skip to main content
research-article

A new lightweight conditional privacy preserving authentication and key – agreement protocol in social internet of things for vehicle to smart grid networks

Published: 01 August 2022 Publication History

Abstract

Smart grid systems play a vital role in resource management and distributions within a given supply chain. Vehicle-to-grid (V2G) technology is a perfect fit for real-world application as it provides a better and more efficient means for managing electric power. However, ensuring the security and privacy of this technology has become a significant concern, which is due to the difficulty in achieving security goals. In this paper, a lightweight Authentication and Key Agreement protocol named A2P that can ensure low energy consumption and rapid delivery from the source is proposed. Here, a lightweight XOR-based authentication scheme with an unpredictable pseudonym update phase is introduced. The pseudonym update phase is in such a fashion that no relationship amongst two updated pseudonyms can ever be derived even if sensitive information was compromised, thus enhancing privacy. The proposed A2P protocol can reduce the load on the grid and establish an expedited response system for future needs. To provide evidence for the real-time application of the proposal, we have presented a formal and informal analysis of our work. The formal analysis is achieved using Automated Validation Information Security Protocols and Applications (AVISPA), and simulation in the Real – or – Random Oracle (ROR) model, while an informal analysis via proving how our proposals can withstand malicious attacks namely DOS attack, replay attack, party corruption, etc. An extensive performance analysis proves that the proposed A2P system is 22.22% computationally efficient when compared to the related state–of–art methods.

References

[1]
Abdalla M, Fouque P-A, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: Proceedings of the 8th International Conference on Theory and Practice in Public Key Cryptography, PKC‘05, p 65–84
[2]
Abdallah A and Shen XS Lightweight authentication and privacy preserving scheme for V2G connections IEEE Trans Veh Technol 2017 66 3 2615-2629
[4]
Chang CC and Le HD A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks IEEE Trans Wirel Commun 2016 15 1 357-366
[5]
Choi Y, Lee D, Kim J, Jung J, Nam J, and Won D Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography Sensors 2014 14 6 10 081-10 106
[6]
Paliwal S, Chandrakar A, Paliwal S (2021) Virtual smart card for banking and payments. US. Patent No.17058828
[7]
Cui J et al. HCPA-GKA: A hash function-based conditional privacy-preserving authentication and group-key agreement scheme for VANETs Veh Commun 2018 14 15-25
[8]
Dua A, Kumar N, Das AK, Susilo W (2017) Secure message communication protocol among vehicles in smart city. IEEE Trans Veh Technol:1.
[9]
Faheem M, Shah SBH, Butt RA, Raza B, Anwar M, Ashraf MW, Ngadi MA, and Gungor VC Smart grid communication and information technologies in the perspective of industry 4.0: opportunities and challenges Computer Science Review 2018 30 1-30
[10]
Faheem M, Butt RA, Raza B, Ashraf MW, Begum S, Ngadi MA, and Gungor VC Bio-inspired routing protocol for WSN-based smart grid applications in the context of industry 4.0 Trans Emerg Telecommun Technol 2019 30 8
[11]
Faheem M, Butt RA, Raza B, Ashraf MW, Ngadi MA, and Gungor VC Energy efficient and reliable data gathering using internet of software-defined mobile sinks for WSNs-based smart grid applications Comput Stand Inter 2019 66 103341
[12]
Faheem M, Butt RA, Raza B, Ashraf MW, Ngadi MA, and Gungor VC A multi-channel distributed routing scheme for smart grid real-time critical event monitoring applications in the perspective of industry 4.0 Int J Ad Hoc Ubiquitous Comput 2019 32 4 236-256
[13]
Gope P and Hwang T A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks IEEE Trans Ind Electron 2016 63 11 7124-7132
[14]
Hafizul Islam SK, Obaidat MS, Vijayakumar P, Abdulhay E, Fagen L, and Krishna Chaitanya Reddy M A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs Futur Gener Comput Syst 2018 84 216-227
[15]
[16]
Jiang Q, Ma J, Wei F, Tian Y, Shen J, and Yang Y An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks J Netw Comput Appl 2016 76 37-48
[17]
Khalid U, Asim M, Baker T, Hung PCK, Tariq MA, and Rafferty L A decentralized lightweight blockchain-based authentication mechanism for IoT systems Clust Comput 2020 23 2067-2087
[18]
Lee J-S and Chang C-C Secure communications for cluster-based ad hoc networks using node identities J Netw Comput Appl 2017 30 4 1377-1396
[19]
Li X, Niu J, Bhuiyan MZA, Wu F, Karuppiah M, and Kumari S A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things IEEE Trans Ind Inform 2018 14 8 3599-3609
[20]
Liu Y Wireless sensor network applications in smart grid: recent trends and challenges Int J Distrib Sens Netw 2012 8 9 492819
[21]
Muthumeenakshi R, Reshmi TR, and Murugan K Extended 3PAKE authentication scheme for value-added services in VANETs Comput Electr Eng 2017 59 27-38
[22]
Otuoze AO et al (2017) Smart grids security challenges: classification by sources of threats. J Electr Syst Inform Technol.
[23]
Ourahou M, Ayrir W, Hassouni BEL et al (2018) Review on smart grid control and reliability in presence of renewable energies: challenges and prospects. Math Comput Simul.
[24]
Paliwal S Hash-based conditional privacy preserving authentication and key exchange protocol suitable for industrial internet of things IEEE Access 2019 7 136073-136093
[25]
Paliwal S and Aswani Kumar C Abraham A, Muhuri P, Muda A, and Gandhi N A Novel Multi-party Key Exchange Protocol Intelligent Systems Design and Applications. ISDA 2017. Advances in intelligent systems and computing, 736 2018 Cham Springer
[26]
Rottondi C, Fontana S, and Verticale G Enabling privacy in vehicleto-grid interactions for battery recharging Energies 2014 7 5 2780-2798
[27]
Shen J, Liu D, Liu Q, Sun X, Zhang Y (2017) Secure authentication in cloud big data with hierarchical attribute authorization structure. IEEE Trans Big Data.
[28]
Shen J, Zhou T, Wei F, Sun X, and Xiang Y Privacy-preserving and lightweight key agreement protocol for V2G in the social internet of things IEEE Internet Things J 2018 5 4 2526-2536 Aug.
[30]
Stegelmann M, Kesdogan D (2011) Design and evaluation of a privacy preserving architecture for vehicle-to-grid interaction. In: European Public Key Infrastructure Workshop. Springer, p 75–90
[31]
Turkanovi’c M, Brumen B, and Hölbl M A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion Ad Hoc Netw 2014 20 96-112
[32]
Wan Z, Zhu W-T, and Wang G PRAC: efficient privacy protection for vehicle-to-grid Communications in the Smart Grid Comput Secur 2016 6 1 441-448
[33]
Wang H, Qin B, Wu Q, Xu L, and Domingo-Ferrer J TPP: traceable privacy-preserving communication and precise reward for vehicle-to-grid networks in smart grids IEEE Trans Inf Forensics Secur 2015 10 11 2340-2351
[34]
Wang Y, Kazemi M, Nojavan S, and Jermsittiparsert K Robust design of off-grid solar-powered charging station for hydrogen and electric vehicles via robust optimization approach Int J Hydrog Energy 2020 45 38 18995-19006
[35]
Wu F, Xu L, Kumari S, and Li X A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security J Ambient Intell Humaniz Comput 2017 8 1 101-116
[36]
Xie Q, Hong D, Bao M, Dong N, and Wong D Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks Int J Distrib Sens Netw 2014 2014 1-7
[37]
Xu Y, Yi X, Khalil I, Zeng Y, Huang X, Nepal S, Yang X, and Cui H A lightweight authentication scheme for vehicular ad hoc networks based on MSR Vehicular Communications 2019 15 16-27
[38]
Zhang Y, Gjessing S, Liu H, Ning H, Yang LT, and Guizani M Securing vehicle-to-grid communications in the smart grid IEEE Wirel Commun 2013 20 6 66-73
[39]
Zhao Q, Chen S, Liu Z, Baker T, and Zhang Y Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems Inf Process Manag 2020 57 6 102355

Index Terms

  1. A new lightweight conditional privacy preserving authentication and key – agreement protocol in social internet of things for vehicle to smart grid networks
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Multimedia Tools and Applications
        Multimedia Tools and Applications  Volume 81, Issue 19
        Aug 2022
        1452 pages

        Publisher

        Kluwer Academic Publishers

        United States

        Publication History

        Published: 01 August 2022
        Accepted: 10 March 2022
        Revision received: 10 November 2021
        Received: 16 August 2020

        Author Tags

        1. Smart Grid
        2. Vehicle-to-grid (V2G)
        3. Social Internet of Things
        4. Lightweight Authentication
        5. Key Agreement
        6. AVISPA
        7. Real – or – Random oracle model

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 0
          Total Downloads
        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 22 Jan 2025

        Other Metrics

        Citations

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media