CN103873473B - Method for authenticating anonymity groups of power-driven automobiles by charging station - Google Patents

Method for authenticating anonymity groups of power-driven automobiles by charging station Download PDF

Info

Publication number
CN103873473B
CN103873473B CN201410102335.4A CN201410102335A CN103873473B CN 103873473 B CN103873473 B CN 103873473B CN 201410102335 A CN201410102335 A CN 201410102335A CN 103873473 B CN103873473 B CN 103873473B
Authority
CN
China
Prior art keywords
electric automobile
charging station
locally aggregated
polymerizer
aggregated device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410102335.4A
Other languages
Chinese (zh)
Other versions
CN103873473A (en
Inventor
陈杰
张跃宇
时俊萍
乔巧梅
李琪
王晓辉
刘珺峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201410102335.4A priority Critical patent/CN103873473B/en
Publication of CN103873473A publication Critical patent/CN103873473A/en
Application granted granted Critical
Publication of CN103873473B publication Critical patent/CN103873473B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/16Information or communication technologies improving the operation of electric vehicles
    • Y02T90/167Systems integrating technologies related to power network operation and communication or information technologies for supporting the interoperability of electric or hybrid vehicles, i.e. smartgrids as interface for battery charging of electric vehicles [EV] or hybrid vehicles [HEV]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S30/00Systems supporting specific end-user applications in the sector of transportation
    • Y04S30/10Systems supporting the interoperability of electric or hybrid vehicles
    • Y04S30/14Details associated with the interoperability, e.g. vehicle recognition, authentication, identification or billing

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method for authenticating anonymity groups of power-driven automobiles by a charging station and relates to the technical field of information safety. The method for authenticating the anonymity groups of the power-driven automobiles by the charging station includes the following steps that firstly, the power-driven automobiles request to access to a power grid; secondly, a central polymerizer is used for issuing a grid-accessing license for each power-driven automobile; thirdly, the automobiles request to add to a charging station of a certain zone; fourthly, a local polymerizer is used for verifying validity of the grid-accessing licenses; fifthly, the local polymerizer is used for distributing affiliated groups and signing and issuing the licenses to the power-driven automobiles; sixthly, the power-driven automobiles request to access to the charging station; seventhly, the charging station verifies whether the power-driven automobiles are allowed to access or not; eighthly, the charging station distributes a charging socket which is practical and useable for each verified power-driven automobile; ninthly, the power-driven automobiles and the charging station carry out information and energy interaction. According to the method for authenticating the anonymity groups of the power-driven automobiles by the charging station, anonymity authenticating on the automobiles by the charging station can be achieved, a vicious user can be tracked and punished to a certain degree and the group authenticating efficiency can be improved at the same time.

Description

Charging station is to electric automobile anonymity group authentication method
Technical field
The invention belongs to communication technical field, further relate to a kind of charging station in field of information security technology To electric automobile anonymity group authentication method.The present invention can be used for electric automobile needs charging or for being electrically accessed electrical network During scene, it is achieved the charging station anonymous authentication to vehicle user, thus protect the privacy of vehicle user.
Background technology
Electric automobile accesses electrical network (V2G) and is combined with intelligent grid by electric automobile, has both solved electric automobile The charging stress problems that extensive development brings, again can be using electric automobile as movement, distributed energy storage unit Access electrical network.But electric automobile is more liquid, frequent data item exchange carries while meeting real-time management Carry out the risk that user sensitive information is revealed.Therefore charging station (the ST of V2Gi) need design anonymous group authenticating party Case, supports that the identity with little expense that is dynamically added of member is revoked simultaneously.
Binod Vaidya et al. is at article " Efficient Authentication Mechanism for PEV Charging Infrastructure”(In:Communications(ICC),2011IEEE International Conference on) in propose a kind of comprehensive dispersion authentication method for charging electric vehicle.The method The step that is embodied as be: first, initialize, the server of charging station obtains a certificate from registration body; Second, user registers, user UDiBy oneself identity and log in password and issue registration body, registration body counts Calculate suitable parameter, by these parameter read-ins to smart card, and this smart card is issued user UDi.3rd, Authentication phase, as user UDiWhen wanting to access charger, user UDiMust be by the identity of oneself and logging in Password Input smart card, smart card authentication logs in whether password is set up, if being false refusal log on request, otherwise, Smart card generates a certificate, and this certificate is issued the server of charging station.Server authentication certificate legal Property.4th, if user is UDiRenewal is wanted to log in password, it is necessary to carry out password replacement.5th, work as user The when that effectively registration being expired, need to update all parameters.Although the method has is mutually authenticated function, and And protect the privacy of identities of user.But, the weak point that the method yet suffers from is: when there being malicious user When upsetting electrical network order, it is impossible to the identity of verification malicious user, thus malicious user can not be punished.
Huei-Ru Tseng et al. is at article " A Secure and Privacy-Preserving Communication Protocol for V2G Networks”(In:Communitations,2012 IEEE Wireless Communications and Networking Conference) in propose electric automobile add electrical network A kind of communication means safe, that there is secret protection in (Vehical-to-Grid, V2G).The method Being embodied as step is: first, cipher key center initialize systematic parameter, for electric automobile, locally aggregated device and Central authorities' polymerizer distributes public and private key.Second, electric automobile is before adding electric automobile and the network of electrical network composition Must register to central authorities' polymerizer, the identity of oneself and the parameter of generation are issued central authorities' polymerization by electric automobile Device, after central authorities' polymerizer checking identity is legal, generates a certificate, and this certificate is issued electric automobile.The Three, when electric automobile accesses electric automobile addition electrical network (Vehical-to-Grid, V2G) when, electronic vapour Locally aggregated device, the legitimacy of locally aggregated device checking certificate is issued together with certificate in assumed name by car.4th, really After determining the legitimacy of certificate, the status information of oneself is issued locally aggregated device by electric automobile, and locally aggregated device is again The all of information fusion that will receive, and polymerization result is issued central authorities' polymerizer.The method uses assumed name to realize Secret protection to user identity.Assumed name is generated and is distributed to different user by central authorities' polymerizer, central authorities Polymerizer needs to store these assumed names.Electric automobile is required for when adding V2G network using different assumed name every time, And customer volume is the biggest.Bring the management of assumed name and the problem of maintenance thus to central authorities' polymerizer.
Patent that State Grid Corporation of China applies at it " secure data exchange method at electric automobile and charging and conversion electric station and System " (the applying date: on October 15th, 2010, application number: 201010508362.3, publication number: CN The method for interchanging data of a kind of electric automobile and charging and conversion electric station safety is proposed in 102045340A).The method Implementation be: first, electric automobile sends the digitally signed integrity information of self to charging and conversion electric station, And obtain the integrity information of the other side to submit safety information management center to;Second, charging and conversion electric station is to safety information Administrative center submits the integrity information that electric automobile sends to, and submits to digitally signed complete to electric automobile Property information;3rd, integrity information is authenticated by safety information management center, and feeds back authentication result;The Four, when authentication result all meets, set up between electric automobile with charging and conversion electric station and be connected, carry out data exchange.This is special Although profit application is by appliance integrality Information Authentication, it is achieved that to electric automobile and charging and conversion electric station equipment state Security verification.But, the method yet suffers from weak point and is: the legitimacy for user identity is not entered , when there is malicious user in row certification, it is impossible to is tracked malicious user.
Summary of the invention
It is an object of the invention to overcome the deficiency of above-mentioned prior art, add electrical network for electric automobile and propose A kind of charging station is to electric automobile anonymity group authentication method.Present invention achieves charging station electric automobile is hidden Name certification, can be tracked malicious user simultaneously, and give certain punishment, improve electrical network well The stability of system.
For achieving the above object, the present invention specifically comprises the following steps that
1. charging station is to electric automobile anonymity group authentication method, comprises the following steps:
(1) request access electrical network:
(1a) user is by the true identity of user and the true identity of plan networking electric automobile licence plate, sends respectively Registering to central authorities' polymerizer, central authorities' polymerizer is that identity card issued by the electric automobile intending networking, and by identity Card recorded in the data base of central authorities' polymerizer;
(1b) networking solicited message is issued central authorities' polymerizer by the electric automobile intending networking, and request accesses charging station;
(2) issue licenses book:
Central authorities' polymerizer searches whether its data base stores the electric automobile identity card that this plan networks, if storage, but Not yet issue network access license book, then central authorities' polymerizer utilizes oneself private key by the identity of electric automobile and PKI Carry out signature and generate network access license book, this license passport is presented to the electric automobile that this plan networks;If no Storage, then perform step (1);
(3) request addition region:
Electric automobile, by intending adding the solicited message in region, is sent to locally aggregated device;
(4) checking certificate is the most legal:
(4a) locally aggregated device utilizes central authorities' polymerizer PKI, and checking network access license book is the most legal, if entering Net license passport is illegal, then perform step (1);Otherwise, step (4b) is performed;
(4b) checking of locally aggregated device receives the time of network access license book whether in the range of expiration date, if Exceed expiration date, then performed step (1), otherwise perform step (5);
(5) swarm parameter grant a certificate are set up:
(5a) electric automobile is allowed the message adding charging station place group to be sent to electronic vapour by locally aggregated device Car;
(5b) electric automobile is according to numbering generation method, generates an electric automobile numbering, and by this electronic vapour Car numbering issues locally aggregated device;
(5c) locally aggregated device receives after the electric automobile numbering that electric automobile is sent, and checks current data Whether the log in storehouse comprising this electric automobile numbering, if comprising, then performing step (5b);Otherwise, give Electric automobile distributes a charge position and corresponding charge position identifier;
(5d) related news of affiliated group and the signing certificate of access charging station are issued electronic vapour by locally aggregated device Car;
(5e) electric automobile is according to the following formula, generation group members certificate:
C=(I, X, num, σ)
Wherein, C represents group members certificate, and I represents charging electric vehicle location identifier, and X represents electronic vapour The numbering of car, num represents the path code of electric automobile, and σ represents that locally aggregated device structural defence type is signed System private key the numbering of electric automobile and the path code of electric automobile are carried out structural defence type signature;
(6) request access charging station:
Electric automobile, by intending accessing the request message of charging station, is sent to charging station;
(7) verify whether to allow electric automobile to access:
(7a) the charging station PKI of locally aggregated device, the legitimacy of checking electric automobile signing certificate, if signing Name certificate is illegal, then perform step (5), otherwise perform step (7b);
(7b) charging station checking receives the time of signing certificate whether in the expiration date of signing certificate, if super Cross expiration date, then perform step (5), otherwise perform step (8);
(8) charging station distributes, to electric automobile, the charging socket that a reality is available;
(9) information and the energy are mutual:
(9a) carry out key agreement with charging station after electric automobile accesses charging station, negotiate a session key;
(9b) electric automobile is respectively by subset division method and vector promise method, it was demonstrated that oneself be legal Group members;
(9c) group's private key used for electric vehicle, signs to the solicitation message of oneself, and signature result is sent To charging station;
(9d) charging station receives after the message that electric automobile is sent, and verifies signature with group's PKI, if Be verified, then charging station carries out the energy and information according to application and electrical network demand, charging station and electric automobile Alternately;Otherwise, step (9e) is performed;
(9e) the group ranking message that electric automobile is sent by charging station issues locally aggregated device;
(9f) locally aggregated device receives after the signature information that charging station is sent, according to group members method for tracing, The electric automobile sending error message is tracked.
The present invention compared with prior art has the advantage that
First, due to the present invention electric automobile and charging station carry out information mutual time, have employed revocable group members label Name, overcomes the shortcoming to malicious user untraceable that prior art exists so that malicious user is realized by the present invention Traceable, it is possible to malicious user is punished, to improve the stability of network system.
Second, due to the present invention electric automobile to charging station anonymous attestation identity legitimacy time, use subset division side Method and vector promise method, overcome and realize the management of anonymous authentication existence with assumed name in prior art and safeguard complexity High shortcoming so that present invention achieves management and the simplification safeguarded.
3rd, owing to the present invention is when group members certificate is formed, have employed structural defence type signature, overcome existing skill The shortcoming being continuously updated group members certificate is needed so that present invention achieves more when art updates member's status list Need not during newcomer's status list update group members certificate, reduce computing cost, improve group's authentication efficiency.
Accompanying drawing explanation
Fig. 1 is flow chart of the present invention;
Fig. 2 is central authorities of the present invention polymerizer, locally aggregated device, the relation of charging station and functional schematic.
Detailed description of the invention
The present invention will be further described below in conjunction with the accompanying drawings.
Referring to the drawings 2, the central polymerizer that the present invention relates to, locally aggregated device, charging station relation with Function is as follows:
Central authorities' polymerizer is that electric automobile adds the process of highest level in electrical network (Vehical-to-Grid, V2G) Device, calculates due to central authorities' polymerizer and storage capacity is very strong, and therefore, it is mainly responsible for the networking note of electric automobile Volume, issues network access license book for intending adding the electric automobile of electrical network, and preserves the detailed of all registered users Thin identity information, comprises multiple locally aggregated device.
Locally aggregated device is the processor of central authorities' polymerizer next stage, owing to locally aggregated device calculates and storage capacity More weak than central polymerizer, so, it is mainly responsible for group belonging to electric automobile distribution, grant a certificate.
Charging station is the next stage of locally aggregated device, accesses the interface of electrical network as electric automobile.Electric automobile and Carry out information between charging station and the energy is mutual, and charging station and locally aggregated device maintain revocable row jointly Table.
Referring to the drawings 1, the present invention to realize step as follows.
Step 1, request accesses electrical network.
User, by the true identity of user and the true identity of plan networking electric automobile licence plate, is sent respectively to central authorities Polymerizer is registered, and central authorities' polymerizer is that identity card issued by the electric automobile intending networking, and by identity card record In the data base of central authorities' polymerizer.
Networking solicited message is issued central authorities' polymerizer by the electric automobile intending networking, and this solicited message is by electronic vapour The identity card of the car result of the public key encryption of central authorities' polymerizer.
Step 2, issue licenses book.
After central authorities' polymerizer receives solicited message, decipher with its private key, obtain the identity card of electric automobile.Then, Central authorities' polymerizer searches whether its data base stores the electric automobile identity card that this plan networks, if storage, but not yet Issue network access license book, then central authorities' polymerizer utilizes the private key of oneself identity and the PKI of electric automobile to be carried out Signature obtains network access license book, and this license passport is presented to the electric automobile that this plan networks;If not storage, Then perform step 1.
Step 3, request adds region.
Electric automobile, by intending adding the solicited message in region, is sent to locally aggregated device, and this solicited message is by electricity The charging added wanted by the identity of electrical automobile, the PKI of electric automobile, central authorities' identity of polymerizer, electric automobile Stand, central authorities' polymerizer is encrypted to the network access license book PKI of locally aggregated device that electric automobile is issued Result.
Step 4, checking certificate is the most legal.
The first step, locally aggregated device utilizes central authorities' polymerizer PKI, in accordance with the following steps, verifies network access license Book is the most legal, if network access license book is illegal, then performs step 1;Otherwise, the first of step 4 is performed Step.
After locally aggregated device receives the request message that electric automobile is sent, deciphering with the private key of locally aggregated device should Request message, obtains the identity of electric automobile, the PKI of electric automobile, the central authorities identity of polymerizer, electronic vapour The network access license book that the charging station added, central authorities' polymerizer are issued wanted to electric automobile by car.
Locally aggregated device, according to the identity of central authorities' polymerizer, is searched list of public keys, is obtained the public affairs of this central authorities' polymerizer Key.
Locally aggregated device utilizes the PKI of central authorities' polymerizer, and whether the signature of checking central authorities polymerizer is set up, if becoming Vertical, then explanation network access license book is legal;Otherwise, illustrate that network access license book is illegal.
Second step, the checking of locally aggregated device receives the time of network access license book whether in the range of expiration date, If having exceeded expiration date, then perform step 1, otherwise perform step 5.
Step 5, sets up swarm parameter grant a certificate.
The first step, locally aggregated device according to electric automobile want add charging station, for its distribution belonging to group, and The related news of affiliated group are sent to electric automobile.
Second step, electric automobile according to the following formula, calculates an electric automobile numbering, and is compiled by this electric automobile Number issue locally aggregated device:
X=gx
Wherein, X represents the numbering of electric automobile, and x represents group's private key of electric automobile, and g represents crowd G's Generate unit.
3rd step, locally aggregated device receives after the electric automobile numbering that electric automobile is sent, checks current number According to whether the log in storehouse comprises this electric automobile numbering, if comprising, then perform the second step of step 5; If not comprising, then distribute a charge position and corresponding charge position identifier to electric automobile, and at its number According to storehouse is recorded this numbering.
4th step, locally aggregated device carries out signature with the private key of oneself obtain electricity to numbering and the PKI of electric automobile Electrical automobile accesses the signing certificate of charging station, and this signing certificate is issued electric automobile, and this signing certificate is effective Phase is shorter, generally one day.
5th step, electric automobile according to the following formula, obtains group members certificate:
C=(I, X, num, σ)
Wherein, C represents group members certificate, and I represents charging electric vehicle location identifier, and X represents electronic vapour The numbering of car, num represents the path code of electric automobile, and σ represents that locally aggregated device structural defence type is signed System private key the numbering of electric automobile and the path code of electric automobile are carried out structural defence type signature.
Step 6, request accesses charging station.
Electric automobile, by intending accessing the request message of charging station, is sent to charging station, and this request message is by electronic The numbering of automobile, the PKI of electric automobile, the identity of locally aggregated device, locally aggregated device are issued to electric automobile The result that is encrypted of the private key of grant a certificate charging station.
Step 7, verifies whether to allow electric automobile to access.
The first step, the charging station PKI of locally aggregated device, in accordance with the following steps, checking electric automobile signature card The legitimacy of book, if signing certificate is illegal, then performs step 5, otherwise performs the second step of step 7.
After charging station receives the request message that electric automobile is sent, decipher this request with the private key of charging station and disappear Breath, obtain the numbering of electric automobile, the PKI of electric automobile, the identity of locally aggregated device, locally aggregated device to The signing certificate that electric automobile is issued.
Charging station, according to the identity of locally aggregated device, is searched list of public keys, is obtained the PKI of this locally aggregated device.
Charging station utilizes the PKI of locally aggregated device, verifies whether the signature of locally aggregated device is set up, if setting up, Then explanation signing certificate is legal;Otherwise, illustrate that signing certificate is illegal.
Second step, charging station checking receives the time of signing certificate whether in the expiration date of signing certificate, if Exceed expiration date, then perform step 5, otherwise perform step 8.
Step 8, distributes charging socket.
Charging station distributes, to electric automobile, the charging socket that a reality is available.
Step 9, information and the energy are mutual.
The first step, electric automobile carries out key agreement with charging station after accessing charging station, negotiates a session close Key.
Second step, is respectively adopted subset division method and vector promise method, and electric automobile is to charging station anonymously Prove it oneself is legal group members.
3rd step, group's private key used for electric vehicle, the charging solicitation message of oneself is signed, and signature is tied Fruit is sent to charging station, and endorsement method used herein is voidable group ranking.
4th step, charging station receives after the message that electric automobile is sent, verifies signature with group's PKI, If being verified, then charging station carries out the energy and information according to application and electrical network demand, charging station and electric automobile Mutual;Otherwise, the 5th step of step 9 is performed.
5th step, the group ranking message that electric automobile is sent by charging station issues locally aggregated device.
6th step, locally aggregated device receives after the signature information that charging station is sent, and uses group members tracking side Method, in accordance with the following steps, is tracked the electric automobile sending error message, and gives certain punishment.
Locally aggregated device utilizes private key, obtains an electric automobile numbering.
The relevant information record of the electric automobile having this numbering is consulted in the data base of locally aggregated device, should The relevant information of the electric automobile of numbering is sent to central authorities' polymerizer.
The electric automobile relevant information that central authorities' polymerizer sends according to the locally aggregated device received, in data base Find the true identity of electric automobile, and give certain punishment.

Claims (7)

1. charging station is to electric automobile anonymity group authentication method, comprises the following steps:
(1) request access electrical network:
(1a) user is by the true identity of user and the true identity of plan networking electric automobile licence plate, it is sent respectively to central authorities' polymerizer register, central authorities' polymerizer is that identity card issued by the electric automobile intending networking, and be recorded by identity card in the data base of central authorities' polymerizer;
(1b) networking solicited message is issued central authorities' polymerizer by the electric automobile intending networking, and request accesses charging station;
(2) issue licenses book:
Central authorities' polymerizer searches whether its data base stores the electric automobile identity card that this plan networks, if storage, but not yet issue network access license book, then central authorities' polymerizer utilizes the private key of oneself identity and the PKI of electric automobile to be carried out signature and generate network access license book, and this license passport is presented to the electric automobile that this plan networks;If storage, then do not perform step (1);
(3) request addition region:
Electric automobile, by intending adding the solicited message in region, is sent to locally aggregated device;
(4) checking certificate is the most legal:
(4a) locally aggregated device utilizes central authorities' polymerizer PKI, and checking network access license book is the most legal, if network access license book is illegal, then performs step (1);Otherwise, step (4b) is performed;
(4b) checking of locally aggregated device receives the time of network access license book whether in the range of expiration date, if having exceeded expiration date, then performing step (1), otherwise performing step (5);
(5) swarm parameter grant a certificate are set up:
(5a) electric automobile is allowed the message adding charging station place group to be sent to electric automobile by locally aggregated device;
(5b) electric automobile is according to numbering generation method, generates an electric automobile numbering, and this electric automobile numbering is issued locally aggregated device;
(5c) locally aggregated device receives after the electric automobile numbering that electric automobile is sent, and checks and whether comprises this electric automobile numbering in the log in current database, if comprising, then perform step (5b);Otherwise, a charge position and corresponding charge position identifier are distributed to electric automobile;
(5d) related news of affiliated group and the signing certificate of access charging station are issued electric automobile by locally aggregated device;
(5e) electric automobile is according to the following formula, generation group members certificate:
C=(I, X, num, σ)
Wherein, C represents group members certificate; I represents charging electric vehicle location identifier; X represents the numbering of electric automobile; num represents the path code of electric automobile, and σ represents the structural defence type signature that the numbering of electric automobile and the path code of electric automobile are carried out by the system private key that locally aggregated device structural defence type is signed;
(6) request access charging station:
Electric automobile, by intending accessing the request message of charging station, is sent to charging station;
(7) verify whether to allow electric automobile to access:
(7a) the charging station PKI of locally aggregated device, the legitimacy of checking electric automobile signing certificate, if signing certificate is illegal, then perform step (5), otherwise perform step (7b);
(7b) charging station checking receives the time of signing certificate whether in the expiration date of signing certificate, if exceeding expiration date, then performing step (5), otherwise performing step (8);
(8) charging station distributes, to electric automobile, the charging socket that a reality is available;
(9) information and the energy are mutual:
(9a) carry out key agreement with charging station after electric automobile accesses charging station, negotiate a session key;
(9b) electric automobile is respectively by subset division method and vector promise method, it was demonstrated that oneself be legal group members;
(9c) group's private key used for electric vehicle, signs to the solicitation message of oneself, and signature result is sent to charging station;
(9d) charging station receives after the message that electric automobile is sent, and verifies signature with group's PKI, if being verified, then charging station carries out the mutual of the energy and information according to application and electrical network demand, charging station and electric automobile;Otherwise, step (9e) is performed;
(9e) the group ranking message that electric automobile is sent by charging station issues locally aggregated device;
(9f) locally aggregated device receives after the signature information that charging station is sent, and according to group members method for tracing, is tracked the electric automobile sending error message.
Charging station the most according to claim 1 is to electric automobile anonymity group authentication method, it is characterised in that the checking network access license book described in step (4a) is the most legal, carries out as follows:
The first step, after locally aggregated device receives the request message that electric automobile is sent, this request message is deciphered with the private key of locally aggregated device, obtain the identity of electric automobile, the charging station that adds wanted by the PKI of electric automobile, the central authorities identity of polymerizer, electric automobile, the network access license book that central authorities' polymerizer is issued to electric automobile;
Second step, locally aggregated device, according to the identity of central authorities' polymerizer, is searched list of public keys, is obtained the PKI of this central authorities' polymerizer;
3rd step, locally aggregated device utilizes the PKI of central authorities' polymerizer, and whether the signature of checking central authorities polymerizer is set up, if setting up, then explanation network access license book is legal;Otherwise, illustrate that network access license is illegal.
Charging station the most according to claim 1 is to electric automobile anonymity group authentication method, it is characterised in that the numbering described in step (5b) generates method and refers to, obtains electric automobile numbering according to the following formula:
X=gx
Wherein, X represents the numbering of electric automobile, and x represents group's private key of electric automobile, and g represents the generation unit of crowd G.
Charging station the most according to claim 1 is to electric automobile anonymity group authentication method, it is characterised in that the checking signing certificate described in step (7a) is the most legal, carries out as follows:
The first step, after charging station receives the request message that electric automobile is sent, decipher this request message with the private key of charging station, obtain the numbering of electric automobile, signing certificate that the PKI of electric automobile, the identity of locally aggregated device, locally aggregated device are issued to electric automobile;
Second step, charging station, according to the identity of locally aggregated device, is searched list of public keys, is obtained the PKI of this locally aggregated device;
3rd step, charging station utilizes the PKI of locally aggregated device, verifies whether the signature of locally aggregated device is set up, if setting up, then explanation signing certificate is legal;Otherwise, illustrate that signing certificate is illegal.
Charging station the most according to claim 1 is to electric automobile anonymity group authentication method, it is characterised in that the subset division method described in step (9b), carries out as follows:
The first step, locally aggregated device will not cancelled group members and will be divided into several disjoint set;
Second step, disjoint set is encoded by locally aggregated device, is not cancelled the path code of group members.
Charging station the most according to claim 1 is to electric automobile anonymity group authentication method, it is characterised in that the vectorial promise method described in step (9b), carries out as follows:
The first step, electric automobile is to may certify that it oneself is, after the message vector of validated user makes promise, commitment value to be issued charging station;
Second step, charging station utilizes vector promise key to open promise, it is thus achieved that message vector.
Charging station the most according to claim 1 is to electric automobile anonymity group authentication method, it is characterised in that the group members method for tracing described in step (9f), carries out as follows:
The first step, locally aggregated device utilizes private key, obtains an electric automobile numbering;
Second step, consults the relevant information record of the electric automobile having this numbering in the data base of locally aggregated device, and the relevant information of the electric automobile of this numbering is sent to central authorities' polymerizer;
3rd step, the electric automobile relevant information that central authorities' polymerizer sends according to the locally aggregated device received, data base finds the true identity of electric automobile.
CN201410102335.4A 2014-03-19 2014-03-19 Method for authenticating anonymity groups of power-driven automobiles by charging station Expired - Fee Related CN103873473B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410102335.4A CN103873473B (en) 2014-03-19 2014-03-19 Method for authenticating anonymity groups of power-driven automobiles by charging station

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410102335.4A CN103873473B (en) 2014-03-19 2014-03-19 Method for authenticating anonymity groups of power-driven automobiles by charging station

Publications (2)

Publication Number Publication Date
CN103873473A CN103873473A (en) 2014-06-18
CN103873473B true CN103873473B (en) 2017-01-11

Family

ID=50911600

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410102335.4A Expired - Fee Related CN103873473B (en) 2014-03-19 2014-03-19 Method for authenticating anonymity groups of power-driven automobiles by charging station

Country Status (1)

Country Link
CN (1) CN103873473B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450623B (en) * 2014-11-26 2018-12-18 国家电网公司 A kind of access authentication method of electric car
CN104574676A (en) * 2015-01-23 2015-04-29 北京国网普瑞特高压输电技术有限公司 Electric automobile charging management method based on mobile terminal
CN109743172B (en) * 2018-12-06 2021-10-15 国网山东省电力公司电力科学研究院 Cross-domain network authentication method based on alliance block chain V2G and information data processing terminal
US11046201B2 (en) 2019-03-25 2021-06-29 Micron Technology, Inc. Electric vehicle charging station system
EP3965392A4 (en) * 2019-04-29 2022-12-28 Hyundai Motor Company Cross-certificate method and device for electric vehicle charging
CN110190958A (en) * 2019-05-30 2019-08-30 北京百度网讯科技有限公司 A kind of auth method of vehicle, device, electronic equipment and storage medium
CN110381145B (en) * 2019-07-22 2022-01-28 长沙理工大学 Interaction method and system between electric automobile and power grid
WO2021031061A1 (en) * 2019-08-19 2021-02-25 Huawei Technologies Co., Ltd. System and method for authenticating communications between a vehicle, a charging station and a charging station management server
CN110769379B (en) * 2019-10-31 2021-07-30 长安大学 Message reporting method for forward security and privacy preservation in V2G environment
CN111382460A (en) * 2020-03-26 2020-07-07 国网电子商务有限公司 Data processing method and system applied to communication of Internet of things
CN111865602B (en) * 2020-06-04 2023-04-25 北京科东电力控制系统有限责任公司 Intelligent energy service system heterogeneous terminal multiparty authentication method and system
CN112019549B (en) * 2020-08-28 2022-07-19 长沙理工大学 Electric power transaction system based on block chain, transaction method and bill query method
CN113114630B (en) * 2021-03-22 2022-04-15 重庆邮电大学 Authentication method and system for dynamic wireless charging privacy protection of electric vehicle
CN113492705B (en) * 2021-07-14 2023-01-10 福建星云电子股份有限公司 Noninductive charging method for charging pile
CN117118635B (en) * 2023-10-16 2024-02-02 南方电网科学研究院有限责任公司 Anonymous authentication method and device for electric automobile, storage medium and computer equipment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103391208A (en) * 2012-05-10 2013-11-13 北京基业达电气有限公司 Electric vehicle charging station metropolitan area network management system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102009025303A1 (en) * 2009-06-15 2010-12-16 Rwe Ag Method and device for communication between an electric vehicle and a charging station

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103391208A (en) * 2012-05-10 2013-11-13 北京基业达电气有限公司 Electric vehicle charging station metropolitan area network management system

Also Published As

Publication number Publication date
CN103873473A (en) 2014-06-18

Similar Documents

Publication Publication Date Title
CN103873473B (en) Method for authenticating anonymity groups of power-driven automobiles by charging station
Zheng et al. A traceable blockchain-based access authentication system with privacy preservation in VANETs
Shahidinejad et al. Light-edge: A lightweight authentication protocol for IoT devices in an edge-cloud environment
Garg et al. An efficient blockchain-based hierarchical authentication mechanism for energy trading in V2G environment
Liu et al. Aggregated-proofs based privacy-preserving authentication for V2G networks in the smart grid
CN109743172A (en) Based on alliance's block chain V2G network cross-domain authentication method, information data processing terminal
Zhang et al. Secure and efficient data storage and sharing scheme for blockchain‐based mobile‐edge computing
CN102946603B (en) Based on the unified identity authentication method of social characteristic in power cloud system
Kim et al. Design of secure decentralized car-sharing system using blockchain
Rasheed et al. Adaptive group-based zero knowledge proof-authentication protocol in vehicular ad hoc networks
CN109474610A (en) The identifiable key exchange method of anonymity based on smart grid
Qi et al. A privacy-preserving authentication and pseudonym revocation scheme for VANETs
CN101009919A (en) Authentication method based on the end-to-end communication of the mobile network
CN105450623B (en) A kind of access authentication method of electric car
CN113079215B (en) Block chain-based wireless security access method for power distribution Internet of things
CN103346887A (en) Low-complexity identity authentication method based on intelligent card and under multiserver environment
CN105187405A (en) Reputation-based cloud computing identity management method
CN113114630A (en) Authentication method and system for dynamic wireless charging privacy protection of electric vehicle
He et al. An accountable, privacy-preserving, and efficient authentication framework for wireless access networks
Babu et al. EV-Auth: Lightweight authentication protocol suite for dynamic charging system of electric vehicles with seamless handover
Parameswarath et al. User-empowered privacy-preserving authentication protocol for electric vehicle charging based on decentralized identity and verifiable credential
Tajmohammadi et al. LSPP: Lightweight and secure payment protocol for dynamic wireless charging of electric vehicles in vehicular cloud
CN101192927A (en) Authorization based on identity confidentiality and multiple authentication method
Ahmed et al. Signcryption based authenticated and key exchange protocol for EI-based V2G environment
CN101702807B (en) Wireless security access authentication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170111