Efficient Scheme for Secure and Privacy-Preserving Electric Vehicle - - PowerPoint PPT Presentation

efficient scheme for secure and privacy preserving
SMART_READER_LITE
LIVE PREVIEW

Efficient Scheme for Secure and Privacy-Preserving Electric Vehicle - - PowerPoint PPT Presentation

Efficient Scheme for Secure and Privacy-Preserving Electric Vehicle Dynamic Charging System IEEE ICC 2017 Paris, France May 21 - 25, 2017 Presenter: Outline I ntroduction Proposed Scheme Evaluations Conclusion W hat is EV


slide-1
SLIDE 1

Efficient Scheme for Secure and Privacy-Preserving Electric Vehicle Dynamic Charging System

IEEE ICC 2017 Paris, France May 21 - 25, 2017 Presenter:

slide-2
SLIDE 2

Outline

  • I ntroduction
  • Proposed Scheme
  • Evaluations
  • Conclusion
slide-3
SLIDE 3

W hat is EV Dynam ic Charging?

  • The dynamic charging technology will enable Electric Vehicles (EVs) to

charge their batteries while moving.

  • Charging pads are placed on the roads to charge the EVs through the

magnetic induction.

  • Dynamic charging can can help the EVs that drive for long distances.

1

charging pads

slide-4
SLIDE 4

Challenges:

  • Security

 Authentication and secure payment

  • Privacy

 No entity should know the location of the drivers

  • Efficiency  Cost-effective pads have limited computational power
  • Scalability  Large number of EVs and Pads.
  • Short contact tim e between the EVs and pads

Problem Form ulation

2

To propose a scheme which can address all these challenges.

Our Objective

  • The dynamic charging system should communicate with the EVs to only

charge authorized vehicles and ensure payment integrity.

slide-5
SLIDE 5

Outline

  • Introduction
  • Proposed Schem e
  • Evaluations
  • Conclusion
slide-6
SLIDE 6

Netw ork Model

3

slide-7
SLIDE 7

Exchanged Messages

4

slide-8
SLIDE 8

1 . Anonym ous Coin Purchase

5

IDi  identity of the User TS  Time stamp be (gx)  blinded coin PBS(be (gx), date)  Partial Blind Signature on coin gx, date, sigB(gx, date)  Un-blinded Anonymous Coin

slide-9
SLIDE 9

2 . Charging Request and paym ent

gx gy, Ek(gy, gx), 𝜏C Ek(gy, gx, date, SigB(gx, date)) Ek1(gx, date, SigB(gx, date)) Valid/Invalid Coin Ek(Seed token)

EVi CSP Bank

6

Steps 1 -3 : Key Establishment and Authentication Steps 4 -5 : Coin Verification Step 6 : Sending Token

slide-10
SLIDE 10

3 . Efficient Hierarchical Authentication

7

  • EV should authenticate itself first to the CSP and then to RSU and

then to charging pads.

  • In each level, the EV uses the secrets obtained from the previous

level.

slide-11
SLIDE 11

1 . Efficient Key Generation and Distribution:

𝜷1,1 𝜷1,2 𝜷1,nr-1 𝜷1,nr

H( )

𝜷n,nr

RSU2 EV1 Hk( ) RSU1

H( )

RSUnr

𝜷2,1 𝜷2,2 𝜷2,nr-1 𝜷2,nr

H( )

EV2

H( )

𝜷n-1,1 𝜷n-1,2 𝜷n-1,nr-1 𝜷n-1,nr

EVn-1

Hk( )

𝜷n,1 𝜷n,2 𝜷n,nr-1

H( )

EVn

H( ) H( )

𝜸n,nr 𝜸1,2 𝜸1,nr-1 𝜸1,nr

H( )

RSU2 EV1 Hk( ) RSU1

H( )

RSUnr

𝜸2,1 𝜸2,2 𝜸2,nr-1 𝜸2,nr

H( )

EV2

H( )

𝜸n-1,1 𝜸n-1,2 𝜸n-1,nr-1 𝜸n-1,nr

EVn-1

𝜸n,1 𝜸n,2 𝜸n,nr-1

H( )

EVn

H( ) H( )

𝜸1,1

Hk( ) Hk( )

H( )

Token Generation matrix-1 b/w CSP & RSUs Token Generation matrix-2 b/w CSP & RSUs

8

  • CSP shares a group secret key with all RSUs.
  • This key is used to distribute the seeds 𝛽n,nr and β1,1

for generating two token matrices.

slide-12
SLIDE 12

𝜸1,j 𝜷1,j

𝜷1,j ⊕ 𝜸1,j 𝜸2,j 𝜷2,j 𝜷2,j ⊕ 𝜸2,j 𝜸n-1,j 𝜷n-1,j 𝜷n-1,j ⊕ 𝜸n-1,j 𝜸n,j 𝜷n,j 𝜷n,j ⊕ 𝜸n,j

9

Calculation of shared keys by RSUs:

  • After computing its two sets of tokens, each RSU should compute the

shared keys with the CSP by XORing corresponding two elements in the columns.

slide-13
SLIDE 13

10

Calculation of shared keys betw een EV and RSU by an EV:

  • When an EV authenticates itself to the CSP, it received two seed tokens

(βi,1 and 𝛽i,nr) in the last step of charging request.

  • EV uses 𝛽i,nr as seed for one hash chain

βi,1 as seed for another hash chain

  • XORing corresponding two elements in two hash chains will give the

shared keys.

slide-14
SLIDE 14

i,10

H( )

i,5 i,6 i,10

H( )

i,5 i,6 i,7

H( )

i,6

H( )

Partial Charging:

11

  • One coin can be enough to charge from a certain number of pads.
  • Our scheme can be used to limit the number of RSUs’ pads an EV can

charge from by limiting the number of keys the EV can calculate.

slide-15
SLIDE 15

2 . Authentication at RSU and CP

EVi RSUj Challenge: ri Ack: H (αi,j ⊕ βi,j || ri || 1) Response: H (αi,j ⊕ βi,j || ri)

12

  • Challenge/response authentication to prove the knowledge of secret

keys.

  • If the EV is authenticated by RSU, it sends a token to EV which will

be used to compute the shared keys with the pads.

  • We use the same idea to authenticate EV at RSUs’ charging pads.
slide-16
SLIDE 16

Outline

  • Introduction
  • Proposed Scheme
  • Evaluations
  • Conclusion
slide-17
SLIDE 17
  • In order to evaluate the computation overhead, we used Crypto++

5.6.2 library to measure the computation time of the cryptographic

  • perations used in our scheme.
  • In our measurements, we used a 900MHz speed processor.

Entities Storage Overhead Computation Overhead E.V (nr 20) + (np 20) bytes 0.167 𝝂sec + 0.125 𝝂sec Charging Pads n 20 bytes (n -1) (np -1) 0.0418𝝂sec + 0.0418 𝝂sec RSU n 20 bytes 2 (n -1) (nr -1) 0.0418𝝂sec + 0.23 𝝂sec + 0.0418 𝝂sec CSP 2 n 20 bytes 2 (n -1) (nr -1) 0.0418𝝂sec + 0.23 𝝂sec

13

Evaluations

slide-18
SLIDE 18

Outline

  • Introduction
  • Proposed Scheme
  • Evaluations
  • Conclusion
slide-19
SLIDE 19
  • In this paper, we have proposed an efficient secure and privacy

preserving scheme for Dynamic Charging System.

  • Proposed scheme can secure the prepaid payment while offering full

anonymity to EV drivers.

  • Proposed an efficient technique to compute and share a large number
  • f secret keys.
  • Developed an efficient hierarchical authentication scheme that uses

efficient cryptosystems like hashing and Exclusive-OR operations.

  • Our measurements have demonstrated that the proposed scheme is

efficient and scalable.

14

slide-20
SLIDE 20

Questions