring , 2016, IEEE Transactions on Industrial Informatics.

[22]  Zhaoquan Cai,et al.  Towards secure and flexible EHR sharing in mobile health cloud under static assumptions , 2017, Cluster Computing.

[23]  Jianfeng Ma,et al.  A remotely keyed file encryption scheme under mobile cloud computing , 2018, J. Netw. Comput. Appl..

[24]  Jianfeng Ma,et al.  Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.

[25]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[26]  Jin Li,et al.  Differentially private Naive Bayes learning over multiple data sources , 2018, Inf. Sci..

[27]  Jin Li,et al.  Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.

[28]  Josep Domingo-Ferrer,et al.  TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids , 2015, IEEE Transactions on Information Forensics and Security.

[29]  H. Vincent Poor,et al.  Ergodic Capacity Analysis of Remote Radio Head Associations in Cloud Radio Access Networks , 2014, IEEE Wireless Communications Letters.

[30]  Anirban Basu,et al.  Privacy-friendly secure bidding for smart grid demand-response , 2017, Inf. Sci..

[31]  Jian Shen,et al.  Secure data uploading scheme for a smart home system , 2018, Inf. Sci..

[32]  Brij Bhooshan Gupta,et al.  A Practical Public Key Encryption Scheme Based on Learning Parity With Noise , 2018, IEEE Access.

[33]  Jie Wu,et al.  Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks , 2017, IEEE Transactions on Industrial Informatics.

[34]  Hao Wang,et al.  New directly revocable attribute-based encryption scheme and its application in cloud storage environment , 2016, Cluster Computing.

[35]  Jin Li,et al.  Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks , 2014, Comput. Networks.

[36]  Dongqing Xie,et al.  Cognitive Multiuser Energy Harvesting Decode-and-Forward Relaying System With Direct Links , 2018, IEEE Access.

[37]  Thanasis Korakis,et al.  Network Store: Exploring Slicing in Future 5G Networks , 2015, MobiArch.

[38]  Tong Li,et al.  A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT , 2018, Secur. Commun. Networks.

[39]  Xiao Tan,et al.  Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts , 2014, Theor. Comput. Sci..

[40]  Jin Li,et al.  Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..

[41]  Tong Li,et al.  Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection , 2018, IEEE Access.

[42]  Chunming Tang,et al.  Privacy-preserving face recognition with outsourced computation , 2016, Soft Comput..

[43]  Robert H. Deng,et al.  Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.

[44]  Sekyung Han,et al.  Development of an Optimal Vehicle-to-Grid Aggregator for Frequency Regulation , 2010, IEEE Transactions on Smart Grid.

[45]  George K. Karagiannidis,et al.  Secrecy Cooperative Networks With Outdated Relay Selection Over Correlated Fading Channels , 2017, IEEE Transactions on Vehicular Technology.

[46]  Souhwan Jung,et al.  A handover authentication using credentials based on chameleon hashing , 2010, IEEE Communications Letters.

[47]  George K. Karagiannidis,et al.  Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.

[48]  Willett Kempton,et al.  Vehicle-to-grid power implementation: From stabilizing the grid to supporting large-scale renewable energy , 2005 .

[49]  Kemal Akkaya,et al.  Privacy-Preserving Power Injection Over a Hybrid AMI/LTE Smart Grid Network , 2017, IEEE Internet of Things Journal.

[50]  Ximeng Liu,et al.  An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys , 2016, IEEE Transactions on Information Forensics and Security.

[51]  Ismail Güvenç,et al.  Secure Data Obfuscation Scheme to Enable Privacy-Preserving State Estimation in Smart Grid AMI Networks , 2016, IEEE Internet of Things Journal.

[52]  Eiji Okamoto,et al.  Key distribution system based on identification information , 1989, IEEE J. Sel. Areas Commun..

[53]  Xiaohui Liang,et al.  EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.