Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel
{"title":"P3AKA: A PUF based privacy preserving authentication and key agreement framework for secure communication in vehicle to grid network","authors":"Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel","doi":"10.1016/j.vehcom.2025.100925","DOIUrl":null,"url":null,"abstract":"<div><div>A traditional power grid integrates a Smart Grid (SG) technology to reduce greenhouse gases and increase the efficiency of energy transition. The Vehicle to Grid (V2G) is raised and combined with the SG network to fulfill these objectives of the SG technology. The two-way power flow in the V2G technology allows an Electrical Vehicle (EV) to charge its battery and discharge surplus energy back to the power grid through the Charging Stations (CSs). During the energy transfer, an EV shares identity, location, and charging preferences with the CS through an insecure channel. It raises significant security and privacy vulnerabilities for the V2G network. In addition, the EV and CS are situated in an exposed location that may increase the risk of physical attack. Hence, there is a need to preserve the security and privacy of the EV and CS in the V2G network. Moreover, a lightweight security solution is necessary for the resource constrained CS and EV in the V2G network. Several authentication and key agreement protocols were suggested in the literature to overcome the security challenges in the V2G network. However, the existing approaches fail to maintain the session key secrecy and preserve from the physical attack. Thus, we propose a Physically Unclonable Function (PUF) based Privacy Preserving Authentication and Key Agreement (P3AKA) framework for the V2G network using lightweight cryptographic operations. PUF protects the CS and EV from the physical attack and other lightweight cryptographic functions safeguard the network from other security attacks. Security analysis of the proposed P3AKA framework represents that it protects the V2G network from potential security threats such as impersonation, replay, Man-in-The-Middle (MiTM), physical, and machine learning attacks. Further, it ensures user anonymity and non-traceability of the EV user. The formal security verification uses the ROR model and Scyther tool to verify the proposed P3AKA framework. It illustrates that the P3AKA framework successfully provides bidirectional authentication and session key secrecy in the V2G network. In addition, the performance analysis illustrates that the proposed P3AKA framework improves security with competitive overheads compared to existing relevant schemes.</div></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"54 ","pages":"Article 100925"},"PeriodicalIF":5.8000,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Vehicular Communications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S221420962500052X","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
A traditional power grid integrates a Smart Grid (SG) technology to reduce greenhouse gases and increase the efficiency of energy transition. The Vehicle to Grid (V2G) is raised and combined with the SG network to fulfill these objectives of the SG technology. The two-way power flow in the V2G technology allows an Electrical Vehicle (EV) to charge its battery and discharge surplus energy back to the power grid through the Charging Stations (CSs). During the energy transfer, an EV shares identity, location, and charging preferences with the CS through an insecure channel. It raises significant security and privacy vulnerabilities for the V2G network. In addition, the EV and CS are situated in an exposed location that may increase the risk of physical attack. Hence, there is a need to preserve the security and privacy of the EV and CS in the V2G network. Moreover, a lightweight security solution is necessary for the resource constrained CS and EV in the V2G network. Several authentication and key agreement protocols were suggested in the literature to overcome the security challenges in the V2G network. However, the existing approaches fail to maintain the session key secrecy and preserve from the physical attack. Thus, we propose a Physically Unclonable Function (PUF) based Privacy Preserving Authentication and Key Agreement (P3AKA) framework for the V2G network using lightweight cryptographic operations. PUF protects the CS and EV from the physical attack and other lightweight cryptographic functions safeguard the network from other security attacks. Security analysis of the proposed P3AKA framework represents that it protects the V2G network from potential security threats such as impersonation, replay, Man-in-The-Middle (MiTM), physical, and machine learning attacks. Further, it ensures user anonymity and non-traceability of the EV user. The formal security verification uses the ROR model and Scyther tool to verify the proposed P3AKA framework. It illustrates that the P3AKA framework successfully provides bidirectional authentication and session key secrecy in the V2G network. In addition, the performance analysis illustrates that the proposed P3AKA framework improves security with competitive overheads compared to existing relevant schemes.
期刊介绍:
Vehicular communications is a growing area of communications between vehicles and including roadside communication infrastructure. Advances in wireless communications are making possible sharing of information through real time communications between vehicles and infrastructure. This has led to applications to increase safety of vehicles and communication between passengers and the Internet. Standardization efforts on vehicular communication are also underway to make vehicular transportation safer, greener and easier.
The aim of the journal is to publish high quality peer–reviewed papers in the area of vehicular communications. The scope encompasses all types of communications involving vehicles, including vehicle–to–vehicle and vehicle–to–infrastructure. The scope includes (but not limited to) the following topics related to vehicular communications:
Vehicle to vehicle and vehicle to infrastructure communications
Channel modelling, modulating and coding
Congestion Control and scalability issues
Protocol design, testing and verification
Routing in vehicular networks
Security issues and countermeasures
Deployment and field testing
Reducing energy consumption and enhancing safety of vehicles
Wireless in–car networks
Data collection and dissemination methods
Mobility and handover issues
Safety and driver assistance applications
UAV
Underwater communications
Autonomous cooperative driving
Social networks
Internet of vehicles
Standardization of protocols.