CN111107071B - Electric vehicle charging service method capable of protecting privacy - Google Patents

Electric vehicle charging service method capable of protecting privacy Download PDF

Info

Publication number
CN111107071B
CN111107071B CN201911256494.9A CN201911256494A CN111107071B CN 111107071 B CN111107071 B CN 111107071B CN 201911256494 A CN201911256494 A CN 201911256494A CN 111107071 B CN111107071 B CN 111107071B
Authority
CN
China
Prior art keywords
rsu
key
csp
pid
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911256494.9A
Other languages
Chinese (zh)
Other versions
CN111107071A (en
Inventor
肖敏
黄艳
马仲岳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201911256494.9A priority Critical patent/CN111107071B/en
Publication of CN111107071A publication Critical patent/CN111107071A/en
Application granted granted Critical
Publication of CN111107071B publication Critical patent/CN111107071B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L53/00Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
    • B60L53/60Monitoring or controlling charging stations
    • B60L53/65Monitoring or controlling charging stations involving identification of vehicles or their battery types
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L53/00Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
    • B60L53/60Monitoring or controlling charging stations
    • B60L53/66Data transfer between charging stations and vehicles
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L53/00Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
    • B60L53/60Monitoring or controlling charging stations
    • B60L53/66Data transfer between charging stations and vehicles
    • B60L53/665Methods related to measuring, billing or payment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/70Energy storage systems for electromobility, e.g. batteries
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/7072Electromobility specific charging systems or methods for batteries, ultracapacitors, supercapacitors or double-layer capacitors
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/12Electric charging stations
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/16Information or communication technologies improving the operation of electric vehicles
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Transportation (AREA)
  • Mechanical Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an electric vehicle charging service method capable of protecting privacy, by which an electric vehicle generates a temporary token by using a key pair distributed by a charging service provider and a pseudo identity distributed by a credible center, authenticates a roadside unit by using the temporary token, sends a seed key required by charging panel authentication to the electric vehicle by passing a rear roadside unit, performs challenge response by using a one-time session key generated by the seed key to complete authentication, and provides the charging service for the electric vehicle by passing a rear charging panel after authentication. By the method disclosed by the invention, better management on the behavior of the electric automobile can be realized.

Description

Electric vehicle charging service method capable of protecting privacy
Technical Field
The invention relates to the technical field of electric automobiles, in particular to an electric automobile charging service method capable of protecting privacy.
Background
With the increasingly prominent global environmental and energy problems, the development of new energy vehicles such as electric vehicles is greatly supported and encouraged by countries in the world. The wireless charging technology is paid more and more attention with the advantages of safe operation, convenient use, low maintenance cost, good user experience and the like, and is one of the main development trends of the future electric automobile power supply technology. However, in the existing authentication method for wireless charging of the electric vehicle, because the electric vehicle directly uses the real identity for charging authentication, a malicious entity can easily obtain the real identity of the vehicle in the charging authentication and service process, and expose the driving track of the vehicle, thereby invading the privacy of the vehicle owner.
Disclosure of Invention
In order to solve the technical problems, the invention provides an electric vehicle charging service method capable of protecting privacy, which adopts the technical scheme that:
an electric vehicle charging service method capable of protecting privacy comprises the following steps:
s1: an EV (Electric Vehicle) verifies the correctness of a certificate broadcasted by an RSU (Road Side Unit) after receiving the certificate, and extracts a public key PK of the RSU from the certificate after the certificate passes the verificationRSUAnd according to the public key PKRSUCalculating a temporary session key K of the EV and the RSUEV,RSU(ii) a The local database of the EV is prestored with a set PID (proportion integration differentiation) formed by n pseudo identities which are distributed by a trusted center TA and correspond to the real identity of the EV, and a set (PPK, PSK) formed by a key pair which is distributed by a charging service provider CSP for each pseudo identity in the pseudo identity set PID and used for authenticating the charging service, wherein each key pair comprises a component PPKjAnd component PSKj,PPKjRepresenting key components independent of pseudo-identity, PSKjRepresenting a key component associated with a pseudo-identity, PID ═ PID1,PID2,…PIDn},(PPK,PSK)={(PPK1,PSK1),(PPK2,PSK2),…(PPKn,PSKn)},j={1,2…n};
S2: EV selects a pseudo-identity PID from the pseudo-identity set and the key pair set respectivelyiAnd a corresponding key pair (PPK)i,PSKi) To calculate a temporary token TOK for RSU authentication identityi,i={1,2…n}
S3: the EV sends a charging request to the RSU, wherein the charging request comprises a temporary token TOKiAnd by a temporary session key KEV,RSUEncrypted pseudo-identity information and key pair information;
s4: the RSU calculates a temporary session key K between the RSU and the EV after receiving the charging requestEV,RSUThe charging request is decrypted by the pseudo identity information and the key pair information;
s5: RSU based on received TOKiJudging whether the EV is a legal authorized user or not by the decrypted pseudo-identity information and the decrypted key pair information, if so, turning to S7, and otherwise, turning to S6;
s6: the RSU refuses the charging service;
s7: the RSU calculates a seed key alpha of a temporary session key between the EV and a CP (Charging pad), binds the calculated seed key alpha with the pseudo identity information of the EV and passes through KRSU,CPSending the encrypted seed key to the CP, binding the calculated seed key with the pseudo identity information of the EV and passing through the KEV,RSUEncrypted and sent to the corresponding EV, wherein KRSU,CPRepresenting a temporary session symmetric key negotiated in advance between the RSU and the CP;
s8: EV passage KEV,RSUDecrypting the message to obtain a seed key alpha, and generating a one-time session key alpha according to the seed keyiAnd use a one-time session key alphaiGenerating an authentication code and transmitting the authentication code to the CP;
s9: CP through KRSU,CPDecrypting the message to obtain a seed key alpha, and generating a one-time session key alpha according to the seed keyiVerifying the authentication code sent by the EV based on the one-time session key, andafter the verification is passed, providing charging service to the EV;
s10: CP totaling as PIDiThe marked EV provides the total electric energy, and sends corresponding total electric energy information to the RSU;
s11: the RSU generates PID according to the received total electric energy informationiBilling the identified EV and sending the bill to the corresponding EV;
s12: the RSU, upon receiving the EV's payment message, checks the bill and returns an acknowledgement message.
Further, before step S1, the method further includes the step of initializing the system, where the initializing the system includes the following sub-steps:
s011: the TA (Trusted Authority) generates the public parameters of the system and the public key PK of the TA according to the preset security parametersTAAnd a private key SKTA
S012: CSP (Charging Service Provider) sends its own ID to TACSPRequesting registration;
s013: TA generates CSP public key PK after confirming CSP sent identity information is legalCSPAnd a private key SKCSPAnd generates the CSP public key certificate Cert by using the TA private keyCSPAnd the system public parameter, PK, is connected through a secure channelCSP、SKCSPAnd CertCSPIs sent to the CSP and then sent to the CSP,
Figure BDA0002310412490000031
representation through SKTAFor IDCSPAnd PKCSPA signature generated after encryption;
s014: CSP generates corresponding ID for each CP in its management rangeCPThen using the private key SK of CSPCSPFor IDCPGenerating a signature SignSKCSP(IDCP) And sending the signature to a corresponding CP through a secure channel;
s015: RSU sends self identity information ID to TARSURequesting registration;
s016: the TA generates a public key PK of the RSU after confirming that the identity information sent by the RSU is legalRSUPrivate key SKRSUAnd public key certificate Cert of RSURSUAnd the system public parameter, PK, is connected through a secure channelRSU、SKRSUAnd CertRSUIs sent to the RSU and then sent to the RSU,
Figure BDA0002310412490000032
representation through SKTAFor IDRSUAnd PKRSUA signature generated after encryption;
s017: the RSU negotiates a temporary session symmetric key for ensuring safe communication with the CP in the communication range of the RSU, and stores the negotiated temporary session symmetric key locally for subsequent safe communication;
s018: EV needing charging service sends its own real identity information RID to TAEVRequesting registration;
s019: the TA generates a public key PK of the EV after confirming that the real identity information of the EV is legalEVPrivate key SKEVAnd the public key certificate Cert of the EVEVAnd generates a set PID consisting of n pseudo-identities for the EV according to the real identity of the EV,
Figure BDA0002310412490000033
representation through SKTAFor RIDEVAnd PKEVA signature generated after encryption;
s020: TA uses its private key SKTATrue identity RID for EVEVSigning with corresponding pseudo identity PID to obtain
Figure BDA0002310412490000034
S021: TA sends the system public parameter, PK through the secure channelEV、SKEV、CertEVPID and
Figure BDA0002310412490000035
sending the information to the EV;
s022: and the EV stores a pseudo identity set PID corresponding to the real identity of the EV in a local tamper-proof equipment unit.
Further, the system public parameters comprise a generator P of the system cycle group and a one-way hash function of the system;
PIDj=(PIDj,1,PIDj,2),PIDj,1and PIDj,2PID representing a pseudo-identityjIs calculated by the formula PID in step S019j,1=djP compute meta-component PIDj,1By the formula
Figure BDA0002310412490000037
Compute meta-component PIDj,2,djRandom number indicating TA selection, H1A first one-way hash function representing a system;
further, after the system initialization step and before step S1, the method further includes:
s031: EV sends a request M for subscribing charging service to CSP1Wherein
Figure BDA0002310412490000036
t1 denotes EV Generation subscription charging service request M1The time stamp generated at the time of the clock,
s032: the charging service provider CSP receives a request M for subscribing the charging service sent by the EV when registering1Then, use private key SKCSPDecrypt the message, if not, abort the session, otherwise check the timestamp t1 and use the public key PK of the TATAChecking signatures
Figure BDA0002310412490000041
If not, stopping the session, otherwise, recording the charging service registration information of the EV in a database and executing the step S033;
s033: the CSP generates n pairs of key pairs for authenticating the charging service for the EV, and generates a message M of the key pairs for authenticating the charging service using the set of key pairs2And M is2Is sent to the EV, wherein
Figure BDA0002310412490000042
t2 denotes a message M that the CSP generates a key pair for authenticating the charging service2A time stamp generated;
s034: EV uses its private key SKEVTo the received message M2Decrypting, if not, terminating the session, otherwise, checking the timestamp t2 and using the CSP's public key PKCSPChecking signatures
Figure BDA0002310412490000043
If not, aborting the session, otherwise storing a set of key pairs (PPK, PSK) for the authentication service on the tamper resistant device unit of the vehicle.
Further, step S033 includes:
CSP by formula PPKj=rjP calculates the key components independent of the pseudo-identity and passes the formula PSKj=rj+H2(PIDj,PPKj)·SKCSPmod q computes a key component, r, associated with the pseudo-identityjRandom number representing CSP selection, H2A second one-way hash function representing the system.
Further, the step of the RSU negotiating the temporary session symmetric key with the CP includes:
s041: the CP verifies the correctness of the certificate broadcasted by the RSU after receiving the certificate, and extracts the public key PK of the RSU from the certificate after the verification is passedRSUAnd selecting a random number mu to calculate KCPAnd KRSU,CP,KCP=μ·P,KRSU,CP=μ·PKRSU
S042: CP sending message
Figure BDA0002310412490000044
Giving RSU, wherein nonces represent random numbers selected by CP;
s043: RSU passes through CSP public key PK after receiving message sent by CPCSPVerifying if the signature in the received message was signed by the CSP, e.g., by obtaining KCPAnd formula KRSU,CP=SKRSU·KCPCalculate KRSU,CPAnd using the calculated KRSU,CPDecrypting the message to obtain a nonce and sending the message
Figure BDA0002310412490000045
Feeding the CP;
s044: CP uses KRSU,CPAnd decrypting the received message, and judging whether the decrypted message is equal to nonce +1, if so, successfully negotiating the temporary session symmetric key between the RSU and the CP, otherwise, failing to negotiate the temporary session symmetric key between the RSU and the CP.
Further, the RSU and CP periodically update the temporary session symmetric key between the two.
Further, step S1 includes: EV according to formula KEV,RSU=x·PKRSUCalculating a temporary session key K for secure communication with an RSUEV,RSUX represents a random number for EV selection;
temporary token TOKiComprises TOKi,1And TOKi,2Step S2 includes: EV passing formula TOKi,1Calculating TOK as x.Pi,1And by the formula TOKi,2=PSKi+H3(PIDi,PPKi,TOKi,1Request, t 3). x mod q to calculate TOKi,2,H3A third one-way hash function representing the system, request representing charging parameter information, and t3 representing EV calculation TOKiA time stamp generated;
step S3 includes: EV sends charging request M to RSU3
Figure BDA0002310412490000051
Step S4 includes: RSU by formula KEV,RSU=SKRSU·TOKi,1Calculate a temporary session key K between it and the EVEV,RSUAnd decrypts the received M using the temporary session key3Get { PIDi,PPKi,t3};
Step S5 includes: the RSU checks the timestamp t3 based on the received TOKi,1、TOKi,2And decrypted to obtain { PIDi,PPKiJudging whether the equation for verifying the identity validity is established, if so, going to S7, otherwise, going toS6, wherein the equation for verifying the validity of the identity is:
TOKi,2·P=PPKi+H2(PIDi,PPKi)·PKCSP+H3(PIDi,PPKi,TOKi,1,request,t3)·TOKi,1
further, step S7 includes:
s71: the RSU selects a random number alpha as a seed key for calculating a temporary session key between the EV and the CP, and calculates
Figure BDA0002310412490000052
RES2=HMACKEV,RSU(PIDiα, t4), t4 represents the time stamp of RSU generation when calculating RES1 and RES2, RES1Indicates the use of KEV,RSUTo PIDiAlpha and t4 are encrypted to obtain a message, RES2Representation to PIDiA, and t 4;
s72: RSU sends message M4To EV and send message M5For each CP controlled by the RSU, where M4={RES1,RES2,t4},
Figure BDA0002310412490000053
t5 denotes the RSU generation message M5Time stamps generated.
Further, the method further comprises:
if the RSU does not receive the payment message of the EV within the preset time period, the pseudo identity information of the EV which does not pay the charging service fee successfully is recorded and sent to the TA, and the TA calculates the real identity corresponding to the pseudo identity information after receiving the pseudo identity information of the EV sent by the RSU and publishes the real identity of the EV.
According to the electric vehicle charging service method capable of protecting privacy, the electric vehicle generates the temporary token by using the key pair distributed by the charging service provider and the pseudo identity distributed by the credible center, the temporary token is used for authenticating the roadside unit, after the authentication is passed, the roadside unit sends the seed key required by the authentication of the electric vehicle and the charging panel, the challenge response is carried out by using the one-time session key generated by the seed key to finish the authentication, and after the authentication is passed, the charging panel provides service for the electric vehicle to start charging.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
fig. 1 is a schematic structural diagram of a charging service system provided in the present invention;
FIG. 2 is a schematic flow chart of a privacy-protecting electric vehicle charging service method provided by the present invention;
FIG. 3 is a schematic diagram of a system initialization process;
FIG. 4 is a schematic diagram of an electric vehicle registration process;
FIG. 5 is a schematic flow chart illustrating the process of accessing the charging service by the electric vehicle;
FIG. 6 is a schematic diagram of a bill generation and payment process;
fig. 7 is a schematic diagram of an identity tracing process.
Detailed Description
In order to make the technical problems, technical solutions and advantages of the present invention more apparent, the following detailed description is given with reference to the accompanying drawings and specific embodiments, it being understood that the specific embodiments described herein are merely illustrative of the present invention and are not intended to limit the present invention.
The present embodiment provides an electric vehicle charging service method capable of protecting privacy, which is applied to an electric vehicle charging service system, and the system structure is shown in fig. 1, and includes TA, CSP, RSU, CP and EV. The TA is responsible for system initialization and distribution of public and private key pairs of each entity in the system, the CSP is responsible for registration and authorization of the EV, the RSUs are independent of each other, the RSU is responsible for authenticating the EV and distributing a one-time session key used for authenticating a CP controlled by the EV, and the CP is responsible for providing charging service for the authenticated and authorized EV.
Specifically, the flow of the electric vehicle charging service method capable of protecting privacy provided by this embodiment may be shown in fig. 2, and includes the following steps:
s1: the electric vehicle EV verifies the correctness of the certificate after receiving the certificate broadcasted by the roadside unit RSU, and extracts the public key PK of the RSU from the certificate after the verification is passedRSUAnd according to the public key PKRSUCalculating a temporary session key K of the EV and the RSUEV,RSU(ii) a The local database of the EV is prestored with a set PID (proportion integration differentiation) formed by n pseudo identities which are distributed by a trusted center TA and correspond to the real identity of the EV, and a set (PPK, PSK) formed by a key pair which is distributed by a charging service provider CSP for each pseudo identity in the pseudo identity set PID and used for authenticating the charging service, wherein each key pair comprises a component PPKjAnd component PSKj,PPKjRepresenting key components independent of pseudo-identity, PSKjRepresenting a key component associated with a pseudo-identity, PID ═ PID1,PID2,…PIDn},(PPK,PSK)={(PPK1,PSK1),(PPK2,PSK2),…(PPKn,PSKn)},j={1,2…n};
S2: EV selects a pseudo-identity PID from the pseudo-identity set and the key pair set respectivelyiAnd a corresponding key pair (PPK)i,PSKi) To calculate a temporary token TOK for RSU authentication identityi,i={1,2…n}
S3: the EV sends a charging request to the RSU, wherein the charging request comprises a temporary token TOKiAnd by a temporary session key KEV,RSUEncrypted pseudo-identity information and key pair information;
s4: the RSU calculates a temporary session key K between the RSU and the EV after receiving the charging requestEV,RSUThe charging request is decrypted by the pseudo identity information and the key pair information;
s5: RSU based on received TOKiAnd judging whether the EV is legal or not by the pseudo identity information and the key pair information obtained after decryptionIf yes, go to S7, otherwise, go to S6;
s6: the RSU refuses the charging service;
s7: RSU calculates seed key alpha of temporary session key between EV and charging panel CP, binds calculated seed key alpha with false identity information of EV and passes KRSU,CPSending the encrypted seed key to the CP, binding the calculated seed key with the pseudo identity information of the EV and passing through the KEV,RSUEncrypted and sent to the corresponding EV, wherein KRSU,CPRepresenting a temporary session symmetric key negotiated in advance between the RSU and the CP;
s8: EV passage KEV,RSUDecrypting the message to obtain a seed key alpha, and generating a one-time session key alpha according to the seed keyiAnd use a one-time session key alphaiGenerating an authentication code and transmitting the authentication code to the CP;
s9: CP through KRSU,CPDecrypting the message to obtain a seed key alpha, and generating a one-time session key alpha according to the seed keyiVerifying the authentication code sent by the EV based on the one-time session key, and providing charging service to the EV after the verification is passed;
s10: CP totaling as PIDiThe marked EV provides the total electric energy, and sends corresponding total electric energy information to the RSU;
s11: the RSU generates PID according to the received total electric energy informationiBilling the identified EV and sending the bill to the corresponding EV;
s12: the RSU, upon receiving the EV's payment message, checks the bill and returns an acknowledgement message.
It should be noted that, before step S1, a step of initializing the system may be further included, and a specific process may be shown in fig. 3, where initializing the system includes the following sub-steps:
s011: the trusted center TA generates a system public parameter and a public key PK of the TA according to a preset safety parameterTAAnd a private key SKTA
Through step S011, the TA completes initialization. The system common parameters in this embodiment include two large prime numbers p and q, and an elliptic curve E:y2=x3+ ax + b mod P, a cyclic group G of order q, a generator P of the cyclic group G, and a one-way hash function of the system. The relationship PK between the public key and the private key of the TA is satisfied in the embodimentTA=SKTA·P。
S012: the CSP sends its own ID information to TACSPRegistration is requested.
S013: TA generates CSP public key PK after confirming CSP sent identity information is legalCSPAnd a private key SKCSPAnd generates the CSP public key certificate Cert by using the TA private keyCSPAnd the system public parameter, PK, is connected through a secure channelCSP、SKCSPAnd CertCSPIs sent to the CSP and then sent to the CSP,
Figure BDA0002310412490000081
representation through SKTAFor IDCSPAnd PKCSPAnd (4) encrypting the generated signature.
Public key certificate CertCSPIncluding identity information ID of CSPCSPCSP public key PKCSPAnd signatures
Figure BDA0002310412490000082
It should be noted that TA may select a random number sCSPPrivate key SK as CSPCSPWherein
Figure BDA0002310412490000083
Means that positive integers are modulo-q operated and according to the formula PKCSP=sCSPP calculates the public key PK of CSPCSP
S014: CSP generates corresponding ID for each CP in its management rangeCPThen using the private key SK of CSPCSPFor IDCPGenerating signatures
Figure BDA0002310412490000084
And sends the signature to the corresponding CP through the secure channel.
The CSP completes initialization through steps S012 to S104, and this is explained as followsExamples of the embodiments
Figure BDA0002310412490000085
S015: RSU sends self identity information ID to TARSURegistration is requested.
S016: the TA generates a public key PK of the RSU after confirming that the identity information sent by the RSU is legalRSUPrivate key SKRSUAnd public key certificate Cert of RSURSUAnd the system public parameter, PK, is connected through a secure channelRSU、SKRSUAnd CertRSUIs sent to the RSU and then sent to the RSU,
Figure BDA0002310412490000086
representation through SKTAFor IDRSUAnd PKRSUAnd (4) encrypting the generated signature.
Specifically, the TA may select a random number s after confirming that the identity information of the RSU is legalRSUSK as private key of RSURSUWherein
Figure BDA0002310412490000087
And according to formula PKRSU=sRSUP calculates the public key PK of the RSURSU
S017: the RSU negotiates temporary session symmetric keys for ensuring secure communication with the CPs within the communication range of the RSU, and stores the negotiated temporary session symmetric keys locally for subsequent secure communication respectively.
Through steps S015 to S017, the RSU completes initialization.
S018: EV needing charging service sends its own real identity information RID to TAEVRegistration is requested.
S019: the TA generates a public key PK of the EV after confirming that the real identity information of the EV is legalEVPrivate key SKEVAnd the public key certificate Cert of the EVEVAnd generates a set PID consisting of n pseudo-identities for the EV according to the real identity of the EV,
Figure BDA0002310412490000091
representation through SKTAFor RIDEVAnd PKEVAnd (4) encrypting the generated signature.
Specifically, the TA may select a random number s after confirming that the identity information of the EV is validEVPrivate key SK as EVEVWherein
Figure BDA0002310412490000092
And according to formula PKEV=sEVP calculates the EV's public key PKEV
Jth pseudo identity PID of EV in this embodimentjUsing a pseudo-identity tuple (PID)j,1,PIDj,2) And (4) showing.
I.e. PIDj=(PIDj,1,PIDj,2),PIDj,1And PIDj,2PID representing a pseudo-identityjCan be calculated by formula PID in step S019j,1=djP compute meta-component PIDj,1By the formula
Figure BDA0002310412490000096
Compute meta-component PIDj,2,djRandom number representing TA selection, H1 representing the first one-way hash function of the system, H1(dj·PKTA) Representing d by a first one-way hash functionj·PKTAAnd performing conversion processing.
S020: TA uses its private key SKTATrue identity RID for EVEVSigning with corresponding pseudo identity PID to obtain
Figure BDA0002310412490000093
S021: TA sends the system public parameter, PK through the secure channelEV、SKEV、CertEVPID and
Figure BDA0002310412490000094
and sending the information to the EV.
S022: and the EV stores a pseudo identity set PID corresponding to the real identity of the EV in a local tamper-proof equipment unit.
The EV completes initialization in step S018 to step S022.
Each EV requiring charging service registration needs to be performed with the CSP, and a specific registration process can be shown in fig. 4. generally, an EV sends a registration request to the CSP before first use, where the registration request is also referred to as a request for subscribing to charging service.
That is, in the present embodiment, after the system initialization step and before step S1, the method further includes the following steps:
s031: EV sends a request M for subscribing charging service to CSP1Wherein
Figure BDA0002310412490000095
t1 denotes EV Generation subscription charging service request M1Time stamps generated.
It should be noted that, in order to ensure that the pseudo identity of the EV is issued by the TA and the association between the real identity and the pseudo identity is between the real identity and the pseudo identity, the subscription charging service request further includes a signature sent by the TA to the EV using its private key to the real identity and the pseudo identity of the EV when the EV registers with the TA.
S032: CSP receives a request M for subscribing charging service sent by EV during registration1Then, use private key SKCSPDecrypt the message, if not, abort the session, otherwise check the timestamp t1 and use the public key PK of the TATAChecking signatures
Figure BDA0002310412490000101
If not, the session is aborted, otherwise the charging service registration information of the EV is recorded in the database and step S033 is performed.
S033: the CSP generates n pairs of key pairs for authenticating the charging service for the EV, and generates a message M of the key pairs for authenticating the charging service using the set of key pairs2And M is2Is sent to the EV, wherein
Figure BDA0002310412490000102
t2 denotes when the CSP generates the message M2 for authenticating the key pair of the charging serviceThe time stamp that is generated is,
Figure BDA0002310412490000103
private key SK representing use of CSPCSPThe generated signature is encrypted with a set of generated key components not related to the pseudo-identity PPK, a set of generated key components related to the pseudo-identity PSK and a time stamp t 2.
Figure BDA0002310412490000104
Public key pair PPK, PSK, t2 and representing the use of EV
Figure BDA0002310412490000105
And (4) encrypting.
A flow chart of EV access to charging service can be seen in fig. 5, and it should be noted that, in step S033, the CSP can use the formula PPKjCalculating key components independent of false identity (Rp), and performing PSK (phase Shift keying) by using formulaj=r+H2(PIDj,PPKj)·SKCSPmod q computes a key component, r, associated with the pseudo-identityjThe random number representing the CSP's choice is,
Figure BDA0002310412490000106
H2a second one-way hash function, H, representing the system2(PIDj,PPKj) Representing PID pairs using a second one-way hash functionjAnd PPKjFor the conversion process, it should be noted that mod represents a modulo operation.
S034: EV uses its private key SKEVTo the received message M2Decrypting, if not, terminating the session, otherwise, checking the timestamp t2 and using the CSP's public key PKCSPChecking signatures
Figure BDA0002310412490000107
If not, aborting the session, otherwise storing a set of key pairs (PPK, PSK) for the authentication service on the tamper resistant device unit of the vehicle.
It should be noted that, in the present embodiment, theThe RSU will broadcast its credentials, which can be received by both EVs and CPs within its communication range. Certificate broadcast by RSU
Figure BDA0002310412490000108
Figure BDA0002310412490000109
Indicating the use of SKTAFor IDRSUAnd PPKRSUEncrypted signature, RSU broadcast certificate including IDRSU、PPKRSUAnd
Figure BDA00023104124900001010
EV receives certificate CertRSUPublic key PK of TA can be used laterTAThe certificate is verified for correctness. If the certificate is incorrect, the session is aborted, otherwise, the EV obtains the public key PK of the RSU from the certificateRSU
The step of the RSU negotiating the temporary session symmetric key with the CP includes:
s041: the CP verifies the correctness of the certificate broadcasted by the RSU after receiving the certificate, and extracts the public key PK of the RSU from the certificate after the verification is passedRSUAnd selecting a random number mu to calculate KCPAnd KRSU,CP,KCP=μ·P,KRSU,CP=μ·PKRSUWherein
Figure BDA0002310412490000111
S042: CP sending message
Figure BDA0002310412490000112
To the RSU, where nonce denotes the random number selected by the CP.
Wherein,
Figure BDA0002310412490000113
indicates the use of KRSU,CPAnd encrypting the nonce.
S043: RSU passes through CSP public key PK after receiving message sent by CPCSPVerifying receiptWhether the signature in the incoming message is signed by the CSP, e.g., by the derived KCPAnd formula KRSU,CP=SKRSU·KCPCalculate KRSU,CPAnd using the calculated KRSU,CPDecrypting the message to obtain a nonce and sending the message
Figure BDA0002310412490000114
Feeding the CP;
s044: CP uses KRSU,CPAnd decrypting the received message, and judging whether the decrypted message is equal to nonce +1, if so, successfully negotiating the temporary session symmetric key between the RSU and the CP, otherwise, failing to negotiate the temporary session symmetric key between the RSU and the CP.
In order to ensure the communication security, the RSU and the CP may periodically update the temporary session symmetric key between the RSU and the CP.
It should be noted that the EV obtains the public key PK of the RSU from the certificate broadcast by the RSURSUCan then be based on formula KEV,RSU=x·PKRSUCalculating a temporary session key K for secure communication with an RSUEV,RSUX represents a random number for EV selection,
Figure BDA0002310412490000115
temporary token TOK in this embodimentiComprises TOKi,1And TOKi,2Step S2 includes: EV passing formula TOKi,1Calculating TOK as x.Pi,1And by the formula TOKi,2=PSKi+H3(PIDi,PPKi,TOKi,1Request, t 3). x mod q to calculate TOKi,2,H3A third one-way hash function representing the system, request representing charging parameter information, such as battery and coil type information and charging rate information of the EV, and t3 representing the TOK calculated by the EViTime stamps generated.
Step S3 includes: EV sends charging request M to RSU3
Figure BDA0002310412490000116
Step S4 includes: RSU by formula KEV,RSU=SKRSU·TOKi,1Calculate a temporary session key K between it and the EVEV,RSUAnd decrypts the received M using the temporary session key3Get { PIDi,PPKi,t3}。
Step S5 includes: the RSU checks the timestamp t3 based on the received TOKi,1、TOKi,2And decrypted to obtain { PIDi,PPKiJudging whether the equation for verifying the identity validity is established, if so, going to S7, otherwise, going to S6, wherein the equation for verifying the identity validity is as follows:
TOKi,2·P=PPKi+H2(PIDi,PPKi)·PKCSP+H3(PIDi,PPKi,TOKi,1,request,t3)·TOKi,1
it should be noted that step S7 in the present embodiment may include the following steps:
s71: the RSU selects a random number alpha as a seed key for computing the temporary session key between the EV and the CP, wherein,
Figure BDA0002310412490000121
and calculate
Figure BDA0002310412490000122
t4 denotes that RSU is calculating RES1And RES2Time-generated time stamps, RES1Indicates the use of KEV,RSUTo PIDiAlpha and t4 are encrypted to obtain a message, RES2Representation to PIDiα, and t 4.
S72: RSU sends message M4To EV and send message M5For each CP controlled by the RSU, where M4={RES1,RES2,t4},
Figure BDA0002310412490000123
t5 denotes the RSU generation message M5Time stamps generated.
Wherein,
Figure BDA0002310412490000124
representing the use of the private Key SKRSUTo PIDiAlpha and t5,
Figure BDA0002310412490000125
indicates the use of KEV,RSUTo PIDiα, t5 and
Figure BDA0002310412490000126
and (4) encrypting the obtained message.
RSU sends message M4Sends to EV and sends message M5After sending to the CP, the EV and CP are based on message M4And message M5An authentication process is implemented. Specifically, the authentication between the EV and the CP includes the following procedures:
EV receives message M from RSU4Check the timestamp t4 and use the temporary session key KEV,RSUDecrypting message RES1To obtain (PID)iα, t4) and is obtained from decryption (PID)i,. alpha., t4) to calculate RES'2=HMACKEV,RSU(PIDiα, t4) and RES'2Comparing with the received RES2, if they are not equal, the EV aborts the session; otherwise, the EV obtains a seed key alpha for calculating the one-time session key for authentication of the EV and the CP;
each CP receives the message from RSU, uses the symmetric key pre-distributed by TA to decrypt the message, if not, stops the conversation, otherwise, checks if the signature is correct, if the signature is incorrect, stops the conversation, otherwise, uses the fourth one-way hash function of the system to calculate to obtain the one-time conversation key alphai
Specifically, when the electric vehicle passes through the ith charging pad CP, an AuthCode having a random number r is transmitted to prove that the electric vehicle passes the verification of the RSU, where AuthCode is H5iR), after verification of the CP, the CP authenticates it by sending an acknowledgement code ConfCode, wherein ConfCode is H5i,r,1),H5A fifth one-way hash function representing the system, once authentication is complete, the CP will open to charge the EV.
Preferably, the method provided by this embodiment further includes the following steps:
if the RSU does not receive the payment message of the EV within the preset time period, the pseudo identity information of the EV which does not pay the charging service fee successfully is recorded and sent to the TA, the TA calculates the real identity corresponding to the pseudo identity information after receiving the pseudo identity information of the EV sent by the RSU, and publishes the real identity of the EV, and the tracing of the identity of the illegal action is realized based on privacy protection.
It should be noted that, with the solution provided in this embodiment, after the EV is successfully registered on the CSP, the EV does not need to perform information interaction with the CSP, that is, the EV does not need to pass the authentication of the CSP every time the EV subsequently initiates a charging service request, so that the data throughput of the CSP is reduced, and even if the CSP goes wrong or goes offline, the EV can obtain the charging service.
After the EV charging of the electric vehicle is finished, each charging plate CP changes the EV charging into a charging state according to PIDiThe electric energy provided by the identified EV is sent to a roadside unit RSU, and after the RSU receives the information of the charging panel, the total number of the electric energy is counted as PIDiGenerating a corresponding bill by the electric energy provided by the identified EV and sending the bill to the EV; the EV completes payment immediately after receiving the bill, and the specific flow can be seen in fig. 6.
Specifically, each CP can combine messages
Figure BDA0002310412490000131
Sent to the RSU, where PIDi is the pseudo-identity of the EV,
Figure BDA0002310412490000132
and
Figure BDA0002310412490000133
PID respectively representing the ith charging plate as a pseudo identityiStart time and end time of EV charging, EpiPID for indicating the ith charging plate as a false identityiT6 denotes that the CP is being produced at the current timeA time stamp of the generation.
RSU receives message M sent by charging panel6Using a pre-distributed symmetric key KRSU,CPIs decrypted to obtain
Figure BDA0002310412490000134
Will be calculated
Figure BDA0002310412490000135
Is compared with the received value of
Figure BDA0002310412490000136
Comparing, if not, stopping conversation, otherwise, RSU counting to obtain N charging plates as false ID PIDiElectric energy supplied by the EV
Figure BDA0002310412490000137
The RSU calculates the pseudo-identity PID according to the current electricity priceiThe EV to be paid charges account, generates a bill message
Figure BDA0002310412490000138
Sent to the EV, t7 represents the timestamp generated by the RSU at the current time.
EV received message M7Thereafter, the key K is usedRSU,CPDecrypting messages and verifying results of calculations
Figure BDA0002310412490000139
Is compared with the received value of
Figure BDA00023104124900001310
If not, discarding the message; otherwise, the EV returns a payment message
Figure BDA00023104124900001311
To the RSU, where coin represents the proof of payment, t8 represents the timestamp that the EV generated at the current time.
RSU receives EV payment message M7Thereafter, the key K is usedRSU,CPDecrypt the message andjudgment of
Figure BDA00023104124900001312
And
Figure BDA00023104124900001313
whether the value is correct. If the payment is correct, the RSU returns a payment confirmation message representing that the EV payment is successful
Figure BDA00023104124900001314
Wherein succ represents payment success; otherwise, the EV is not paid successfully, it is recorded by the RSU, and t9 represents the timestamp generated when the RSU returns the payment confirmation message.
And when the charging of the electric vehicle EV is finished, the payment is not finished, and the RSU records the false identity of the electric vehicle which is not paid successfully. At intervals (e.g., one week), the recorded list is sent to the trust center TA, which reveals and publishes the true identity of the EV.
Specifically, the RSU may list the pseudo-identities of EVs that have not successfully paid for charging services
Figure BDA0002310412490000141
Sending to TA, receiving RSU message M by trusted center10Check the timestamp t10, and calculate
Figure BDA0002310412490000142
Revealing the true identity of the EV to penalize the EV with improper behavior, t10 representing the timestamp generated when the RSU sends the list of pseudo-identities, the flow of identity tracing can be seen in fig. 7.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. An electric vehicle charging service method capable of protecting privacy is characterized by comprising the following steps:
s1: the electric vehicle EV verifies the correctness of the certificate after receiving the certificate broadcasted by the roadside unit RSU, and extracts the public key PK of the RSU from the certificate after the verification is passedRSUAnd according to the public key PKRSUCalculating a temporary session key K of the EV and the RSUEV,RSU(ii) a The local database of the EV is prestored with a set PID (proportion integration differentiation) formed by n pseudo identities which are distributed by a trusted center TA and correspond to the real identity of the EV, and a set (PPK, PSK) formed by a key pair which is distributed by a charging service provider CSP for each pseudo identity in the pseudo identity set PID and used for authenticating the charging service, wherein each key pair comprises a component PPKjAnd component PSKj,PPKjRepresenting key components independent of pseudo-identity, PSKjRepresenting a key component associated with a pseudo-identity, PID ═ PID1,PID2,…,PIDn},(PPK,PSK)={(PPK1,PSK1),(PPK2,PSK2),…,(PPKn,PSKn)},j={1,2,…,n};
S2: EV selects a pseudo-identity PID from the pseudo-identity set and the key pair set respectivelyiAnd a corresponding key pair (PPK)i,PSKi) To calculate a temporary token TOK for RSU authentication identityi,i={1,2,…,n};
S3: the EV sends a charging request to the RSU, wherein the charging request comprises a temporary token TOKiAnd by a temporary session key KEV,RSUEncrypted pseudo-identity information and key pair information;
s4: the RSU calculates a temporary session key K between the RSU and the EV after receiving the charging requestEV,RSUThe charging request is decrypted by the pseudo identity information and the key pair information;
s5: RSU based on received TOKiJudging whether the EV is a legal authorized user or not by the decrypted pseudo-identity information and the decrypted key pair information, if so, turning to S7, and otherwise, turning to S6;
s6: the RSU refuses the charging service;
s7: RSU calculates seed key alpha of temporary session key between EV and charging panel CP, binds calculated seed key alpha with false identity information of EV and passes KRSU,CPSending the encrypted seed key to the CP, binding the calculated seed key with the pseudo identity information of the EV and passing through the KEV,RSUEncrypted and sent to the corresponding EV, wherein KRSU,CPRepresenting a temporary session symmetric key negotiated in advance between the RSU and the CP;
s8: EV passage KEV,RSUDecrypting the message to obtain a seed key alpha, and generating a one-time session key alpha according to the seed keyiAnd use a one-time session key alphaiGenerating an authentication code and transmitting the authentication code to the CP;
s9: CP through KRSU,CPDecrypting the message to obtain a seed key alpha, and generating a one-time session key alpha according to the seed keyiVerifying the authentication code sent by the EV based on the one-time session key, and providing charging service to the EV after the verification is passed;
s10: CP totaling as PIDiThe marked EV provides the total electric energy, and sends corresponding total electric energy information to the RSU;
s11: the RSU generates PID according to the received total electric energy informationiBilling for the identified EV and issuing the billSending the data to a corresponding EV;
s12: the RSU, upon receiving the EV's payment message, checks the bill and returns an acknowledgement message.
2. The privacy-preserving electric vehicle charging service method as claimed in claim 1, further comprising a step of initializing a system before step S1, wherein the step of initializing the system includes the sub-steps of:
s011: the trusted center TA generates a system public parameter and a public key PK of the TA according to a preset safety parameterTAAnd a private key SKTA
S012: the CSP sends its own ID information to TACSPRequesting registration;
s013: TA generates CSP public key PK after confirming CSP sent identity information is legalCSPAnd a private key SKCSPAnd generates the CSP public key certificate Cert by using the TA private keyCSPAnd the system public parameter, PK, is connected through a secure channelCSP、SKCSPAnd CertCSPIs sent to the CSP and then sent to the CSP,
Figure FDA0003494316110000021
Figure FDA0003494316110000022
representation through SKTAFor IDCSPAnd PKCSPA signature generated after encryption;
s014: CSP generates corresponding ID for each CP in its management rangeCPThen using the private key SK of CSPCSPFor IDCPGenerating signatures
Figure FDA0003494316110000023
And sending the signature to a corresponding CP through a secure channel;
s015: RSU sends self identity information ID to TARSURequesting registration;
s016: the TA generates a public key PK of the RSU after confirming that the identity information sent by the RSU is legalRSUPrivate key SKRSUAnd public key certificate Cert of RSURSUAnd the system public parameter, PK, is connected through a secure channelRSU、SKRSUAnd CertRSUIs sent to the RSU and then sent to the RSU,
Figure FDA0003494316110000024
Figure FDA0003494316110000025
representation through SKTAFor IDRSUAnd PKRSUA signature generated after encryption;
s017: the RSU negotiates a temporary session symmetric key for ensuring safe communication with the CP in the communication range of the RSU, and stores the negotiated temporary session symmetric key locally for subsequent safe communication;
s018: EV needing charging service sends its own real identity information RID to TAEVRequesting registration;
s019: the TA generates a public key PK of the EV after confirming that the real identity information of the EV is legalEVPrivate key SKEVAnd the public key certificate Cert of the EVEVAnd generates a set PID consisting of n pseudo-identities for the EV according to the real identity of the EV,
Figure FDA0003494316110000026
Figure FDA0003494316110000027
representation through SKTAFor RIDEVAnd PKEVA signature generated after encryption;
s020: TA uses its private key SKTATrue identity RID for EVEVSigning with corresponding pseudo identity PID to obtain
Figure FDA0003494316110000031
S021: TA sends the system public parameter, PK through the secure channelEV、SKEV、CertEVPID and
Figure FDA0003494316110000032
sending the information to the EV;
s022: and the EV stores a pseudo identity set PID corresponding to the real identity of the EV in a local tamper-proof equipment unit.
3. The privacy-preserving electric vehicle charging service method as claimed in claim 2, wherein the system public parameters include a generator P of a system cycle group and a one-way hash function of the system;
PIDj=(PIDj,1,PIDj,2),PIDj,1and PIDj,2PID representing a pseudo-identityjIs calculated by the formula PID in step S019j,1=djP compute meta-component PIDj,1By the formula
Figure FDA0003494316110000033
Compute meta-component PIDj,2,djRandom number indicating TA selection, H1A first one-way hash function representing a system.
4. The privacy-preserving electric vehicle charging service method as claimed in claim 3, further comprising, after the system initialization step and before step S1:
s031: EV sends a request M for subscribing charging service to CSP1Wherein
Figure FDA0003494316110000034
t1 denotes EV Generation subscription charging service request M1The time stamp generated at the time of the clock,
s032: CSP receives a request M for subscribing charging service sent by EV during registration1Then, use private key SKCSPDecrypt the message, if not, abort the session, otherwise check the timestamp t1 and use the public key PK of the TATAChecking signatures
Figure FDA0003494316110000035
If not, stopping the session, otherwise, recording the charging service registration information of the EV in a database and executing the step S033;
s033: the CSP generates n pairs of key pairs for authenticating the charging service for the EV, and generates a message M of the key pairs for authenticating the charging service using the set of key pairs2And M is2Is sent to the EV, wherein
Figure FDA0003494316110000036
t2 denotes a message M that the CSP generates a key pair for authenticating the charging service2A time stamp generated;
Figure FDA0003494316110000037
private key SK representing use of CSPCSPEncrypting the generated signature on a set of generated key components (PPK) which are not related to the pseudo identity, a set of generated key components (PSK) which are related to the pseudo identity and a time stamp t 2;
s034: EV uses its private key SKEVTo the received message M2Decrypting, if not, terminating the session, otherwise, checking the timestamp t2 and using the CSP's public key PKCSPChecking signatures
Figure FDA0003494316110000038
If not, aborting the session, otherwise storing a set of key pairs (PPK, PSK) for the authentication service on the tamper resistant device unit of the vehicle.
5. The privacy-preserving electric vehicle charging service method according to claim 4, wherein the step S033 includes:
CSP by formula PPKj=rjP calculates the key components independent of the pseudo-identity and passes the formula PSKj=rj+H2(PIDj,PPKj)·SKCSPmod q computes a key component, r, associated with the pseudo-identityjRandom number representing CSP selection,H2And a second one-way hash function representing the system, and q is a system public parameter.
6. The privacy-preserving electric vehicle charging service method as claimed in claim 3, wherein the step of the RSU negotiating the temporary session symmetric key with the CP includes:
s041: the CP verifies the correctness of the certificate broadcasted by the RSU after receiving the certificate, and extracts the public key PK of the RSU from the certificate after the verification is passedRSUAnd selecting a random number mu to calculate KCPAnd KRSU,CP,KCP=μ·P,KRSU,CP=μ·PKRSU
S042: CP sending message
Figure FDA0003494316110000041
Giving RSU, wherein nonces represent random numbers selected by CP;
Figure FDA0003494316110000042
indicates the use of KRSU,CPEncrypting the nonce;
s043: RSU passes through CSP public key PK after receiving message sent by CPCSPVerifying if the signature in the received message was signed by the CSP, e.g., by obtaining KCPAnd formula KRSU,CP=SKRSU·KCPCalculate KRSU,CPAnd using the calculated KRSU,CPDecrypting the message to obtain a nonce and sending the message
Figure FDA0003494316110000043
Feeding the CP;
s044: CP uses KRSU,CPAnd decrypting the received message, and judging whether the decrypted message is equal to nonce +1, if so, successfully negotiating the temporary session symmetric key between the RSU and the CP, otherwise, failing to negotiate the temporary session symmetric key between the RSU and the CP.
7. The privacy-preserving electric vehicle charging service method as claimed in claim 6, wherein the RSU and the CP periodically update the temporary session symmetric key between the RSU and the CP.
8. The privacy-preserving electric vehicle charging service method as claimed in any one of claims 3 to 7, wherein the step S1 includes: EV according to formula KEV,RSU=x·PKRSUCalculating a temporary session key K for secure communication with an RSUEV,RSUX represents a random number for EV selection;
temporary token TOKiComprises TOKi,1And TOKi,2Step S2 includes: EV passing formula TOKi,1Calculating TOK as x.Pi,1And by the formula TOKi,2=PSKi+H3(PIDi,PPKi,TOKi,1Request, t 3). x mod q to calculate TOKi,2,H3A third one-way hash function representing the system, request representing charging parameter information, and t3 representing EV calculation TOKiA time stamp generated;
step S3 includes: EV sends charging request M to RSU3
Figure FDA0003494316110000044
Step S4 includes: RSU by formula KEV,RSU=SKRSU·TOKi,1Calculate a temporary session key K between it and the EVEV,RSUAnd decrypts the received M using the temporary session key3Get { PIDi,PPKi,t3};
Step S5 includes: the RSU checks the timestamp t3 based on the received TOKi,1、TOKi,2And decrypted to obtain { PIDi,PPKiJudging whether the equation for verifying the identity validity is established, if so, going to S7, otherwise, going to S6, wherein the equation for verifying the identity validity is as follows:
TOKi,2·P=PPKi+H2(PIDi,PPKi)·PKCSP+H3(PIDi,PPKi,TOKi,1,request,t3)·TOKi,1
9. the privacy-preserving electric vehicle charging service method as claimed in any one of claims 1 to 7, wherein the step S7 includes:
s71: the RSU selects a random number alpha as a seed key for calculating a temporary session key between the EV and the CP, and calculates
Figure FDA0003494316110000051
RES2=HMACKEV,RSU(PIDiα, t4), t4 represents the time stamp generated by the RSU when calculating RES1 and RES2, RES1Indicates the use of KEV,RSUTo PIDiAlpha and t4 are encrypted to obtain a message, RES2Representation to PIDiA, and t 4;
s72: RSU sends message M4To EV and send message M5For each CP controlled by the RSU, where M4={RES1,RES2,t4},
Figure FDA0003494316110000052
t5 denotes the RSU generation message M5A time stamp generated;
Figure FDA0003494316110000053
representing the use of the private Key SKRSUTo PIDiA and t 5.
10. The privacy-preserving electric vehicle charging service method as claimed in any one of claims 1 to 7, further comprising:
if the RSU does not receive the payment message of the EV within the preset time period, the pseudo identity information of the EV which does not pay the charging service fee successfully is recorded and sent to the TA, and the TA calculates the real identity corresponding to the pseudo identity information after receiving the pseudo identity information of the EV sent by the RSU and publishes the real identity of the EV.
CN201911256494.9A 2019-12-10 2019-12-10 Electric vehicle charging service method capable of protecting privacy Active CN111107071B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911256494.9A CN111107071B (en) 2019-12-10 2019-12-10 Electric vehicle charging service method capable of protecting privacy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911256494.9A CN111107071B (en) 2019-12-10 2019-12-10 Electric vehicle charging service method capable of protecting privacy

Publications (2)

Publication Number Publication Date
CN111107071A CN111107071A (en) 2020-05-05
CN111107071B true CN111107071B (en) 2022-04-05

Family

ID=70422596

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911256494.9A Active CN111107071B (en) 2019-12-10 2019-12-10 Electric vehicle charging service method capable of protecting privacy

Country Status (1)

Country Link
CN (1) CN111107071B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865602B (en) * 2020-06-04 2023-04-25 北京科东电力控制系统有限责任公司 Intelligent energy service system heterogeneous terminal multiparty authentication method and system
EP4247027A4 (en) * 2020-11-28 2024-01-03 Huawei Technologies Co., Ltd. Communication method and apparatus
CN113114630B (en) * 2021-03-22 2022-04-15 重庆邮电大学 Authentication method and system for dynamic wireless charging privacy protection of electric vehicle
CN113492705B (en) * 2021-07-14 2023-01-10 福建星云电子股份有限公司 Noninductive charging method for charging pile
CN115529127B (en) * 2022-09-23 2023-10-03 中科海川(北京)科技有限公司 Device authentication method, device, medium and device based on SD-WAN scene

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102971985A (en) * 2010-07-09 2013-03-13 西门子公司 Method and control unit for charging a vehicle battery
CN104853351A (en) * 2015-03-20 2015-08-19 江苏大学 Internet of Vehicles distributed authentication method based on controllable privacy
CN107342859A (en) * 2017-07-07 2017-11-10 安徽大学 Anonymous authentication method and application thereof
CN108418784A (en) * 2017-12-04 2018-08-17 重庆邮电大学 A kind of distributed cross-domain authorization and access control method based on properties secret
CN108990147A (en) * 2018-06-29 2018-12-11 华东师范大学 The vehicle 3D localization method with secret protection communicated in vehicle-mounted net based on V2R or V2V
CN109067525A (en) * 2018-08-01 2018-12-21 安徽大学 Message authentication method based on half credible administrative center in car networking
CN109391631A (en) * 2018-11-28 2019-02-26 重庆邮电大学 It is a kind of with the car networking anonymous authentication system and method controllably linked
CN110301143A (en) * 2016-12-30 2019-10-01 英特尔公司 Method and apparatus for radio communication
CN110309675A (en) * 2019-07-05 2019-10-08 成都信息工程大学 A kind of intelligent network connection car data intimacy protection system and method not depending on trusted party

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016200213A1 (en) * 2015-06-11 2016-12-15 엘지전자 주식회사 Method and apparatus for transmitting v2x message
US10195956B2 (en) * 2017-06-02 2019-02-05 United Arab Emirates University Secure charging method for electric vehicles

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102971985A (en) * 2010-07-09 2013-03-13 西门子公司 Method and control unit for charging a vehicle battery
CN104853351A (en) * 2015-03-20 2015-08-19 江苏大学 Internet of Vehicles distributed authentication method based on controllable privacy
CN110301143A (en) * 2016-12-30 2019-10-01 英特尔公司 Method and apparatus for radio communication
CN107342859A (en) * 2017-07-07 2017-11-10 安徽大学 Anonymous authentication method and application thereof
CN108418784A (en) * 2017-12-04 2018-08-17 重庆邮电大学 A kind of distributed cross-domain authorization and access control method based on properties secret
CN108990147A (en) * 2018-06-29 2018-12-11 华东师范大学 The vehicle 3D localization method with secret protection communicated in vehicle-mounted net based on V2R or V2V
CN109067525A (en) * 2018-08-01 2018-12-21 安徽大学 Message authentication method based on half credible administrative center in car networking
CN109391631A (en) * 2018-11-28 2019-02-26 重庆邮电大学 It is a kind of with the car networking anonymous authentication system and method controllably linked
CN110309675A (en) * 2019-07-05 2019-10-08 成都信息工程大学 A kind of intelligent network connection car data intimacy protection system and method not depending on trusted party

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
A New Privacy-Aware Mutual Authentication Mechanism for Charging-on-the-Move in Online Electric Vehicles;Rasheed Hussain;《2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN)》;20160229;全文 *
Robust privacy-preserving authentication scheme for communication between Electric Vehicle as Power Energy Storage and power stations;Hasen Nicanfar;《2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)》;20130718;全文 *
电力大数据下的电动汽车充放电隐私数据保护;王帅;《生态互联 数字电力——2019电力行业信息化年会论文集》;20190907;全文 *

Also Published As

Publication number Publication date
CN111107071A (en) 2020-05-05

Similar Documents

Publication Publication Date Title
CN111107071B (en) Electric vehicle charging service method capable of protecting privacy
CN110769393B (en) Identity authentication system and method for vehicle-road cooperation
CN109462836B (en) Internet of vehicles malicious node detection system and method fusing block chain consensus mechanism
CN109922475B (en) Vehicle authentication and message verification method under vehicle-mounted network environment
CN113114630B (en) Authentication method and system for dynamic wireless charging privacy protection of electric vehicle
CN111372248A (en) Efficient anonymous identity authentication method in Internet of vehicles environment
KR100652125B1 (en) Mutual authentication method for managing and authenticating between service provider, terminal and user identify module at one time and terminal, and the system thereof
CN113783703B (en) Satellite network terminal security access authentication method, device and system
CN110289958B (en) Internet of vehicles identity authentication method and system
CN110381145B (en) Interaction method and system between electric automobile and power grid
CN113129518B (en) Electric vehicle charging system and resource management method thereof
Yeh et al. PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks
WO2007019760A1 (en) A method and a system for a mobile terminal joining in a domain and obtaining a rights object
Babu et al. Robust authentication protocol for dynamic charging system of electric vehicles
Hussain et al. PBF: a new privacy‐aware billing framework for online electric vehicles with bidirectional auditability
Tajmohammadi et al. LSPP: Lightweight and secure payment protocol for dynamic wireless charging of electric vehicles in vehicular cloud
CN110677256B (en) VPKI-based VANETs pseudonym revocation system and method
CN114696998A (en) Identity authentication method, device and system
CN115296804B (en) Traffic accident evidence obtaining method based on blockchain
CN113660662B (en) Authentication method based on trusted connection architecture in Internet of vehicles environment
CN112423298B (en) Identity authentication system and method for road traffic signal management and control facility
Roman et al. Authentication protocol built from a chaotic cryptosystem for a fog and cloud-based CWD-WPT charging station
CN101242519B (en) A two-step authorization distribution system and method for digital content charged by time
CN115776675A (en) Data transmission method and device for vehicle-road cooperation
Shin et al. A practical security framework for a VANET-based entertainment service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant