Next Article in Journal
A Machine Learning Approach to Solve the Network Overload Problem Caused by IoT Devices Spatially Tracked Indoors
Next Article in Special Issue
Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them
Previous Article in Journal
Optimization of Pico-eNB Tx Power and the Effects of Picocell Range Expansion in Multiband HetNet
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV

by
Abdullah M. Almuhaideb
1,* and
Sammar S. Algothami
2
1
SAUDI ARAMCO Cybersecurity Chair, Department of Networks and Communications, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia
2
Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia
*
Author to whom correspondence should be addressed.
J. Sens. Actuator Netw. 2022, 11(2), 28; https://0-doi-org.brum.beds.ac.uk/10.3390/jsan11020028
Submission received: 7 April 2022 / Revised: 28 May 2022 / Accepted: 31 May 2022 / Published: 9 June 2022
(This article belongs to the Special Issue Feature Papers in Network Security and Privacy)

Abstract

:
The use of Electric Vehicles (EVs) is almost inevitable in the near future for the sake of the environment and our plant’s long-term sustainability. The availability of an Electric-Vehicle-Charging Station (EVCS) is the key challenge that owners are worried about. Therefore, we suggest benefiting from individual EVs that have excess energy and are willing to share it with other EVs in order to maximize the availability of EVCSs without the need to rely on the existing charging infrastructure. The Internet of Electric Vehicles (IoEV) is gradually gaining traction, allowing for a more efficient and intelligent transportation system by leveraging these capabilities between EVs. However, the IoEV is considered a trustless environment, with untrustworthy trading partners such as data sellers, buyers, and brokers. Data exchanged between the EV and the Energy AGgregator (EAG) or EV/EV can be used to analyze users’ behavior and compromise their privacy. Thus, a Vehicle-to-Vehicle (V2V)-charging system that is both secure and private must be established. Several V2V-charging systems with security and privacy features have been proposed. However, even if the transmitted communications are entirely anonymous, anonymity alone will not prevent the tracking adversary from reconstructing the target vehicle’s route. These systems frequently fail to find a balance between privacy concerns (e.g., trade traceability to achieve anonymity, and so on) and security measures. In this paper, we propose an efficient privacy-preserving and secure authentication based on Elliptic Curve Qu–Vanstone (ECQV) for a V2V-charging system that fulfils the essential requirements and re-authentication protocol in order to reduce the overhead of future authentication processes. The proposed scheme utilizes the ECQV implicit-certificate mechanism to create credentials and authenticate EVs. The proposed protocols provide efficient security and privacy to EVs, as well as an 88% reduction in computational time through re-authentication, as compared to earlier efforts.

1. Introduction

Rapid changes in the transportation industry have occurred in recent years, with a conscious effort to combat climate change and cut Greenhouse-Gas emissions (GHG). This industry is responsible for almost 30% of the world’s GHG emissions, which in return affects air quality. The electrification of the transportation system is gaining popularity because it has several advantages over vehicles powered by an internal combustion engine (ICE), including the use of sustainable energy, reduction in fossil-fuel dependency and consumption, and being GHG-emission free. Hence, the Electric Vehicle (EV) is a suitable solution for dealing with the energy crisis and climatic change [1].
Several countries such as Saudi Arabia have announced that at least 30% of cars in the capital city will be electric by 2030. China seeks to have 25% of new cars in the country be electric by 2025. On the other hand, the United Kingdom plans to stop selling new fossil-fuel cars by 2030 [2]. In 2020, over 10 million electric cars were on the roads throughout the world with 1.3 million publicly available chargers, with 30% of them being fast chargers. As one can see, the rate of growth of the Electric-Vehicle-Charging Station (EVCS) is noticeably slower than that of EVs. Therefore, the availability of EVCSs is the most significant hurdle, which is known as “range anxiety”, that consumers are concerned about (particularly in the United States and the United Kingdom) according to the climate group’s EV100 members [3]. They are anxious that the EV’s energy will be consumed before it reaches its destination. This effect is accentuated on highways and in remote regions, which currently have inadequate charging infrastructure and where drivers travel longer distances than in cities [4]. As a result, EV drivers may find themselves abandoned on the street with little to no charge as well as no nearby charging stations, with no other option but to wait for a tow truck. As the demand for electric vehicles evolves, EV-charging stations must be strategically positioned and properly utilized [5].
In fact, deploying charging stations in every location is both impractical and expensive. As a result, auxiliary solutions to alleviate such a worry must be found, and the bidirectional energy-transfer capabilities of EVs, particularly Vehicle-to-Vehicle (V2V) energy transfer, should be seriously studied. Whenever it is hard or impossible for an EV to access an EVCS, V2V charging enables a source EV to travel in order to satisfy another EV-charging request without the need to rely on existing charging infrastructure [6]. AAA (a US corporation) has made this idea a reality by introducing a fleet of EV-charging trucks in different cities such as Portland, Seattle, San Francisco, Los Angeles, Denver, Phoenix, and Orlando. All of their trucks have generators and level-two chargers, and only a few have CHAdeMO fast chargers [7].
With the rapid evolution and advancement in vehicular telecommunications and technologies, EVs can now create numerous forms of data. Modern EVs have been enhanced with communication and data-sharing/trading capabilities with their surroundings (V2V and Vehicle-to-Infrastructure (V2I)). As a result of utilizing these capabilities between EVs, the Internet of Electric Vehicles (IoEV) is progressively emerging, enabling a more efficient and intelligent transportation system. However, the IoEV is seen as a trustless ecosystem, in which trading partners such as data sellers, buyers, and brokers are not trustworthy. Payments and data sharing may be a subject of dispute between the trading parties [8].
To achieve a V2V energy transfer, the suppliers and receivers must first be matched. The best-fit EV supplier (to meet the charging needs of the demander EV) must be identified once the demander EV has made a request from within their neighborhood. This may be accomplished through centralized control and EV automation in order to interact and maintain their engagement through a local Energy AGgregator (EAG). During the search process, an EV seeking charging can request energy trading (amount and price) from its local EAG, which in turn chooses a supplier EV from a list of options and then matches it to the demander EV. EVs can pay for the service via the web app (perhaps with the help of third-party services such as banks or electricity companies). However, after the peers’ validation and matching by the EAG, the demander/supplier EV peers must physically meet in order to carry out the actual V2V energy transfer and link their batteries via a specifically designed DC–DC converter or through specified V2V-charging piles. Therefore, these EVs must mutually authenticate each other to ensure that no unauthorized demander/supplier EVs arrive and that the agreed-upon amount of energy can be transferred even though one of the EV’s owners is not onsite [9].
While the EV is attached to the charging supplier (EVCS or other EV), it exchanges information with the EAG in a continuous manner. The EV sends sensitive information to the potentially untrustworthy charging supplier (EVCS or other EV), including the EV’s ID, battery status, energy consumed, or geographic location [10]. Adversaries can utilize the submitted data to deduce other sensitive data, such as the EV’s identification information, identities of its occupants, and travel patterns [11]. Because the EV and the EAG connect over the Internet and V2V communication occurs over Dedicated Short-Range Communications (DSRC), the information they share is susceptible to a variety of attacks. These attacks can lead to EVCS malfunctions, money theft, payment-transaction mistakes, and battery-charging inconsistencies, among many other issues. Eavesdropping attacks, Denial-of-Service (DoS) attacks, replay attacks, impersonation attacks, and Man-In-The-Middle (MTIM) attacks are some of the significant attacks that could occur in EV-charging systems [10].

1.1. Problem Statement

With the massive increase in EV adoption, one of its key issues has indeed been EV charging. Several methods of wireless charging for electric vehicles have been considered (e.g., charging while parked [8] and wireless dynamic charging on the move [9]). In addition to the EV’s transportation service, EVs serve as distributed mobile energy storage and can function as both energy consumer and supplier. Advancement in energy-supply systems, combined with the bidirectional communication of EVs, helps to relieve the issue of the energy demand–supply gap, facilitating the reliable and sustainable fulfilment of ongoing energy needs [7]. The privacy of sensitive data is linked to or includes information about a particular individual. However, fine-grained personal-data collection is frequently required for a specific-use case or to comply with legal obligations. Furthermore, a single data item might not be enough to compromise privacy. However, combining data from multiple actors may enable someone to gain access to extra information and, as a result, compromise an individual’s privacy. Unterweger in [12] identified five privacy breaches (e.g., vehicle identification and personal-data sharing). If another entity (other than the client) can utilize the acquired data for an unintended purpose, then a client’s privacy is breached.
The legal authority issues the EV credential, which allows vehicles to be identified as well as authenticated. However, because this credential contains the EV’s true identification, it provides a method of vehicle tracking. Therefore, the privacy of EVs is threatened during energy-trading processes, as the EV’s sensitive and confidential information can be exposed while interacting with an EVCSs or other EVs. Therefore, a solution that balances secure authentication procedures and anonymous communications (privacy) is essential. In previous blockchain approaches, the transactions of energy trading were publicly stored and verified by all network nodes. Moreover, transaction data could be utilized to initiate privacy-related linkage attacks simply by tying it to other publicly available datasets, and there are a variety of data-mining methods and algorithms that could use raw data to conduct attacks.
In Peer-to-Peer (P2P) energy trading between EVs, privacy is still a concern, despite the great benefits of the blockchain in a trustless environment and the transparency of trading. As a result, designing a safe privacy-preserving mechanism for blockchain-based P2P energy trading among EVs is a major challenge. The first concern is to guarantee privacy while maintaining the anonymity of the EV’s confidential information. The second challenge is to use an acceptable approach to conceal the data and energy-trading patterns of EVs [8]. Similarly, patterns that reveal behavioral information are rarely discussed in publications, and trustworthy third parties are frequently exploited to hide flaws in privacy-related implementation [12].
To address these concerns, an Elliptic Curve Qu–Vanstone (ECQV)-based EV system might be developed, providing EV users with confidentiality and simple authentication. The ECQV implicit certificate is required for mutual authentication, key establishment, and key exchange between IoT devices. Several V2V-charging systems with security and privacy features have been proposed. However, even if the transmitted communications are entirely anonymous, anonymity alone will not prevent the tracking adversary from reconstructing the target vehicle’s route. These systems frequently fail to find a balance between privacy concerns (e.g., trade traceability to achieve anonymity, and so on) and security measures.

1.2. Motivation and Contribution

With the goal of meeting the previously specified security and privacy standards, this paper contributes the following:
  • Proposes an authentication scheme for an electric-vehicle-to-electric-vehicle-charging system, which provides more secure mutual authentication and efficient privacy preservation based on ECQV.
  • Conducts an informal security analysis to indicate the protocol’s security against numerous attacks.
  • Computational costs are compared with other related work, demonstrating that our proposed protocol has a better performance.

1.3. Paper Organization

The remainder of the paper is structured as follows: Preliminaries are covered in Section 2. In Section 3, we present a literature review related to the proposed protocol. Section 4 introduces the proposed system. Section 5 discusses the informal security analysis. We compare the security and functional features, as well as the computational cost, to other related schemes in Section 6. Lastly, in Section 7 is the conclusion.

2. Preliminaries

In this section, we discuss the authentication-solution requirements of EV charging, Elliptic-Curve (EC)-based operations, and present the concepts of the Elliptic Curve Qu–Vanstone (ECQV) implicit certificate.

2.1. Solution Requirements

The sustainability and adoption of electric-vehicle-charging systems (including V2V energy trading) require privacy-preserving authentication. Before a V2V-charging system may be deployed, some critical security standards must be addressed. Nevertheless, the current approaches have limitations that pose various problems concerning V2V-charging systems. Thus, the proposed solution should satisfy the parameters listed below:
  • Mutual authentication: The system must enable participants to authenticate one another and ensure that communication is built on mutual trust. The demander EV authenticates the supplier EV to confirm its identity and its registration with the electricity OPerator (OP). The supplier EV will simultaneously verify the demander EV’s registration with the OP, using certificates issued by the OP. As a result, the prospect of a masquerade attack should be eliminated [13,14].
  • Anonymity: It is the ability to stay anonymous among a group of subjects. The real identity of the EV should not be disclosed to other EVs or the EAG during the V2V-charging process [15]. The ability to keep a subject’s activities untraceable is known as untraceability. Eavesdroppers are unable to deduce or track the activities of the EV [13,14].
  • Un-linkability: When an attacker cannot detect if two activities are linked, this is known as un-linkability. Different charging sessions of an EV should be un-linkable, and these different charging sessions should be un-linkable to the EV’s real identity [14,15].
  • Traceability: This property enables the trustworthy organization (OP) to identify or disclose the malicious EV’s true identity if necessary [16].
  • Perfect forward/backward security: If a long-term private key is compromised, the attacker will not be able to access future/old session keys [17].
  • Joint key control: Both the demander and supplier EVs will contribute a random number to generate the session key. Thus, no one other than participating entities receives access to or may obtain any session keys.
  • Effective re-authentication: The process whereby the supplier EV re-authenticates the demander EV, if matched again, causes an overhead. Hence, using information provided by a trusted third party (OP) and the EAG, the supplier EV should be able to verify the demander EV just once in the first encounter. For future access, the supplier EV can re-authenticate the demander EV without relying on the OP or EAG.
  • Revocation method: If the user’s registration is terminated, or if the EV’s secret key is disclosed, then it is essential to provide the system with a revocation mechanism.
  • Attack resistance: Because the connection between EAG/EV and EV/EV is conducted in an insecure environment, an adversary may initiate an attack during the communications. As a result, the proposed solution must be capable of defeating attacks such as modification attacks, impersonation attacks, replay attacks, MITM, etc.
  • Non-repudiation: Both the demander and supplier EVs provide proof of delivery in order to thwart participation denial. This is required to ensure that any dispute is resolved fairly [14].

2.2. Elliptic-Curve-Based Operations

Elliptic-Curve Cryptography (ECC) can be used to design the most lightweight public-key cryptographic systems. The algebraic form of ECs over finite fields is the foundation for ECC. In the finite field F p , the curve is characterized by E p ( a , b ) and is determined using the formula y 2 = x 3 + a x + b , in which a and b are both constants field F p and Δ = 4 a 3 + 27 b 2 0 . The G stands for the base point constructor of the curve ( E p ( a , b ) ) of prime order q . An additive group is formed by all points on E p ( a , b ) , plus the infinite point. ECC has two main operations: addition and multiplication. The addition operation of two points results in a new EC point R , such that P 1 + P 2 = R . The EC scalar multiplication of r     F p with EC point P results in a new EC point R , such that R = r P = ( R x ,   R y ) where R x ,   R y   F p [18].

2.3. ECQV Implicit Certificates

The implicit authentication of the ECQV mechanism offers the advantages of a lightweight certificate, faster computation, and is more suitable for resource-constrained Internet-of-Things (IoT) devices than traditional certificates (such as X.509 certificates) [19]. A traditional certificate demands a signature-verification technique, but an implicit certificate demands a public-key-extraction process, and the latter is significantly faster. The ECQV technique, which is based on Elliptic-Curve Cryptography, is used to create ECQV implicit certificates [20]. The private key can only be derived by the party requesting the security material, therefore not even the Certificate Authority (CA) can access it. Hence, the mechanism is safe from key-escrow attacks. Furthermore, a secure channel is not necessary during the procedure because all variables can be provided via an open channel [21].

3. Literature Review

In this section, we look at some of the most significant security and privacy-preserving V2V-charging solutions. The benefits and drawbacks of various existing security methods, as well as the efforts made in this study to solve the related difficulties, are outlined. The main objective of this work is to develop a secure, privacy-preserving authentication strategy for V2V charging that includes an efficient re-authentication strategy to minimize the authentication-process overhead. Prior work in the fields of security and privacy systems has been investigated to achieve the desired result.
The majority of research [6,22,23,24,25,26] on V2V charging/discharging concentrates on scheduling and coordination algorithms, as well as pricing mechanisms to reduce charging time and expense [27]. An EV-charging model was proposed by Kim et al. (2018) that matches the EV with either an EVCS or another EV in order to charge. They came to the conclusion that collaborating with EVs and CSs is preferable to depending only on EVCSs or V2V [22]. To solve the navigation and matching challenges in cooperative V2V charging, Li et al. (2019) proposed a framework for intelligent V2V navigation [23]. Li et al. (2018) similarly proposed a direct V2V matching for energy trading [24]. The concept of mobile EVCSs (charging trucks) to satisfy EV needs was considered in Kabir et al.’s (2020) routing model [6]. The concern of EV privacy preservation in V2V matching led Yucel et al. (2018) to present a model to address privacy-related issues (mainly location privacy) for a standard stable environment [25] and dynamic environment [26]. Several studies [28,29] used symmetric keys to improve authentication performance but did not guarantee anonymity preservation. Moreover, to preserve the EV’s privacy from third-party nodes, Portunes [30] used utility-issued pseudonyms; however, the utility was aware of the linking map between the pseudonyms and real identity.
The basic Diffie–Hellman (DH) key-agreement protocol is a widely known and deployed protocol to thwart eavesdropping [31]. However, it is also known for being vulnerable to active MITM attacks. This has led to the utilization of different versions of DH which add authentication to both entities to mitigate this kind of attack. Roberts et al. (2017) presented a framework for V2V-charging authentication; they used a secure key-exchange (SKE) protocol to eliminate the use and storage of certificates. This authentication technique enables the participating EVs (supplier and demander) to mutually authenticate each other. Furthermore, it protects against several attacks other than MITM. However, one of the main drawbacks of this protocol is not taking into consideration the EV’s privacy protection (such as anonymity, un-linkability, and traceability) [32].
Blockchain technology has been used in some previous research [8,27,33,34,35,36,37,38,39,40] to decentralize the complex energy-economy networks and P2P energy trade. Blockchain technologies are now mainly led by industry, giving the domain a slightly distinct perspective than previous academic areas. It faces some confusion in terms of pseudonymity, privacy and anonymity. For example, Bitcoin [41] provides pseudonymous transactions; since it is a distributed global public ledger, pseudonyms can be de-anonymized by analyzing blockchain-usage trends [42]. Blockchain technology offers globally verifiable proof of transactions in a distributed database (DB) depending on the time stamps of its transactions and messages. The trustworthiness of these proofs is provided by the underlying cryptographic techniques of hash functions and digital signatures [43].
To maintain and hide the real identity of an EV, every new session the EV can generate a new pair of addresses (pseudonyms) using the relevant public/private keys. Similarly, Aitzhan and Svetinovic (2016) introduced a distributed V2V energy-trading model that offers anonymity and un-linkability. In their model, EVs with excess energy can sell it to other EVs by sending a broadcast to all network nodes, and EVs who are interested in buying the energy can perform the matching procedure according to the price and amount. This may paralyze EVs by flooding them with unwanted requests from different nodes, especially with large numbers of EVs [33].
Kang et al. (2017) likewise used pseudonyms to ensure EVs’ anonymity in a consortium blockchain-based V2V energy-trading system. The elliptic-curve-digital-signature algorithm (ECDSA) is used to initialize the system, and network nodes must register with the TA to obtain their credentials (public/private-key pairs and certificates) [34].
Nevertheless, the distributed system faces several challenges, including high communication overheads throughout the transaction-synchronization process. Due to frequent transactions between P2P nodes, state synchronization becomes inconsistent. A blockchain-based software-defined-network (SDN) framework is being developed by Chaudhary et al. (2019) to overcome these challenges. The underlying SDN architecture reduces network latency and provides real-time service by reducing end-to-end delays. In the framework, each EV has a wallet that serves as an energy-trading account. The wallet is produced by combining the genuine wallet address with a random pseudonym (salt value) to ensure the transaction’s un-linkability. The scheme resists several attacks and provides non-repudiation. However, to be able to trade energy between two EVs, there must be a third EV that works as both an energy broker and a minor node, and the energy trading must happen at a specific location (charging station). These pre-conditions are not convenient after taking into consideration the mobility of EVs; additionally, the specified area may be full, or no other EVs (minor node) may be available. Moreover, the framework does not provide an anonymity feature for participating EVs. In addition, this scheme employs SHA-1 (160 bits), which provides minimal communication costs whilst being vulnerable to collision attacks [35].
Establishing and maintaining a public blockchain among EVs with restricted resources and energy is extremely expensive in the energy market, and the consensus efficiency for all engaged EVs is not encouraging. Furthermore, a private blockchain is managed by a single company, and while it is still a centralized network, it cannot guarantee the accuracy of transaction data. Therefore, Sun et al. (2020) utilized a consortium blockchain to provide security and privacy to a V2V-charging system. ECC and asymmetric algorithms were used to initialize the system. However, the scheme allows energy-node fog (EFN) to generate the EV’s public/private-key pair and store it along with other credentials in the account area. Since the EV’s real identity and sensitive information are not protected, this could lead to security and privacy breaches if the account area became compromised [27].
In another aspect where the EVs can act as energy sellers or buyers to the local EAG, Yahaya et al. (2020) applied consortium blockchain to provide security and privacy for energy trading between entities. The ECDSA, SHA-256, and Boneh–Boyen short signature were used to initialize the system. The participating entities must register with the trusted authority (TA) to obtain their certificates and public/private-key pairs [36]. Similarly, Li and Hu (2019) proposed a V2V energy-trading system based on a consortium blockchain. The asymmetric encryption algorithm offers security, and a set of anonymous key pairs offers privacy. The scheme verifies the entity’s signature to ensure mutual authentication between the EV and EAG, accordingly, and the EAG performs the V2V matching and pre-selects a charging pile for the matched pair. However, it does not provide a mechanism to mutually authenticate the arriving EVs [37].
One of the privacy-protection schemes is the k-anonymity technique, which depends on k EVs to confuse the adversary. Using this technique, Long et al. (2020) proposed a blockchain-based P2P energy-trading scheme to solve the location-privacy issue. The system entities (EVs and EAGs) must register with the TA to obtain their credentials (public/private-key pairs). The TA’s signature on the entity’s public key is used to verify its legality. However, both private-key generation and verification mechanisms threaten the system’s security [38].
To hide trading patterns in EVs, a blockchain-based privacy-preserving approach was offered by Sadiq et al. (2021). They applied bilinear pairing and pseudonyms to provide security and privacy for the EV in a V2V energy-trading system. The demander EV requests energy trading from the roadside unit (RSU), which in turn authenticates the demander EV and assigns a token to its pseudo-ID. The RSU broadcasts the request to the pool of EVs, and the supplier EV that is willing to trade energy shall respond to it. The RSU plays the role of matcher between demander/supplier EVs and assigns token to them. Whenever they arrive at the scheduled charging pile, they authenticate themselves using these tokens. The scheme resists several attacks and provides privacy features such as anonymity and traceability (as the mapping between the EV’s real and pseudo-identity is known by the TA only). However, the TA is responsible for the EV’s private-key generation, which is not secure (if the TA is compromised, then it could lead to the compromise of all EVs). Moreover, the tokens used for authentication are generated by the RSU without both EVs’ contributions, which allows other entities to gain access to the service [8].
Javed et al. (2021) proposed a V2V energy-trading scheme based on blockchain technology. Their scheme includes both public and private blockchain network characteristics. Therefore, it demands prior permission, making the network more secure and preventing malicious nodes from joining. They rely on the TA to issue the EV’s unique identity and public/private-key pairs which could compromise the EV’s security. The scheme uses the EV’s identity to authenticate to the local EAG. However, this is insufficient as there are chances of identity theft (it is rather an identification mechanism than authentication). Hence, the system lacks initial security and privacy requirements in terms of mutual authentication and anonymity [39].
In the blockchain-enabled Internet of Vehicles (BIoV), Cui et al. (2020) introduced a vehicle-to-vehicle (V2V) energy-trading mechanism based on Bayesian game pricing to guarantee security, trustworthiness, and reliability. The scheme utilizes a certificate authority (CA) for entity registration (EVs and RSUs) and issues their credentials (certificates and public/private-key pairs). Entities prove their authenticity to each other using digital certificates [44].
Among all the security requirements, authentication stands out as the most important, considering it is the first line of defense against malicious attacks. Symmetric-key-based authentication and public-key-based authentication are the two types of authentication protocols. Asymmetric cryptography, commonly referred to as public cryptography, is a mechanism for encryption and decryption that uses a key pair, namely public/private keys [45]. On the other hand, symmetric-key cryptography relies on a single key that may be used for both encryption and decryption [46].
It has been proven that in symmetric-key-based authentication systems, such as in [32], simply using XOR and hash operations can provide mutual authentication to participating EVs. However, privacy preservation fails to ensure the EV’s anonymity, traceability, and un-linkability. Moreover, there is no re-authentication mechanism to reduce communication overhead in the authentication process.
Furthermore, according to [47], the group-signature-authentication technique used in [38] has some limitations that need to be assessed during system design, including the distribution mechanism of the private key to the group of EVs, the requirement for the constant changing of the group’s public/private-key pairs, and the key-management mechanism.
Anonymity, pseudonymity, and encryption technology are used in many security protection solutions in V2V networks today. Recent studies and protocols such as [8] used traditional procedures such as bilinear pairings to address the issue of anonymity. These solutions need a significant amount of processing power as well as a significant amount of communication overhead, both of which have a huge impact on the performance–security trade-off [48].
To provide security and anonymity, several blockchain-based electric-vehicle-charging solutions have been introduced. Studies [8,27,34,36,38,39,40] used a certificate to initially register and authenticate, but the EV’s public/private-key pair is generated by the TA, which makes these schemes vulnerable to key-escrow attacks. Whilst blockchain is a promising technology for P2P energy trading, there are still several issues that need to be addressed before it can be widely adopted. These issues involve scalability and security as the number of individuals using P2P energy trading grows. There are also issues related to transaction and verification cost: only ten transactions per second can be processed via blockchain while VISA can process 20,000 transactions per second. Moreover, the individual’s transaction fees and storage costs will raise the overall expense of the blockchain. Development cost, regularization, and government limitations are other issues that blockchain systems need to solve [49].
While authentication is an unavoidable prerequisite for secure communication on vehicular ad hoc networks (VANETs), privacy preservation is also a critical requirement that must not be overlooked. The ability of a person to selectively reveal information to specific people or organizations is known as privacy. During authentication, the EV’s name, address, location, and other information required to issue the certificate should not be exposed to anyone except the relevant authority, such as the CA/TA. As a result, the authentication mechanism must maintain the EV’s privacy and privacy-preserving features such as location tracking, anonymity, un-linkability, and traceability [50].
Due to the resource constraints of IoT devices and the latency-critical nature of VANET applications, Ha et al. (2016) presented an implicit-authentication method based on ECQV. The ECQV implicit certificate is essential for mutual authentication, key generation, and key exchange between IoT devices. Through a computational test, they were able to show that traditional certificates are less suitable for use in resource-constrained IoT devices than ECQV implicit certificates [20]. The impact of authentication overhead in latency-critical apps on EV-driver safety, as well as the extent of this impact, were investigated in Baee et al.’s (2019) study. They also showed that verifying certificates using ECDSA and ECQV over the NIST P-256 curve is a practical solution [51].
Other essential privacy-preserving criteria in VANETs, such as un-linkability and traceability, were overlooked when the prior V2V-charging schemes were designed. Moreover, after observation, we found that the principle of token-based re-authentication for valid EVs in a limited amount of time had been neglected. To our knowledge, no study has used ECQV to authenticate EVs in V2V-charging systems, and we are the first to propose it. As a result, we introduce a lightweight ECQV-based authentication protocol for V2V-charging systems that ensure efficient and secure authentication, re-authentication, and ensure that EV’s privacy is not violated.

4. Proposed System

The proposed authentication protocols that meet the solution requirements are presented in this section. The proposed system’s focus on authentication as payment is outside the scope of this study. The notations used for this scheme’s phases are listed in Table 1. The scheme phases are: (1) initialization, (2) registration, (3) authentication, and (4) charging.

4.1. System Architecture

Our solution constitutes an electricity operator (OP), energy aggregator (EAG), electric vehicles (EVs), and smart meter. The proposed architecture is demonstrated in Figure 1, and the following list states the entities in our scheme:
  • OP: Any entity (EV or EAG) attempting to join the V2V-charging system must register its identifying information via the OP, which is the initializer of the proposed protocol. Since the OP acts as a certificate producer (trusted third party), authorized EVs can acquire access to other EVs’ energy-trading services and establish trust between them. Furthermore, the OP has the authority to reveal the identities of malicious or misbehaving entities.
  • EAG: A data aggregator is a smart device or a collection of connected devices that gathers an available EV’s energy information during charging. It acts as an energy broker and matcher to handle V2V energy-trading requests. Additionally, it manages energy trading and offers wireless communication to EVs and EVCSs. The EAG has an authentication mechanism in place in order to identify authorized EVs and coordinate V2V charging.
  • EV: Electric vehicles are smart devices that submit charging requests to the EAG and mutually confirm the EV’s legitimacy to use its services (charging). Depending on their energy needs, EVs act as either energy supplier ( E V S ), demander ( E V D ), or idle EV (do not participate in energy trading). EVs can interact with EAGs for energy trading thanks to the onboard unit’s (OBU) communication and computing capabilities. The E V S offers its excess energy to other electric vehicles in need and receives an incentive in return. Moreover, when the E V D demands energy, it makes a request to the local EAGs. We assume that the communication takes place in this environment via the dedicated-short-range-communication (DSRC) protocol, and the Internet and EV have a controlled-area-network (CAN) bus linked to the charging port.
  • Smart meter: It is a device that is used to keep track of and compute the amount of energy exchanged between energy nodes. According to smart-meter statistics, energy demanders pay the suppliers the corresponding amount. For the proposed solution, it is considered that each EV has a smart meter installed within the vehicle. We presume that the EV’s smart meter has a tamper-resistant seal. We assume that the EAG is responsible for reading the traded energy from each EV’s smart meter, and accordingly generates the payment method.
Without the OP’s intervention, the EAG first verifies the EVs ( E V D / E V S ) through their A E V signed by the OP and the A i d i by the EV. Before E V D / E V S matching, the EAG authenticates both participants to prevent malicious vehicles from accessing the system. After successful matching and arriving at the scheduled location, the E V S authenticates E V D using the A i d i D token signed by the OP and E V D . On the other hand, the E V D authenticates E V S using the A i d i S signed by the OP and E V S in order to thwart impersonation attacks. The proposed approach uses ECQV, symmetry, and PKC to establish mutual authentication between E V D / E V S . The proposed solution allows the reuse of A T D S for effective re-authentication (similar to [52] and our previous study). The E V S issues A T D S once it has authenticated E V D . Using A T D S shortens the time it takes to verify A i d i D in a future charge request. The shortage of public EVCSs is the primary issue in the EV-charging infrastructure. EV owners can share (sell) their vehicle’s excess energy with other EVs in need. In exchange, EV owners can gain incentives by sharing their energy with other EVs.

4.2. Initialization Phase

To set up the network, the OP performs system initialization, which is outlined below:
Step 1
The OP chooses the base point G on the elliptic curve E p with order n , with n being a large prime number. It chooses the curve coefficients a and b , q for the field size and h for the cofactor, where h n is the elliptic curve’s number of points (these are the domain parameters for an elliptic curve).
Step 2
A hash function that has been approved H ( . ) is chosen. During the certificate-request/generation operations, the OP and certificate requester pick the random-number generator that will be used to generate the private keys.
Step 3
The elliptic curve domain parameters are coupled with an EC key pair ( P R O P ,   P K O P ) that the OP obtains (constructed in step 1).
Step 4
The EV and EAG acquire the EC domain parameters H ( . ) and P K O P (OP’s public key) in an authentic manner.

4.3. Registration Phase

When an entity (EV or EAG) wishes to use the charging system, they must first create their identities and public/private-key pair. Afterwards, from the OP, they obtain the relevant certificate, authenticator, private-key-construction data, and anonymous identity (for EV only).

4.3.1. EV Registration

Figure 2 illustrates the EV-registration process, which is described in detail below:
Step 1
The EV picks its identity i d E V and creates an EC key pair ( k E V ,   R E V ), with k E V   ϵ R   [ 1 ,   ,   n 1 ] and R E V = k E V . G . To maintain integrity, it calculates I E V = h ( R E V ,   i d E V ,   N E V ) , then encrypts { i d E V ,   R E V ,   N E V ,   I E V } with P K O P (OP’s public key) and sends it to the OP.
Step 2
The OP uses its private key P R O P to obtain the message’s content and verifies I E V . Then, it selects k   ϵ R   [ 1 ,   ,   n 1 ] and constructs the implicit certificate for the EV ( C e r t E V = R E V + k G ). It computes the hash of the certificate e = h ( C e r t E V ) and the EV’s private-key-construction data S E V = e k + P R O P ( m o d   n ) . To produce the EV’s pseudo-identity, the OP uses Formula (1) and signs it with the OP’s private key, where the EV’s real identity is hidden with P K O P to ensure anonymity, and the pseudo-identity A i d i is negotiated to be sequentially incremented ( A i d N o ) by the EV itself each time it demands a service. Using Formula (2), the OP computes the EV’s authenticator, which contains the issued C e r t E V , A i d i , as well as its time life ( T L ) signed by the OP’s private key. To maintain integrity, it calculates A H E V = H ( A E V ) . It then calculates a registration key (temporary key) R K = h ( R E V , N E V ,   P K O P ) that is exclusively shared by the OP and EV. Then, it encrypts { A E V ,   A H E V ,   A i d i , S E V } with R K and sends it to the EV. Finally, the OP should destroy R E V , k , and S E V to hinder the adversary from obtaining the EV’s secret key.
A i d i = { ( S i g O P (   P K O P ( i d E V ) ,   T L ) ) ,   A i d N o }
A E V = { S i g O P ( C e r t E V ,   T L ,   i d O P ,   P K O P ( i d E V ) ) }  
Step 3
The EV calculates the shared registration key R K = h ( R E V , N E V ,   P K O P ) to obtain A E V ,   A i d i , uses the OP’s public key to verify them, and checks A H E V . It computes e = h ( C e r t E V ) , and uses Formulas (3) and (4) to construct its private/public-key pair P R E V / P K E V .
P R E V = e . k E V + S E V ( m o d   n )
P K E V = e . C e r t E V + P K O P
To confirm that P K E V is valid, it computes P K E V = P R E V . G and then checks if P K E V = = P K E V as follows:
P R E V = e . k E V + S E V ( m o d   n )
From step 18 of Figure 2
= e . k E V + ( e . k + P R O P ( mod   n ) )
From step 9 of Figure 2
= e . ( k E V + k ) + P R O P ( m o d   n )
Cert E V =   R E V +   kG  
From step 7 of Figure 2
=   k E V . G +   k . G  
From step 3 of Figure 2
= ( k E V + k ) . G
P K E V =   e . Cert E V +   P K O P
From step 19 of Figure 2
=   e . ( k E V + k ) . G +   P R O P . G  
From Formula (6)
=   e . ( ( k E V + k ) +   P R O P ) . G  
From Formula (5)
= P R E V   . G
Following the confirmation of P K E V = = P K E V , the EV signs A i d i using its own private key. Lastly, the EV encrypts { A E V , A i d i } with P K E V and stores it in the onboard-unit (OBU) memory, and to thwart adversary acquisition of the EV’s private key, the EV destroys R E V , k E V , and S E V .

4.3.2. EAG Registration

Figure 3 illustrates the EAG-registration process, which is broken down as follows:
Step 1
The EAG picks its identity i d E A G , and creates the EC key pair ( k E A G ,   R E A G ) with k E A G   ϵ R   [ 1 ,   ,   n 1 ] and R E A G = k E A G . G . To maintain integrity, it calculates I E A G = h ( R E A G ,   i d E A G ,   N E A G ) . Then, it encrypts { i d E A G ,   R E A G ,   N E A G ,   I E A G } with P K O P and sends it to the OP.
Step 2
The OP uses its private key P R O P to obtain the message’s content and verifies I E A G . Then, it selects k   ϵ R   [ 1 ,   ,   n 1 ] and constructs the implicit certificate for the EAG ( C e r t E A G = R E A G + k G ). It computes the hash of the certificate e = h ( C e r t E A G ) and the EAG’s private-key-construction data S E A G = e k + P R O P ( m o d   n ) . Using Formula (8), the OP computes the EAG’s authenticator, which contains the issued C e r t E A G , i d E A G , as well as its time life ( T L ) signed by the OP’s private key. To maintain integrity, it calculates A H E A G = H ( A E A G ) . Then, it calculates a registration key (temporary key) R K = h ( R E A G , N E A G ,   P K O P ) that is exclusively shared by the OP and EAG. Then, it encrypts { A E A G ,   A H E A G , S E A G } with R K and sends it to the EAG. Finally, the OP should destroy R E A G , k , and S E A G to hinder an adversary from obtaining the EAG’s secret key.
A E A G = { ( S i g O P ( C e r t E A G ,   T L ,   i d E A G ) ) }  
Step 3
The EAG calculates the shared registration key R K = h ( R E A G , N E A G ,   P K O P ) to obtain A E A G , uses the OP’s public key to verify it, and checks A H E A G . It computes e = h ( C e r t E A G ) and uses Formulas (9) and (10) to construct its private/public-key pair P R E A G / P K E A G .
P R E A G = e . k E A G + S E A G ( m o d   n )
P K E A G = e . C e r t E A G + P K O P
To confirm that P K E A G is valid, it computes P K E A G = P R E A G . G , then checks if P K E A G = = P K E A G as follows:
PR EAG = e . k EAG +   S EAG ( mod   n )
From step 17 of Figure 3
= e . k EAG + ( e . k + PR OP ( mod   n ) )
From step 9 of Figure 3
= e . ( k E A G + k ) + P R O P ( m o d   n )
Cert EAG =   R EAG +   kG  
From step 7 of Figure 3
=   k EAG . G +   k . G  
From step 3 of Figure 3
= ( k E A G + k ) . G
PK EAG =   e . Cert EAG +   PK OP
From step 18 of Figure 3
=   e . ( k EAG + k ) . G +   PR OP . G  
From Formula (12)
=   e . ( ( k EAG + k ) +   PR OP ) . G  
From Formula (11)
= P R E A G   . G
Following the confirmation of P K E A G = = P K E A G , the EAG encrypts { A E A G } with P K E A G and stores it in memory, and to thwart adversary acquisition of the EAG’s private key, the EAG destroys R E A G , k E A G , and S E A G .

4.4. Authentication Phase

Whenever an EV wants to use the V2V-charging system, the E V D and E V S must authenticate each other and establish a session key. The authentication process can be divided into two categories: First is the mutual authentication, for which the E V D and E V S have not yet built trust between them. As a result, they rely on information provided by a third source that they can trust (OP). Second is lightweight re-authentication, in which the E V D and E V S authenticate each other without the involvement of a third party (OP).

4.4.1. Mutual-Authentication Protocol

The mutual-authentication process is initially conducted once, whereby the E V S depends on the OP’s information to authenticate the E V D , unless A i d i D is expired. The procedure is illustrated in Figure 4, and is as follows:
Step 1
The E V D generates the charging request C H E V = S i g E V D ( a m o u n t D ,   p r i c e D ,   d i s t a n c e D ,   T L ) , a random number N E V D , and a time stamp T E V D , where “ a m o u n t D ” states the amount of power needed, “ p r i c e D ” states the price E V D is willing to pay for the traded energy, and “ d i s t a n c e D ” states E V D ’s distance from the local EAG in order to maintain its current location privacy. To obtain a unique anonymous identity for the session, the E V D sequentially increments the A i d i D counter (adds 1 to the previous E V D ’s pseudo-ID) and hashes it. The E V D signs C H E V using its private key, encrypts { C H E V D ,   A E V D , A i d i D ,   N E V D ,   T E V D } with P K E A G , and sends it to the local EAG.
Step 2
The EAG decrypts the message using its own private key P R E A G to retrieve the content. It uses the OP’s signature to verify A E V D and checks T E V D to ensure it is not a replayed message. Then, it computes e E V D = h ( C e r t E V D ) to extract the E V D ’s public key P K E V D = e E V D . C e r t E V D + P K O P . It verifies A i d i D by E V D ’s signature along with the OP’s signature. After verification, the EAG generates a supply request S B E V = S i g E A G ( a m o u n t D ,   p r i c e D , T L ) and broadcasts it to nearby EVs.
Step 3
Nearby EVs that receive the S B E V verify the supply request through the EAG’s signature, and EVs with excess energy that are interested in selling it to other EVs generate a random number N E V S , a time stamp T E V S , and R S P E V S = S i g E V S ( a m o u n t S ,   p r i c e S , T L ) , where “ a m o u n t S ” is the amount of energy E V S is offering to sell, and “ p r i c e S ” states the price that E V S is demanding for the traded energy. The E V S signs R S P E V S using its private key and encrypts { A E V S , A i d i S ,   N E V S ,   T E V S ,   R S P E V S } with P K E A G , then sends it to the local EAG.
Step 4
The EAG decrypts the message using its own private key P R E A G to retrieve the content. Then, it uses the OP’s signature to verify A E V S and checks T E V S to ensure it is not a replayed message. It computes e E V S = h ( C e r t E V S ) to extract the E V S ’s public key P K E V S = e E V S .   C e r t E V S + P K O P . It verifies A i d i S by the E V S ’s signature along with OP’s signature. The EAG matches E V D to the best-fit E V S and schedules a V2V-charging location ( L o c D S ) for them. After matching, the EAG computes X E V and temporary keys T K E V E A G for both sides. For E V D , the EAG computes X E V D = h ( P K E V S ,   N E V S ,   T E V S ) to be further used in the E V D / E V S mutual authentication, and computes T K E V D E A G = h ( i d E A G ,   N E V D ,   T E V D ) to protect the transmission of { P K E V S ,   X E V D , A i d i S , L o c D S } to E V D . For E V S , the EAG compute X E V S = h ( P K E V D ,   N E V D ,   T E V D ) to be further used in E V D / E V S mutual authentication, and computes T K E V S E A G = h ( i d E A G ,   N E V S ,   T E V S ) to protect the transmission of { P K E V D ,   X E V S , A i d i D , L o c D S } to E V S .
Step 5
Both E V S / E V D generate their corresponding temporary keys T K E V E A G to retrieve the content of the message. E V D retrieves the matched E V S ’s public key and verifies its A i d i S by the E V S ’s signature and P K E V S that is included in it along with the OP’s signature. When both E V S and E V D arrive at the specified location ( L o c D S ), E V D generates a new random number N E V D and time stamp T E V D . It then generates the shared master key K E V D _ S and the first initial key I K E V D S using Formulas (14) and (15), respectively. Then, it encrypts { A i d i D ,   N E V D ,   T E V D } with I K E V D S and sends it to E V S over DSRC.
K E V D _ S = P R E V D   .   P K E V S = P R E V D   .   P R E V S   . G
I K E V D S = h ( P K E V S ,   X E V D , K E V D _ S )
Step 6
E V S generates X E V D = h ( P K E V S ,   N E V S ,   T E V S ) , the master key K E V D _ S and the first initial key I K E V D S using Formulas (14) and (15), respectively. It retrieves N E V D and verifies A i d i D by E V D ’s signature along with the OP’s signature, and checks the validity of T E V D to ensure it is not a replayed message. To obtain a unique anonymous identity for this session, E V S sequentially increments the A i d i S counter (adds 1 to the previous E V S ’s pseudo-ID) and hashes it. After verification, E V S generates a new random number N E V S , a time stamp T E V S , and the second initial key I K E V S D using Formula (16). E V S generates A T D S , which is the authorization token for E V D , and the session key S K E V D _ S using Formulas (17) and (18), respectively. Then, it sends it to E V D   { A T D S ,   T E V S } encrypted by I K E V S D , and begins the V2V-charging service for E V D , which is protected by S K E V D _ S . Lastly, it updates the A i d i S in the memory.
I K E V S D = h ( P K E V D ,   X E V S , K E V D _ S )
A T D S = { S i g E V S ( A T N o ,   T L ,   A i d i S ,   P K E V S ( P K E V D ,   K E V D S ) ) }
S K E V D _ S = h ( K E V D _ S , A T N o ,   P K E V D ,   N E V D )
Step 7
E V D generates X E V S = h ( P K E V D ,   N E V D ,   T E V D ) and the second initial key I K E V S D using Formula (16) to retrieve A T D S , and checks the validity of T E V S . Then, using Formula (18), it generates the session key to be used during the charging session. Lastly, it stores the A T D S issued by E V S and updates the A i d i S in the memory. By the completion of this procedure, E V S and E V D will have a trust relationship established and will no longer need to rely on the OP for future session authentication.

4.4.2. Lightweight Mutual-Re-Authentication Protocol

As previously stated, at this point, E V S and E V D should have built a relationship of trust. They can now immediately authenticate each other in future V2V-charging services. This phase (re-authentication phase) can only be used when the E V D has a valid A T D S and has been scheduled for the same E V S within the last 12 h. Moreover, recalculating all the parameters for a new session key when the user is already trusted is wasteful and time- and energy-consuming. Due to EV mobility, E V D utilizes its local EAG to match its V2V request. If the previous E V S is available and within the EAG’s area, E V S and E V D shall be matched. The following is a full description of the process of effective re-authentication as shown in Figure 5:
Step 1
E V D generates the charging request C H E V = S i g E V D ( a m o u n t D ,   p r i c e D ,   d i s t a n c e D ,   T L , A i d i S ) , a random number N E V D , and a time stamp T E V D , where “ a m o u n t D ” states the amount of power needed, “ p r i c e D ” states the price E V D is willing to pay for the traded energy, and “ d i s t a n c e D ” states E V D ’s distance from the local EAG in order to maintain its current location privacy. To obtain a unique anonymous identity for this session, E V D sequentially increments the A i d i D counter (adds 1 to the previous E V D ’s pseudo-ID) and hashes it. However, since E V D has a valid authorization token A T D S , this time it includes the A i d i S of the corresponding E V S in the request. E V D signs C H E V using its private key and encrypts { C H E V D ,   A E V D ,   A i d i D ,   N E V D ,   T E V D } with P K E A G , then sends it to the local EAG.
Step 2
The EAG decrypts the message using its own private key P R E A G to retrieve the content. Then, it uses the OP’s signature to verify A E V D , and checks T E V D to ensure it is not a replayed message. It computes e E V D = h ( C e r t E V D ) to extract E V D ’s public key P K E V D = e E V D . C e r t E V D + P K O P . Next, it verifies A i d i D by E V D ’s signature along with the OP’s signature. The EAG checks if the specified E V S is available within its area. After verification, the EAG generates a supply request S B E V = S i g E A G ( a m o u n t D ,   p r i c e D , T L ) . and sends it to that E V S .
Step 3
The E V S that received the S B E V verifies the supply request through the EAG’s signature, and if the E V S has excess energy and is interested in selling it to the other E V D , then it generates a time stamp T E V S and R S P E V S = S i g E V S ( a m o u n t S ,   p r i c e S , T L ) , where “ a m o u n t S ” is the amount of energy E V S is offering to sell, and “ p r i c e S ” states the price E V S is demanding for the traded energy. E V S signs R S P E V S using its private key and encrypts { A E V S , A i d i S ,   T E V S ,   R S P E V S } with P K E A G , then sends it to the local EAG.
Step 4
The EAG decrypts the message using its own private key P R E A G to retrieve the content. Then, it uses the OP’s signature to verify A E V S , and checks T E V S to ensure it is not a replayed message. It computes e E V S = h ( C e r t E V S ) to extract E V S ’s public key P K E V S = e E V S . C e r t E V S + P K O P . Next, it verifies A i d i S by E V S ’s signature along with the OP’s signature. The EAG matches E V D to E V S and schedules a V2V-charging location ( L o c D S ) for them. After matching, the EAG computes temporary keys T K E V E A G for both sides. For E V D , the EAG computes T K E V D E A G = h ( i d E A G ,   N E V D ,   T E V D ) to protect the transmission of { P K E V S ,   A i d i S , L o c D S } to E V D . For E V S , the EAG compute T K E V S E A G = h ( i d E A G ,   N E V S ,   T E V S ) to protect the transmission of { P K E V D , A i d i D , L o c D S } to E V S .
Step 5
Both E V S / E V D generate their corresponding temporary keys T K E V E A G to retrieve the content of the message. E V D retrieves the matched E V S ’s public key and verifies its A i d i S with the one included within A T D S . When both E V S and E V D arrive at the specified location ( L o c D S ), E V D generates new random numbers, N E V D and N E V D , and computes the previous session key using Formula (18), to be used in A i d i D ,   N E V D ,   T E V D encryption, and sends A T D S , N E V D , and S K E V D _ S   { A i d i D ,   N E V D ,   T E V D } to E V S over DSRC.
Step 6
E V S verifies the validity of A T D S through the signature S i g E V S using P K E V S and T L . It decrypts the A T D S using P R E V S to retrieve P K E V D ,   K E V D _ S . E V S needs to compute S K E V D _ S to obtain A i d i D ,   N E V D ,   T E V D , and to ensure that the A T D S was sent by the authorized E V D . To obtain a unique anonymous identity for this session, E V S sequentially increments the A i d i S counter (adds 1 to the previous E V S ’s pseudo-ID) and hashes it. Then, it uses A T N o ,   A i d N o D , N E V D ,   T E V D to generate the temporary key T K E V D _ S using Formula (19). It then generates N E V S , T E V S , and a new session key S K E V D _ S such as in Formula (20). E V S then sends { N E V S ,   T E V S } encrypted by T K E V D _ S to E V D and begins the V2V-charging service for E V D , which is protected by S K E V D _ S . Lastly, it updates the A i d i S in the memory.
T K E V D _ S = h ( A T N o ,   A i d N o D , N E V D ,   T E V D )
S K E V D _ S = h ( T K E V D _ S ,   K E V D _ S ,   P K E V D ,   N E V S )
Step 7
E V D generates the T K E V D _ S to retrieve N E V S and verifies T E V S . Then, it generates S K E V D _ S using Formula (20), to be used during the charging session, and updates A i d i D .

4.5. V2V-Charging Phase

After successful authentication, E V D connects with the OBU through the CAN bus to unlock the vehicle’s charging port. E V S now plugs its vehicle to E V D and begins charging it. The CHAdeMO protocol, which is utilized by Nissan, Toyota, and others, is an example of how to conduct V2V charging after authentication [53]. The E V S can use CHAdeMO to initiate and control the charging energy-transfer process by interacting with the E V D over the CAN bus. E V D acts as if it is linked to a fast-charging station when it is using this protocol. When the E V D stops charging, the operation is finished. Our proposed scheme focuses on providing a secure authentication mechanism for V2V-charging systems. Hence, we assume that payment might be handled by other schemes since it is beyond our scope.

4.6. Revocation Protocol

The proposed scheme includes a revocation technique to protect entities from impersonation and MITM attacks, as well as to notify them that a parameter is no longer trustworthy, even before its validity period expires. Due to EV mobility and the short lifetime of A T D S (12 h and can only be used once), it is hard to revoke it. However, the A i d i token is revoked if the EV suspects it was stolen by an adversary. The procedure for revocation of A i d i   is as follows:
Step 1
The EV creates the revocation request for A i d i ’s, R e v E V i d = { P K O P ( S i g E V , A i d i ,   R e v A i d ,   T E V ) } , uses the OP’s public key P K O P to encrypt it, and forwards it to the OP.
Step 2
The OP uses its private key P R O P to decrypt the revocation request, then verifies S i g E V using P K E V and S i g O P , which is within A i d i . The OP should also check whether T E V is valid in order to avoid a replay attack. Finally, the OP changes the status of A i d i to revoked. Because the EV’s signature is required, the adversary cannot create a fake revocation request.

5. Security Analysis

In this section, we discuss the security analysis of the proposed protocol and carry out informal analysis.

5.1. Informal Security Analysis

The proposed protocol is examined to prove that it meets the design solution requirements.

5.1.1. Mutual Authentication

In the authentication phase, the E V D can ensure that it interacts with the legitimately matched E V S through the validation of the OP’s and E V S signatures on the A i d i S , which is forwarded by the EAG after verification, and through the second initial key I K E V S D , which is constructed by E V D ’s parameter ( N E V D ,   T E V D ) and submitted to the EAG for a charging request. The E V S can also validate E V D by the OP’s and E V D signatures on the A i d i D , which is forwarded by the EAG after verification, and by the first initial key I K E V D S , which is constructed by E V S ’s parameter ( N E V S ,   T E V S ) and submitted to the EAG for a trading response. Unlike [37], where they either settled for EV and EAG mutual authentication and did not allow authentication between arriving EVs, or [39], where they used the EV’s identity for authentication purposes (it is rather an identification mechanism than authentication), our proposed protocol ensures mutual authentication for both EV/EAG and EV/EV interactions.

5.1.2. Anonymity

Both the E V D / E V S real identities i d E V are concealed and encrypted by the OP’s public key P K O P ( i d E V ) within the A i d i , which is created during the registration stage; only the OP has authority to access it in the case of necessity. Hence, i d E V cannot be disclosed by either the EAG or any other party (EVs), unlike in [32,39], where they used the EV’s real identity for V2V authentication.

5.1.3. Un-Linkability

Both E V D / E V S will have an automatically updated anonymous identity A i d i   for each charging session. As the A i d i is issued by the OP, each V2V-charging request from E V D sequentially increments the previous A i d i (adds 1), unlike [8,32], where they either used the EV’s real identity or the same pseudo-ID for every new charging request. These strategies allow the adversary to track and compromise the privacy of the targeted EV. However, the proposed protocol sessions cannot be linked to each other as they hold different identities. However, as the proposed protocol utilizes different identities for each session, it thwarts the linkage attacks (cannot be linked together).

5.1.4. Traceability

Even though the real identity of the EV is concealed through encryption P K O P ( i d E V ) , the OP is the only entity in the scheme that can reveal i d E V , so as to maintain the order in the system. In the case of a malicious or misbehaving EV, there is a necessity for i d E V disclosure. To secure the system and to function as required by all parties, anonymity should not be absolute, unlike in [38], where they utilized the k-anonymity technique to solve location-privacy issues. However, this technique prevents the TA from knowing the identity of malicious EVs. Our proposed protocol ensures the EV’s anonymity, but at the same time gives the OP the ability to trace it if necessary.

5.1.5. Forward/Backward Security

In the event that an adversary obtains any S K E V D _ S , the confidentiality of future/old session keys ( S K E V D _ S ) should not be compromised. For the authentication phase, dynamic session keys are created, which comprise a unique random number N E V D . A symmetric initial key ( I K E V D S ) protect the transmission of N E V D . For the re-authentication phase, S K E V D _ S contains a unique random number N E V S . A symmetric temporary key ( T K E V D _ S ) protects the N E V S , which dynamically updates with a new unique random number N E V D in every new session. Moreover, since the shared master key K E V D _ S is a long-lasting key (generated from the participant’s   P K E V and   P R E V ), it is eliminated from the encryption of any transmitted message between E V D / E V S . Each session generates a unique session key; if an adversary can deduce a session key, that key is only legitimate for the current communication. As a result, the proposed protocol ensures both forward and backward security, unlike other schemes such as in [36,44], where they obtained their public/private-key pair from the TA, which threatens the secrecy of their long-term keys and the security of their sessions.

5.1.6. Joint Key Control

The session key S K E V D _ S of the authentication phase and the new session key S K E V D _ S for re-authentication, including random numbers N , are created by both parties ( E V D / E V S ) without the assistance of other parties, even the OP. Moreover, the shared master key K E V D _ S is created from the combination of both parties’ ( E V D / E V S ) private and public keys, therefore only these two parties can obtain the master key. Thus, the proposed protocol allows for cooperative key control, unlike [8,39], where the session key is issued by the RSU or TA.

5.1.7. Non-Repudiation

The demand and supply requests ( C H E V D , S B E V , R S P E V S ) are signed by the sender. As the sender’s signature is needed, participating entities cannot deny the delivery of these requests. Moreover, an adversary cannot generate fake requests as a signature is required.

5.1.8. Effective Re-Authentication

To reduce the required amount of time spent and to minimize the cost each time E V S re-authenticates E V D , it issues an authorization token ( A T D S ) with a lifetime of 48 h and a single usage. For initial authentication, E V S depends on the information provided by the OP (trusted third party) to authenticate E V D once at the first encounter. After that, E V S can directly authenticate E V D without reliance on the OP’s information, as long as it holds a valid A T D S (valid for one use only), unlike the previous schemes [8,27,32,33,34,35,36,37,38,39,40]. Hence, the proposed protocol allows both parties to establish full trust between them ( E V D / E V S ).

5.1.9. Revocation Functionality

To prevent an adversary from misusing stolen token   A i d i , or if the EV suspects its   A i d i has been stolen, it can use the revocation protocol to notify OP. Additionally, the token will be regarded as revoked if the EV reports to the OP to revoke its   A i d i . The pseudonyms supplied by the service provider were not revocable in related works.

5.1.10. Resist MITM/Replay Attack

In case an adversary acquires A E V D , the E V D private key is needed to produce the shared master key ( K E V D _ S ) for E V S authentication to be successful. On the other hand, if the adversary acquires A T D S , the possibility to retrieve the master key ( K E V D _ S ) is zero, as it is included within A T D S and encrypted using the E V S public key. As a result, without K E V D _ S , the adversary will be unable to produce the session key necessary for an MITM attack. Furthermore, in each communication between the parties, random time stamps and numbers are transmitted to ensure that previous sessions cannot be replayed. Therefore, the proposed protocol protects against replay attacks.

5.1.11. Resist Impersonation Attack

The solution tokens A E V ,   A i d i   or A T D S cannot be generated by an adversary with the EV or OP name since they require the issuer’s signature. Since the issuer’s signature needs to be verified, the A E V ,   A i d i   and A T D S counterfeit is doubtful. Therefore, the proposed protocol prevents an adversary from launching impersonation attacks.

6. Comparison with Related Schemes

In this section, the proposed scheme is compared to similar systems in terms of security and functionality, as well as computational cost. These are recent V2V-charging-system schemes that emphasize secure EV-to-EV communication.

6.1. Security and Functional-Feature Comparison

Table 2 summarizes the evaluation of the proposed system’s security and functional aspects as well as those of related systems. The solutions in [8,27,34,38,39,40] are vulnerable to well-known attacks. Additionally, the solutions in [8,27,32,36,37,38,39,40] are inappropriate for V2V charging because they lack critical security and privacy features such as forward security, un-linkability, traceability, and effective re-authentication. In [32,35], more messages are required, which raises the communication channel’s overhead. In comparison to previous studies, our proposed scheme meets all the solution requirements.

6.2. Computational Cost Comparison

This section calculates the authentication protocols’ computing overhead based on all the operations provided by the protocols. The EAG has sufficient capabilities to conduct all needed processes due to its high degree of performance. Contrary to the EAG, the EV’s memory and computational resources are limited. Therefore, we must concentrate on the cost of EV computation. The time calculations are based on [54,55], as they stated that a one-way hash function ( T h ) takes 0.0023 milliseconds (ms), the elliptic-curve encryption ( T e n c e c c ) takes 0.43 ms, the symmetric encryption ( T s y m ) takes 0.0046 ms, the scalar multiplication ( T s m ) takes 2.226 ms, and modular exponentiation ( T m e ) takes 3.85 ms. Table 3 presents a summary of the timing operations. The computational costs of the proposed protocol and related works are compared in Table 4 and Figure 6.
In Roberts et al.’s scheme [32], the authentication phase of the EVs takes 3.8569 ms ( T m e + 3 T h ). The proposed protocol requires   1.3439 ms ( T e n c e c c + 5 T h + 4 T s y m + 2 T s m   ), and it provides better security and privacy preservation for the EV as well as a 65% improvement in computational cost. For the re-authentication process of the EV, the proposed protocol requires 0.4576 ms ( T e n c e c c + 4 T h + 4 T s y m   ), while Roberts et al.’s scheme [32] requires 3.8569 ms ( T m e + 3 T h ). Hence, the proposed re-authentication protocol’s computational cost is roughly 88% lower than the earlier protocol. Given the capabilities of the EV, it is evident that the proposed protocol outperforms the previous protocol.

6.3. Limitations

This section highlights the shortcomings of the proposed solution. This study is limited to the centralized authentication methods of communicating entities for EV-charging systems, hence any other model is not included. Furthermore, we are developing the EV-charging-authentication protocol, which focuses on secure key exchange and privacy protection. As a result, our protocol may not be suitable for all VANET architectures that require more advanced algorithms and are capable of managing systems with higher computational complexity. Additionally, our method attempts to preserve the privacy requirements (anonymity, un-linkability, and traceability) of the EVs involved in the communication, as well as secure key exchange and mutual authentication between entities. The scope of this study does not include EV-charging-service scheduling, routing, coordination, actual energy trading, or payment methods. The following are the study’s limitations:
  • The proposed scheme does not consider any parameter that is sent (between entities) and is not relevant to the authentication process in terms of shared key, identity, or security parameters.
  • The proposed scheme is limited to the proposed EV-charging architecture, and any IoV architecture that can outperform EV-charging systems in terms of performance is not considered.
  • The proposed scheme is a centralized authentication protocol; other authentication models, such as distributed and hybrid, were not investigated.
  • The proposed scheme combines asymmetric and symmetric key structures, so any authentication technique based solely on the symmetric-key structure was not considered.

7. Conclusions

In this paper, we propose a privacy-preserving and secure authentication scheme for V2V-charging systems. The scheme fulfils the fundamental requirements as well as a re-authentication protocol to reduce future authentication-process overhead. The ECQV mechanism’s implicit authentication has been utilized to obtain the benefit of a small certificate and faster computation, which is better suited to resource-constrained Internet-of-Things (IoT) devices than a traditional certificate. Informal security analysis was used to show that the proposed protocols can accomplish mutual authentication and meet the solution requirements. The comparison with related work shows that the proposed scheme achieves approximately 65% efficiency in terms of authentication computational cost, and it provides better security and privacy preservation for the EV. Moreover, the proposed re-authentication protocol outperforms Roberts et al.’s scheme [32], with a nearly 88% reduction. For future work, we consider working on an authentication protocol for vehicles selling excess energy to the grid, since it will help EV-charging infrastructure maximize the energy offered during peak hours. In addition, we consider exploring emerging techniques (such as blockchain), how these emerging techniques can comply with ECQV algorithm, and hybrid models in EV-charging authentication.

Author Contributions

Conceptualization, A.M.A. and S.S.A.; methodology, A.M.A. and S.S.A.; validation, A.M.A. and S.S.A.; writing–original draft preparation, S.S.A.; writing–review and editing, A.M.A.; supervision, A.M.A.; funding acquisition, A.M.A. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by SAUDI ARAMCO Cybersecurity Chair at Imam Abdulrahman Bin Faisal University, Saudi Arabia.

Informed Consent Statement

Not applicable.

Acknowledgments

We would like to thank Imam Abdulrahman Bin Faisal University for facilitating access to the resources used in this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ahmadi, P. Environmental Impacts and Behavioral Drivers of Deep Decarbonization for Transportation through Electric Vehicles. J. Clean. Prod. 2019, 225, 1209–1219. [Google Scholar] [CrossRef]
  2. Nereim, V. Saudi Arabia to Start Electric-Vehicle Push in Capital Riyadh; Bloomberg: New York, NY, USA, 2021. [Google Scholar]
  3. Global EV Outlook 2021—Analysis. IEA. Available online: https://www.iea.org/reports/global-ev-outlook-2021 (accessed on 2 November 2021).
  4. Kester, J.; Sovacool, B.K.; Noel, L.; Zarazua de Rubens, G. Rethinking the Spatiality of Nordic Electric Vehicles and Their Popularity in Urban Environments: Moving beyond the City? J. Transp. Geogr. 2020, 82, 102557. [Google Scholar] [CrossRef]
  5. Fu, Z.; Dong, P.; Ju, Y. An Intelligent Electric Vehicle Charging System for New Energy Companies Based on Consortium Blockchain. J. Clean. Prod. 2020, 261, 121219. [Google Scholar] [CrossRef]
  6. Kabir, M.E.; Sorkhoh, I.; Moussa, B.; Assi, C. Routing and Scheduling of Mobile EV Chargers for Vehicle to Vehicle (V2V) Energy Transfer. In Proceedings of the 2020 IEEE Power Energy Society General Meeting (PESGM), Montreal, QC, Canada, 2–6 August 2020; pp. 1–5. [Google Scholar] [CrossRef]
  7. AAA Says That Its Emergency Electric Vehicle Charging Trucks Served “Thousands” of EVs without Power-Electrek. Available online: https://electrek.co/2016/09/06/aaa-ev-emergency-charging-truck/ (accessed on 28 March 2022).
  8. Sadiq, A.; Javed, M.U.; Khalid, R.; Almogren, A.; Shafiq, M.; Javaid, N. Blockchain Based Data and Energy Trading in Internet of Electric Vehicles. IEEE Access 2021, 9, 7000–7020. [Google Scholar] [CrossRef]
  9. Liu, H.; Zhang, Y.; Yang, T. Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing. IEEE Netw. 2018, 32, 78–83. [Google Scholar] [CrossRef]
  10. Nedyalkov, I.; Arnaudov, D. Attacks and Security Measures of the Exchanged Information in the Charging Infrastructure for Electromobiles. In Proceedings of the 2019 IEEE XXVIII International Scientific Conference Electronics (ET), Sozopol, Bulgaria, 12–14 September 2019; pp. 1–4. [Google Scholar] [CrossRef]
  11. Kilari, V.T.; Yu, R.; Misra, S.; Xue, G. Robust Revocable Anonymous Authentication for Vehicle to Grid Communications. IEEE Trans. Intell. Transp. Syst. 2020, 21, 4845–4857. [Google Scholar] [CrossRef]
  12. Unterweger, A.; Knirsch, F.; Engel, D.; Musikhina, D.; Alyousef, A.; de Meer, H. An Analysis of Privacy Preservation in Electric Vehicle Charging. Energy Inform. 2022, 5, 3. [Google Scholar] [CrossRef]
  13. Saxena, N.; Grijalva, S.; Chukwuka, V.; Vasilakos, A.V. Network Security and Privacy Challenges in Smart Vehicle-to-Grid. IEEE Wirel. Commun. 2017, 24, 88–98. [Google Scholar] [CrossRef]
  14. Mustafa, M.A.; Zhang, N.; Kalogridis, G.; Fan, Z. Smart Electric Vehicle Charging: Security Analysis. In Proceedings of the 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 24–27 February 2013; pp. 1–6. [Google Scholar] [CrossRef]
  15. Hansen, M.; Jensen, M.; Rost, M. Protection Goals for Privacy Engineering. In Proceedings of the 2015 IEEE Security and Privacy Workshops, San Jose, CA, USA, 21–22 May 2015; pp. 159–166. [Google Scholar] [CrossRef]
  16. Mundhe, P.; Verma, S.; Venkatesan, S. A Comprehensive Survey on Authentication and Privacy-Preserving Schemes in VANETs. Comput. Sci. Rev. 2021, 41, 100411. [Google Scholar] [CrossRef]
  17. Zhang, J.; Cui, J.; Zhong, H.; Chen, Z.; Liu, L. PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks. IEEE Trans. Dependable Secur. Comput. 2021, 18, 722–735. [Google Scholar] [CrossRef]
  18. Koblitz, N.; Menezes, A.; Vanstone, S. The State of Elliptic Curve Cryptography. Des. Codes Cryptogr. 2000, 19, 173–193. [Google Scholar] [CrossRef]
  19. Brown, D.R.L.; Gallant, R.; Vanstone, S.A. Provably Secure Implicit Certificate Schemes. In Financial Cryptography; Syverson, P., Ed.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2002; pp. 156–165. [Google Scholar] [CrossRef]
  20. Ha, D.A.; Nguyen, K.T.; Zao, J.K. Efficient Authentication of Resource-Constrained IoT Devices Based on ECQV Implicit Certificates and Datagram Transport Layer Security Protocol. In Seventh Symposium on Information and Communication Technology; SoICT ’16; Association for Computing Machinery: New York, NY, USA, 2016; pp. 173–179. [Google Scholar] [CrossRef]
  21. Campagna, M. Sec 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (Ecqv). Stand. Effic. Cryptogr. Version 2013, 1, 5–11. [Google Scholar]
  22. Kim, O.T.T.; Tran, N.H.; Nguyen, V.; Kang, S.M.; Hong, C.S. Cooperative between V2C and V2V Charging: Less Range Anxiety and More Charged EVs. In Proceedings of the 2018 International Conference on Information Networking (ICOIN), Chiang Mai, Thailand, 10–12 January 2018; pp. 679–683. [Google Scholar] [CrossRef]
  23. Li, G.; Sun, Q.; Boukhatem, L.; Wu, J.; Yang, J. Intelligent Vehicle-to-Vehicle Charging Navigation for Mobile Electric Vehicles via VANET-Based Communication. IEEE Access 2019, 7, 170888–170906. [Google Scholar] [CrossRef]
  24. Li, G.; Boukhatem, L.; Zhao, L.; Wu, J. Direct Vehicle-to-Vehicle Charging Strategy in Vehicular Ad-Hoc Networks. In Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 26–28 February 2018; pp. 1–5. [Google Scholar] [CrossRef]
  25. Yucel, F.; Bulut, E.; Akkaya, K. Privacy Preserving Distributed Stable Matching of Electric Vehicles and Charge Suppliers. In Proceedings of the 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), Chicago, IL, USA, 27–30 August 2018; pp. 1–6. [Google Scholar] [CrossRef]
  26. Yucel, F.; Akkaya, K.; Bulut, E. Efficient and Privacy Preserving Supplier Matching for Electric Vehicle Charging. Ad Hoc Netw. 2019, 90, 101730. [Google Scholar] [CrossRef]
  27. Sun, G.; Dai, M.; Zhang, F.; Yu, H.; Du, X.; Guizani, M. Blockchain-Enhanced High-Confidence Energy Sharing in Internet of Electric Vehicles. IEEE Internet Things J. 2020, 7, 7868–7882. [Google Scholar] [CrossRef]
  28. Li, H.; Dán, G.; Nahrstedt, K. FADEC: Fast Authentication for Dynamic Electric Vehicle Charging. In Proceedings of the 2013 IEEE Conference on Communications and Network Security (CNS), National Harbor, MD, USA, 14–16 October 2013; pp. 369–370. [Google Scholar] [CrossRef]
  29. Huang, X.; Xu, C.; Wang, P.; Liu, H. LNSC: A Security Model for Electric Vehicle and Charging Pile Management Based on Blockchain Ecosystem. IEEE Access 2018, 6, 13565–13574. [Google Scholar] [CrossRef]
  30. Li, H.; Dán, G.; Nahrstedt, K. Portunes+: Privacy-Preserving Fast Authentication for Dynamic Electric Vehicle Charging. IEEE Trans. Smart Grid 2017, 8, 2305–2313. [Google Scholar] [CrossRef]
  31. Diffie, W.; Hellman, M. New Directions in Cryptography. IEEE Trans. Inf. Theory 1976, 22, 644–654. [Google Scholar] [CrossRef]
  32. Roberts, B.; Akkaya, K.; Bulut, E.; Kisacikoglu, M. An Authentication Framework for Electric Vehicle-to-Electric Vehicle Charging Applications. In Proceedings of the 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Orlando, FL, USA, 22–25 October 2017; pp. 565–569. [Google Scholar] [CrossRef]
  33. Aitzhan, N.Z.; Svetinovic, D. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams. IEEE Trans. Dependable Secur. Comput. 2018, 15, 840–852. [Google Scholar] [CrossRef]
  34. Kang, J.; Yu, R.; Huang, X.; Maharjan, S.; Zhang, Y.; Hossain, E. Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains. IEEE Trans. Ind. Inform. 2017, 13, 3154–3164. [Google Scholar] [CrossRef]
  35. Chaudhary, R.; Jindal, A.; Aujla, G.S.; Aggarwal, S.; Kumar, N.; Choo, K.-K.R. BEST: Blockchain-Based Secure Energy Trading in SDN-Enabled Intelligent Transportation System. Comput. Secur. 2019, 85, 288–299. [Google Scholar] [CrossRef]
  36. Yahaya, A.S.; Javaid, N.; Javed, M.U.; Shafiq, M.; Khan, W.Z.; Aalsalem, M.Y. Blockchain-Based Energy Trading and Load Balancing Using Contract Theory and Reputation in a Smart Community. IEEE Access 2020, 8, 222168–222186. [Google Scholar] [CrossRef]
  37. Li, Y.; Hu, B. An Iterative Two-Layer Optimization Charging and Discharging Trading Scheme for Electric Vehicle Using Consortium Blockchain. IEEE Trans. Smart Grid 2020, 11, 2627–2637. [Google Scholar] [CrossRef]
  38. Long, Y.; Chen, Y.; Ren, W.; Dou, H.; Xiong, N.N. DePET: A Decentralized Privacy-Preserving Energy Trading Scheme for Vehicular Energy Network via Blockchain and K-Anonymity. IEEE Access 2020, 8, 192587–192596. [Google Scholar] [CrossRef]
  39. Javed, M.U.; Javaid, N.; Malik, M.W.; Akbar, M.; Samuel, O.; Yahaya, A.S.; Othman, J.B. Blockchain Based Secure, Efficient and Coordinated Energy Trading and Data Sharing between Electric Vehicles. Clust. Comput. 2021, 25, 1839–1867. [Google Scholar] [CrossRef]
  40. Cui, Z.; XUE, F.; Zhang, S.; Cai, X.; Cao, Y.; Zhang, W.; Chen, J. A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN. IEEE Trans. Serv. Comput. 2020, 13, 241–251. [Google Scholar] [CrossRef]
  41. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Decentralized Bus. Rev. 2008, 4, 21260. [Google Scholar]
  42. Halpin, H.; Piekarska, M. Introduction to Security and Privacy on the Blockchain. In Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS PW), Paris, France, 26–28 April 2017; pp. 1–3. [Google Scholar] [CrossRef]
  43. Piao, Y.; Ye, K.; Cui, X. A Data Sharing Scheme for GDPR-Compliance Based on Consortium Blockchain. Future Internet 2021, 13, 217. [Google Scholar] [CrossRef]
  44. Xia, S.; Lin, F.; Chen, Z.; Tang, C.; Ma, Y.; Yu, X. A Bayesian Game Based Vehicle-to-Vehicle Electricity Trading Scheme for Blockchain-Enabled Internet of Vehicles. IEEE Trans. Veh. Technol. 2020, 69, 6856–6868. [Google Scholar] [CrossRef]
  45. Khan, A.G.; Basharat, S.; Riaz, M.U. Analysis of Asymmetric Cryptography in Information Security Based on Computational Study to Ensure Confidentiality during Information Exchange. Int. J. Sci. Eng. Res. 2018, 9, 992–999. [Google Scholar]
  46. Bokhari, M.U.; Shallal, Q.M. A Review on Symmetric Key Encryption Techniques in Cryptography. Int. J. Comput. Appl. 2016, 147, 43–48. [Google Scholar]
  47. Al-Shareeda, M.A.; Anbar, M.; Hasbullah, I.H.; Manickam, S. Survey of Authentication and Privacy Schemes in Vehicular Ad Hoc Networks. IEEE Sens. J. 2021, 21, 2422–2433. [Google Scholar] [CrossRef]
  48. Braeken, A.; Touhafi, A. AAA—Autonomous Anonymous User Authentication and Its Application in V2G. Concurr. Comput. Pract. Exp. 2018, 30, e4303. [Google Scholar] [CrossRef]
  49. Ali, F.S.; Aloqaily, M.; Alfandi, O.; Ozkasap, O. Cyberphysical Blockchain-Enabled Peer-to-Peer Energy Trading. Computer 2020, 53, 56–65. [Google Scholar] [CrossRef]
  50. Azam, F.; Yadav, S.K.; Priyadarshi, N.; Padmanaban, S.; Bansal, R.C. A Comprehensive Review of Authentication Schemes in Vehicular Ad-Hoc Network. IEEE Access 2021, 9, 31309–31321. [Google Scholar] [CrossRef]
  51. Baee, M.A.R.; Simpson, L.; Foo, E.; Pieprzyk, J. Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2. IEEE Trans. Veh. Technol. 2019, 68, 11577–11587. [Google Scholar] [CrossRef]
  52. Almuhaideb, A.M. Re-AuTh: Lightweight Re-Authentication with Practical Key Management for Wireless Body Area Networks. Arab. J. Sci. Eng. 2021, 46, 8189–8202. [Google Scholar] [CrossRef]
  53. CHAdeMO. Available online: https://www.chademo.com/ (accessed on 2 April 2022).
  54. Kumar, G.; Saha, R.; Rai, M.K.; Buchanan, W.J.; Thomas, R.; Geetha, G.; Hoon-Kim, T.; Rodrigues, J.J.P.C. A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption. IEEE Trans. Veh. Technol. 2020, 69, 7707–7722. [Google Scholar] [CrossRef]
  55. Kilinc, H.H.; Yanik, T. A Survey of SIP Authentication and Key Agreement Schemes. IEEE Commun. Surv. Tutor. 2014, 16, 1005–1023. [Google Scholar] [CrossRef]
Figure 1. Proposed system architecture.
Figure 1. Proposed system architecture.
Jsan 11 00028 g001
Figure 2. Proposed EV-registration phase.
Figure 2. Proposed EV-registration phase.
Jsan 11 00028 g002
Figure 3. Proposed EAG-registration phase.
Figure 3. Proposed EAG-registration phase.
Jsan 11 00028 g003
Figure 4. Proposed V2V mutual-authentication protocol.
Figure 4. Proposed V2V mutual-authentication protocol.
Jsan 11 00028 g004
Figure 5. Proposed V2V mutual-re-authentication protocol.
Figure 5. Proposed V2V mutual-re-authentication protocol.
Jsan 11 00028 g005
Figure 6. EV’s authentication computational comparison among different protocols.
Figure 6. EV’s authentication computational comparison among different protocols.
Jsan 11 00028 g006
Table 1. Notations.
Table 1. Notations.
NotationsMeaning
EVElectric vehicle
E V D / E V S Demander/Supplier electric vehicle
EAGEnergy aggregator
OPElectricity operator
E p Elliptic curve (EC) over a finite field, where p is a large prime number
GBase point in E p with order n
i d E V , i d E A G Real identity of EV/EAG
k x ,   R x EC key pair for entity x
S x Private-key-construction data of entity x
C e r t x Certificates of entity x
S i g x ( y )Signing a message y with entity x ’s private key
P K x   ( y ) Encrypting a message y with entity x ’s public key
A x Authenticator of entity x
A H x Hash of authenticator of entity x
T x Time stamp generated by x
TLTime life
e Hash of certificate
P K x ,   P R x Public key/Private key for entity x
RK, RK’Registration key between EV and OP/EAG and OP
A i d i i th Anonymous identity of EV issued by OP
A i d N o Counter of A i d i , incremented by EV
N x Nonce generated by x
A T E V E A G An authorization token, issued by EAG to EV
K E V E A G Symmetric master key shared between EV and EAG
I K E V E A G Symmetric initial key shared between EV and EAG
T K E V E A G Symmetric temporary key shared between EV and EAG
S K E V E A G Symmetric session key shared between EV and EAG
H ( . ) One-way hash function
( y , x ) Concatenation operation
Table 2. Security feature comparison of proposed protocols and other related works.
Table 2. Security feature comparison of proposed protocols and other related works.
Feature/ApproachSadiq et al. [8]Sun et al. [27]Roberts et al. [32]Aitzhan and Svetinovic [33]Kang et al. [34]Chaudhary et al. [35]Yahaya et al. [36]Li and Hu [37]Long et al. [38]Javed et al. [39]Cui et al. [44]Proposed
202120202017201620172019202020192020202120202022
Mutual Authentication××
Forward security×××××××××
Anonymity×××××
Resist replay attack×
Resist impersonation attack××
Resist MITM attack×××××
Un-linkability××××××
Traceability×××
Effective Re-authentication×××××××××××
Revocation method×××××××××××
Joint key control×××××××××××
Non-Repudation××
Number of Messages (EV)215223111212
Table 3. Operation’s Timing [54,55].
Table 3. Operation’s Timing [54,55].
Notation/
Operation
T e n c e c c /
Elliptic-Curve
Encryption
T h / Hash T s y m /
Symmetric
T s m /
Scalar
Multiplication
T m e / Modular
Exponentiation
Time (ms)0.430.00230.00462.2263.85
Table 4. Computational-cost comparison.
Table 4. Computational-cost comparison.
Approach/Efficiency FeatureComputational Cost of EV
Authentication PhaseRe-Authentication Phase
Roberts et al. ‘s scheme [32] T m e + 3 T h 3.8569   ms T m e + 3 T h 3.8569   ms
Proposed scheme T e n c e c c + 5 T h + 4 T s y m + 2 T s m   1.3439   ms T e n c e c c + 4 T h + 4 T s y m   0.4576   ms
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Almuhaideb, A.M.; Algothami, S.S. Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV. J. Sens. Actuator Netw. 2022, 11, 28. https://0-doi-org.brum.beds.ac.uk/10.3390/jsan11020028

AMA Style

Almuhaideb AM, Algothami SS. Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV. Journal of Sensor and Actuator Networks. 2022; 11(2):28. https://0-doi-org.brum.beds.ac.uk/10.3390/jsan11020028

Chicago/Turabian Style

Almuhaideb, Abdullah M., and Sammar S. Algothami. 2022. "Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV" Journal of Sensor and Actuator Networks 11, no. 2: 28. https://0-doi-org.brum.beds.ac.uk/10.3390/jsan11020028

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop