CN114629712A - Controllable anonymous privacy protection system and method for smart grid V2G - Google Patents

Controllable anonymous privacy protection system and method for smart grid V2G Download PDF

Info

Publication number
CN114629712A
CN114629712A CN202210295870.0A CN202210295870A CN114629712A CN 114629712 A CN114629712 A CN 114629712A CN 202210295870 A CN202210295870 A CN 202210295870A CN 114629712 A CN114629712 A CN 114629712A
Authority
CN
China
Prior art keywords
charging station
block chain
electric automobile
demand
electric vehicle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210295870.0A
Other languages
Chinese (zh)
Other versions
CN114629712B (en
Inventor
张伟剑
陈岑
何德彪
包子健
吕卓
李暖暖
郭志民
罗敏
彭聪
杨文�
张铮
狄立
蔡军飞
李鸣岩
常昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University WHU
Electric Power Research Institute of State Grid Henan Electric Power Co Ltd
Original Assignee
Wuhan University WHU
Electric Power Research Institute of State Grid Henan Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University WHU, Electric Power Research Institute of State Grid Henan Electric Power Co Ltd filed Critical Wuhan University WHU
Priority to CN202210295870.0A priority Critical patent/CN114629712B/en
Publication of CN114629712A publication Critical patent/CN114629712A/en
Application granted granted Critical
Publication of CN114629712B publication Critical patent/CN114629712B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00006Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment
    • H02J13/00028Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment involving the use of Internet protocols
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00032Systems characterised by the controlled or operated power network elements or equipment, the power network elements or equipment not otherwise provided for
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00032Systems characterised by the controlled or operated power network elements or equipment, the power network elements or equipment not otherwise provided for
    • H02J13/00034Systems characterised by the controlled or operated power network elements or equipment, the power network elements or equipment not otherwise provided for the elements or equipment being or involving an electric power substation
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J3/00Circuit arrangements for ac mains or ac distribution networks
    • H02J3/28Arrangements for balancing of the load in a network by storage of energy
    • H02J3/32Arrangements for balancing of the load in a network by storage of energy using batteries with converting means
    • H02J3/322Arrangements for balancing of the load in a network by storage of energy using batteries with converting means the battery being on-board an electric or hybrid vehicle, e.g. vehicle to grid arrangements [V2G], power aggregation, use of the battery for network load balancing, coordinated or cooperative battery charging
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J3/00Circuit arrangements for ac mains or ac distribution networks
    • H02J3/38Arrangements for parallely feeding a single network by two or more generators, converters or transformers
    • H02J3/381Dispersed generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

A controllable anonymous privacy protection system and method for a smart power grid V2G have the advantages of achieving privacy protection, safety, high efficiency and the like, privacy safety of an electric vehicle to both supply and demand parties of a power grid V2G can be protected, the electric vehicle sends power requirements to a gathering unit in an anonymous mode through short random signatures, the gathering unit sends the requirements to a block chain, and a charging station waits for sending a service request on the block chain. And after the matching is successful, the charging station performs anonymous identity authentication by using the short random signature. In particular, the trusted authority TA can trace back the electric vehicle/charging station when a dispute occurs.

Description

Controllable anonymous privacy protection system and method for smart grid V2G
Technical Field
The invention belongs to the technical field of power grid information communication safety, and particularly relates to a controllable anonymous privacy protection system and method for a smart power grid V2G.
Background
The smart grid is a modern power system which can achieve the optimized operation of the system by scheduling and controlling each device and each component according to the self requirement, and the novel power grid smart grid formed by highly integrating a communication technology, an information technology, a sensing measurement technology and an automatic control technology on the basis of a power transmission and distribution infrastructure of a traditional power grid has bidirectional flowing information flow and power flow, is a widely distributed and highly automated power supply network, can realize the scheduling and control of each component in the network according to the self requirement, and realizes the intellectualization, transparence, automation and controllability of the power grid.
In view of the widespread use of Electric Vehicles (EVs) in the near future, Vehicle-to-Grid (V2G) systems are envisioned as a key component of smart grids. V2G specifically refers to a rechargeable electric vehicle, such as a pure electric vehicle, a plug-in hybrid vehicle or a hydrogen fuel cell vehicle, which can communicate with the power transmission network, and can respond to demand, either by sending power back to the power grid or by adjusting the charging rate based on the power rate.
The application scenario of V2G in the existing smart grid rarely considers the requirement of privacy protection.
Prior art document 1(CN 11339516A) discloses a privacy protection identity authentication system and method for internet of vehicles. The system comprises a certificate authority CRA, a vehicle user, a roadside unit RSU and an identity examination and authentication center IRA. The method comprises the following steps: an initial stage and an anonymous voucher issuing stage; a credential presentation and verification phase and an anonymous credential identity vetting phase. The invention uses the anonymous voucher, ensures that the user completes identity authentication under the condition of not exposing the real identity of the user, can also carry out identity examination and identity recovery on vehicle users with illegal behaviors in the network, and ensures the conditional anonymity of the user. The disadvantages of the prior art document 1 are that: 1) it focuses on protecting the private communication of vehicles with roadside units/other vehicles, and does not focus on the V2G network in electric vehicles and smart grids; 2) the bottom layer of the technical document 1 adopts an anonymous credential technology, and related authentication operation cannot be performed on a message.
Prior art 2(CN108510252B) discloses a block chain-based smart electric vehicle power grid security payment system and method. The system of the invention is divided according to roles and comprises electric vehicle users, a Registration Authority (RA) and a block chain network. The payment management system comprises a registration module, a payment execution module and a data sharing module according to functional division. Based on the block chain technology and the cryptography technology, a special registration mechanism, an authentication mechanism and a new payment mechanism are adopted. The method can solve the problems of data sharing and identity privacy protection of the user in the V2G network payment field, and can realize effective supervision and privacy protection. The existing document 2 has a disadvantage that although privacy protection of payment on a blockchain is completed, privacy protection is not performed on identities between an electric vehicle (a payer) and an electric vehicle (a payee), but the patent focuses on the privacy protection requirements of identities between a V2G electric vehicle and a charging station, and between the electric vehicle and the electric vehicle, and can improve the privacy protection requirements under the smart grid V2G scene.
Disclosure of Invention
In order to solve the defects in the prior art, the invention provides a controllable anonymous privacy protection system and method facing a smart grid V2G, an anonymous authentication mechanism based on short random signatures is used, a block chain is used as a bulletin board to match supply and demand, and TA can reveal the identity of an electric vehicle/charging station when necessary.
The invention adopts the following technical scheme. The invention provides a controllable anonymous privacy protection system facing a smart grid V2G, which comprises a trusted third party TA, a plurality of convergence units, an electric vehicle, a charging station and a block chain unit; wherein:
the trusted third party TA is a completely trusted third party organization and is responsible for selecting, releasing and maintaining the security parameters of the system, selecting an identity number and generating a public and private key pair for each participant and acquiring the real identity information of each participant;
the convergence units are communication terminals arranged in an intelligent power grid, each convergence unit completes communication with the electric vehicles and the charging stations in the corresponding area, and the convergence units jointly form and maintain a block chain unit;
the block chain units are used for matching power supply and charging requirements, the electric automobile and the charging station acquire or write data in the block chain units through communication with the aggregation units, and the plurality of aggregation units operate a consensus algorithm to maintain the block chain units;
when the electric automobile is in power shortage and needs to be charged or can feed electricity to a power grid, the electric automobile sends the demand information to the convergence unit closest to the electric automobile;
the charging station checks the charging request through the block chain on the gathering unit, matches the demand and authenticates the demand, realizes the demand matching of the electric automobile, and completes the charging or feeding of the electric automobile.
Preferably, the consensus algorithm is a workload proving mechanism or a Byzantine fault tolerance mechanism.
On the other hand, the invention provides a controllable anonymous privacy protection method facing a smart grid V2G based on the controllable anonymous privacy protection system, which comprises the following steps:
step 1, each electric automobile and each charging station respectively register with a trusted third party TA to generate identity numbers and public and private key pairs of each participant, namely each electric automobile and each charging station;
step 2, when the electric automobile participates in V2G, namely, the V2G network is utilized for charging or feeding power to a power distribution network, the encrypted demand information and the randomized signature are sent to a gathering unit closest to the electric automobile together, and after the gathering unit verifies the encrypted demand information, the encrypted demand information is sent to a block chain which is participated and maintained by all the gathering units together;
and 3, checking the electric vehicle demand information on the block chain in real time by the convergence unit of the region where each charging station is located, judging whether the demand of the electric vehicle is met, and when the demand is met, verifying the identity of each charging station by using a randomized signature, and sending the received demand information to the block chain to realize demand matching of the electric vehicle and the charging stations.
And 4, when the electric automobile and the charging station are disputed in the service requirement matching process, the identity of the electric automobile user is traced through the trusted third party TA.
Preferably, in step 1, the first step of the method,
a self group public and private key pair is generated between the electric automobile or the charging station and the trusted third party TA through an interactive protocol.
Preferably, in step 2, when the electric vehicle requests a service, the demand information is generated and encrypted; selecting a random number to randomize the original signature generated by the electric vehicle in the step 1; and the electric automobile sends the encrypted demand information and the signature subjected to randomization processing to the aggregation unit closest to the electric automobile.
Preferably, after receiving the encrypted demand information and the signature subjected to the randomization processing, the aggregation unit verifies the signature;
after the verification is passed, the demand information is decrypted, and then the request time, the address of the request service and the electric quantity value required to be charged/capable of being fed in the demand information are transmitted to the block chain.
Preferably, in step 3,
charging station and electric automobile use intelligent contract to match, and the request information on the intelligent contract block chain is looked over in real time to the charging station, judges whether accord with the electric automobile demand, when according with the demand, uses the signature verification self identity of randomization, will accept on demand information sends the block chain, wherein, whether the following condition is accorded with in intelligent contract block chain judgement: and if the power supply time is within the request time, the service address contains the request service address, and the supplied power is greater than the requested charging power, and if the conditions are met, matching is completed.
Preferably, in step 3, the first step of the method,
if a plurality of charging stations judge that the required content of the electric vehicle can be met, a first-come-first-serve algorithm is adopted, and the charging station power supply requests which are firstly linked and meet the required content are matched.
Preferably, in step 3, the charging station verifies its own identity using the randomized signature without being able to link the user identity.
Compared with the prior art, the method has the advantages that the anonymous authentication mechanism based on the short random signature can only obtain the state information of the electric automobile/charging station and the conclusion that the state information has a legal identity for the convergence unit, but can not obtain the real identity information of the electric automobile/charging station, so that the safety of the identity information of the electric automobile/charging station is fundamentally ensured. For an attacker, even if the attacker obtains the data by eavesdropping. The attacker also cannot judge the real identity of the electric vehicle/charging station according to the position information and cannot know the specific content of the ciphertext data information.
Drawings
Fig. 1 shows a model diagram of a controllable anonymous privacy protection system facing a smart grid V2G provided by the present invention.
Fig. 2 shows a flow chart of the controllable anonymous privacy protection method for the smart grid V2G according to the present invention.
Detailed Description
The present application is further described below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present application is not limited thereby.
As shown in fig. 1, embodiment 1 of the present invention provides a controllable anonymous privacy protection system facing a smart grid V2G, including a trusted authority TA, a convergence unit, an electric vehicle, a charging station, and a block chain, wherein,
the trusted authority TA is a completely trusted third-party organization, is a security basis of the entire system, and is responsible for selecting, issuing and maintaining security parameters of the system, selecting an identity number for each participant and generating a public and private key pair, so that the real identity information of each participant can be known.
The convergence units are communication terminals arranged in an intelligent power grid, each convergence unit completes communication with the electric vehicles and the charging stations in the corresponding area, and the convergence units jointly form and maintain a block chain unit to assist the electric vehicles/the charging stations to complete information matching tasks.
The block chain units are used for matching power supply and charging requirements, the electric vehicles and the charging stations can acquire or write data in the block chain units through communication with the aggregation units, a plurality of aggregation units operate a consensus algorithm to maintain the block chain units, and the consensus algorithm is a workload certification mechanism (Proof of Work) or a Byzantine Fault Tolerance mechanism (Byzantine Fault Tolerance).
When the electric automobile is in power shortage and needs to be charged or can feed power to a power grid, the demand information is sent to the aggregation unit closest to the electric automobile.
The charging station checks the charging request through the block chain on the gathering unit, matches the demand and authenticates the demand, realizes the demand matching of the electric automobile, and completes the charging or feeding of the electric automobile.
The block chain is commonly maintained by a plurality of gathering units, can be regarded as an untrustworthy public account book, can run corresponding intelligent contract codes, and is responsible for matching application requirements of the electric automobile and the charging station.
As shown in fig. 2, embodiment 2 of the present invention provides a controllable anonymous privacy protection method for a smart grid V2G, including the following steps:
step 1, information initialization, in the system initialization phase, an electric vehicle/charging station registers to a trusted third party TA. The specific process is as follows:
step 1.1, TA selects a safety parameter n, generates a parameter
Figure BDA0003563287820000051
In the formula: e denotes a bilinear pair of type-3, e: G1×G2→GTG is G1The generation element of (a) is generated,
Figure BDA0003563287820000052
is G2Is p is G1,G2The order of the cyclic group, H, is the hash function. TA random selection
Figure BDA0003563287820000053
As private key of TA, ZpThe residual class ring of integer number p is expressed, and calculation is carried out
Figure BDA0003563287820000054
The public key of TA is
Figure BDA0003563287820000055
Step 1.2, electric vehicle/charging station i generation (usk [ i ])],upk[i])←Keygen(1n) For signatures, where usk [ i ]]Is a private key, upk[i]Is a public key and sends upk [ i ]]To TA.
The electric vehicle/charging station i and TA use an interactive protocol, first randomly generating a skiThen generating a key pair
Figure BDA0003563287820000056
And the signature of τ η ← Σ · Sign (usk [ i]τ) to TA using public key upk [ i []Checking the correctness of the signature eta, and checking
Figure BDA0003563287820000057
Whether or not this is true.
If both are correct, the electric vehicle/charging station uses zero knowledge proof to prove ski. Then TA randomly generates u e ZpTo calculate sigmai←(σ1i2i)←(gu,(gx·(τ)y)u). Finally, TA stores
Figure BDA0003563287820000061
To its own database
Figure BDA0003563287820000062
In, and sends σiFor electric vehicles/charging stations, electric vehicles/charging stations (sk)ii,e(σ1iY)) as the public key gski
Step 1.3, the convergence unit z generates its own private key sk [ z ] and public key pk [ z ], and sends pk [ z ] to the TA.
And 2, when the electric automobile participates in V2G, namely, the electric automobile is charged by using a V2G network or feeds power to a power distribution network, sending the encrypted demand information and the randomized signature to an aggregation unit closest to the electric automobile, and after the aggregation unit verifies the encrypted demand information and the randomized signature, sending the demand information to a block chain which is participated and maintained by all aggregation units together. The specific flow is as follows:
step 2.1, when the electric automobile i needs to request service from the convergence unit z, a charging request RQ needs to be generatediRequesting a time interval t1,t2]Requesting serviceAddress LC ofiRequired electric power eiTemporary private key kiEncryption using the ElGamal encryption algorithm m ═ Encryptpk[z](RQi,t1,t2,LCi,ei,ki),
In the formula:
RQiwhich indicates a request for charging of the battery,
[t1,t2]which indicates the time interval of the request,
LCiindicating the address of the requested service and,
eiwhich is indicative of the power required for the power,
kirepresenting the temporary private key or keys, and,
m represents the encrypted ciphertext,
Encryptpk[z]indicating the use of pk [ z]To (RQ)i,t1,t2,LCi,ei,ki) Encryption is performed.
And selecting a random number t, calculating
Figure BDA0003563287820000063
This step is equivalent to randomizing the original signature.
Computing skiI.e. electric vehicle i randomly selects one k, calculates e (σ'1i,Y)k←e(σ1i,Y)k·tAnd c ← H (σ'1,σ′2,e(σ1i,Y)k·tM), where H is a hash function.
Finally, the electric vehicle calculates s ← k + c skjOutput (σ'1i,σ′2iAnd c, s) as a signature. That is to say, (sigma ') of electric automobile'1i,σ′2iC, s, m) are sent to the convergence unit in a unified way.
Step 2.2, the convergence unit z decrypts m by using sk [ z ], and verifies whether the signature is correct, which specifically comprises the following steps:
computing
Figure BDA0003563287820000071
R is the bilinear pairwise multiplierThe elements are formed.
Verify that c is H (σ)12,R,m)。
If it is correct, the information { request time [ t }1,t2]Address LC of the requested serviceiRequired electric power eiUploading to a block chain intelligent contract, and waiting for demand matching of each charging station.
And 3, checking the electric vehicle demand information on the block chain in real time by the convergence unit of the region where each charging station is located, judging whether the demand of the electric vehicle is met, and when the demand is met, verifying the identity of each charging station by using a randomized signature, and sending the received demand information to the block chain to realize demand matching of the electric vehicle and the charging stations. The specific process is as follows:
and 3.1, the charging station x finds the self requirement meeting by looking up the intelligent contract of the requirement of the block chain, and authenticates the self identity by using the randomized signature. Charging station x needs to generate power supply request SpxService provided address LCxTime of power supply txSupplied electric power exEncryption of m' ═ Encrypt using the ElGamal encryption algorithmpk[z](Spx,LCx,tx,ex) And selecting a random number t' to calculate
Figure BDA0003563287820000072
And calculating skxI.e. charging station x randomly selects one k ', calculates e (σ'1x,Y)k′←e(σ1x,Y)k′·t′And c '← H (σ'1x,σ′2x,e(σ1x,Y)k′·t′M'), where H is a hash function. Finally, the charging station calculates s ' ← k ' + c '. skxOutput (σ'1x,σ′2xAnd c ', s') as a signature. Charging station x will be (σ'1,σ′2C ', s ', m ') are sent to the convergence unit z in a unified manner.
Step 3.2, the convergence unit z decrypts m' and verifies whether the signature is correct, which specifically comprises:
computing
Figure BDA0003563287820000073
R' is an element generated by multiplying the bilinear pairs
Verification of c ═ H (σ'1,σ′2,R′,m′)。
If the signature is correct, the charging request m ″, Encryptupk[x](RQi,t1,t2,LCi,ei,ki) Sending the information to a convergence unit x, and after the charging station decrypts the information, using a temporary private key k by the charging station x and the electric vehicle iiAnd carrying out communication to complete subsequent services.
If a plurality of charging stations judge that the required content of the electric vehicle can be met, a first-come-first-serve algorithm is adopted, and the charging station power supply requests which are firstly linked and meet the required content are matched.
And 4, when the electric automobile and the charging station are disputed in the service requirement matching process, tracing the identity of the electric automobile user through the TA. The specific process is as follows:
TA base (σ) when it is desired to open an identity12) Find in its own database, verify all entries
Figure BDA0003563287820000081
Until obtaining
Figure BDA0003563287820000082
I.e. the identity entry of the electric vehicle/charging station is known.
The scheme of the invention emphasizes that the message can be anonymously signed, and simultaneously, the data needs to be encrypted, and the scheme is combined with the actual V2G application scene.
Compared with the prior art, the invention has the beneficial effects that the application scene of V2G in the existing smart grid rarely considers the requirement of privacy protection, the anonymous authentication mechanism based on the short random signature is adopted, the block chain is used as a bulletin board to match supply and demand, and the TA can reveal the anonymous identity of the electric vehicle/charging station when necessary.
For the convergence unit, only the state information and the anonymous identity information of the electric vehicle/charging station can be obtained, but the real identity information of the electric vehicle/charging station cannot be obtained, so that the safety of the identity information of the electric vehicle/charging station is fundamentally ensured.
For an attacker, even if the attacker obtains the data by eavesdropping. The attacker also cannot judge the real identity of the electric vehicle/charging station user according to the position information and cannot know the specific content of the ciphertext data information.
The present applicant has described and illustrated embodiments of the present invention in detail with reference to the accompanying drawings, but it should be understood by those skilled in the art that the above embodiments are only preferred embodiments of the present invention, and the detailed description is only for the purpose of helping the reader to better understand the spirit of the present invention, and not for the purpose of limiting the scope of the present invention, and on the contrary, any modifications or modifications based on the spirit of the present invention should fall within the scope of the present invention.

Claims (10)

1. A controllable anonymous privacy protection system facing a smart grid V2G comprises a trusted third party TA, a plurality of aggregation units, electric vehicles, charging stations and a block chain unit; the method is characterized in that:
the trusted third party TA is a completely trusted third party organization and is responsible for selecting, releasing and maintaining the security parameters of the system, selecting identity numbers for all the participants and generating public and private key pairs to acquire the real identity information of all the participants;
the convergence units are communication terminals arranged in an intelligent power grid, each convergence unit completes communication with the electric vehicles and the charging stations in the corresponding area, and the convergence units jointly form and maintain a block chain unit;
the block chain units are used for matching power supply and charging requirements, the electric automobile and the charging station acquire or write data in the block chain units through communication with the aggregation units, and the plurality of aggregation units operate a consensus algorithm to maintain the block chain units;
when the electric automobile is in power shortage and needs to be charged or can feed electricity to a power grid, the electric automobile sends demand information to the gathering unit closest to the electric automobile;
the charging station checks the charging request through the block chain on the aggregation unit, matches the demand and authenticates the demand, realizes the demand matching of the electric automobile, and completes the charging or feeding of the electric automobile.
2. The controllable anonymous privacy protection system based on claim 1, wherein the controllable anonymous privacy protection method facing a smart grid V2G comprises the following steps:
step 1, each electric automobile and each charging station respectively register to a trusted third party TA to generate identity numbers and public and private key pairs of each participant, namely each electric automobile and each charging station;
step 2, when the electric vehicle participates in V2G, namely, the electric vehicle is charged by using a V2G network or feeds power to a power distribution network, the encrypted demand information and the randomized signature are sent to a gathering unit closest to the electric vehicle, and after the gathering unit verifies the encrypted demand information, the encrypted demand information and the randomized signature are sent to a block chain which is participated and maintained by all gathering units together;
and 3, checking the electric vehicle demand information on the block chain in real time by the convergence unit of the region where each charging station is located, judging whether the demand of the electric vehicle is met, and when the demand is met, verifying the identity of each charging station by using a randomized signature, and sending the received demand information to the block chain to realize demand matching of the electric vehicle and the charging stations.
3. The controllable anonymous privacy preserving method of claim 2, wherein:
the controllable anonymous privacy preserving method further comprises the following steps,
and 4, when the electric automobile and the charging station are disputed in the service requirement matching process, the identity of the electric automobile user is traced through the trusted third party TA.
4. The controllable anonymous privacy preserving method of claim 2, wherein:
in step 1, the following contents are specifically included:
a self group public and private key pair is generated between the electric automobile or the charging station and the trusted third party TA through an interactive protocol.
5. The controllable anonymous privacy preserving method of claim 2, further comprising:
in step 2, when the electric vehicle requests service, generating demand information and encrypting the demand information; selecting a random number to randomize the original signature generated by the electric automobile in the step 1; and the electric automobile sends the encrypted demand information and the signature subjected to randomization processing to the aggregation unit closest to the electric automobile.
6. The controllable anonymous privacy protection method of claim 5, wherein: after receiving the encrypted demand information and the randomized signature sent by the electric vehicle, the convergence unit firstly verifies the signature;
after the verification is passed, the demand information is decrypted, and then the request time, the address of the request service and the electric quantity value required to be charged/capable of being fed in the demand information are transmitted to the block chain.
7. The controllable anonymous privacy preserving method of claim 2, wherein:
in the step 3, the process is carried out,
charging station and electric automobile use intelligent contract to match, and the request information on the intelligent contract block chain is looked over in real time to the charging station, judges whether accord with the electric automobile demand, when according with the demand, uses the signature verification self identity of randomization, will accept on demand information sends the block chain, wherein, whether the following condition is accorded with in intelligent contract block chain judgement: and the power supply time is within the request time, the service address comprises an address requesting service, the supplied power is greater than the requested charging power, and if the conditions are met, the matching is completed.
8. The controllable anonymous privacy protection method of claim 7, wherein:
in the step 3, the process is carried out,
if a plurality of charging stations judge that the required content of the electric vehicle can be met, a first-come-first-serve algorithm is adopted, and the charging station power supply requests which are firstly linked and meet the required content are matched.
9. A controllable anonymous privacy protection system as claimed in claim 1, wherein:
the consensus algorithm is a workload certification mechanism or a Byzantine fault tolerance mechanism.
10. The controllable anonymous privacy preserving method of claim 2, wherein:
in step 3, the charging station verifies the identity of the charging station by using the randomized signature, and the identity of the charging station cannot be linked with the identity of the user.
CN202210295870.0A 2022-03-24 2022-03-24 Controllable anonymous privacy protection system and method for smart grid V2G Active CN114629712B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210295870.0A CN114629712B (en) 2022-03-24 2022-03-24 Controllable anonymous privacy protection system and method for smart grid V2G

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210295870.0A CN114629712B (en) 2022-03-24 2022-03-24 Controllable anonymous privacy protection system and method for smart grid V2G

Publications (2)

Publication Number Publication Date
CN114629712A true CN114629712A (en) 2022-06-14
CN114629712B CN114629712B (en) 2023-03-24

Family

ID=81903861

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210295870.0A Active CN114629712B (en) 2022-03-24 2022-03-24 Controllable anonymous privacy protection system and method for smart grid V2G

Country Status (1)

Country Link
CN (1) CN114629712B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108510252A (en) * 2018-03-24 2018-09-07 北京理工大学 A kind of intelligent electric automobile power grid security payment system and method based on block chain
CN110599261A (en) * 2019-09-21 2019-12-20 江西理工大学 Electric automobile safety electric power transaction and excitation system based on energy source block chain
CN111832066A (en) * 2020-05-20 2020-10-27 南京邮电大学 Block chain assisted V2G security authentication and private data aggregation method
US20220069602A1 (en) * 2020-08-27 2022-03-03 Hyundai Motor Company Method and apparatus for automatically authenticating electric vehicle charging user based on blockchain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108510252A (en) * 2018-03-24 2018-09-07 北京理工大学 A kind of intelligent electric automobile power grid security payment system and method based on block chain
CN110599261A (en) * 2019-09-21 2019-12-20 江西理工大学 Electric automobile safety electric power transaction and excitation system based on energy source block chain
CN111832066A (en) * 2020-05-20 2020-10-27 南京邮电大学 Block chain assisted V2G security authentication and private data aggregation method
US20220069602A1 (en) * 2020-08-27 2022-03-03 Hyundai Motor Company Method and apparatus for automatically authenticating electric vehicle charging user based on blockchain

Also Published As

Publication number Publication date
CN114629712B (en) 2023-03-24

Similar Documents

Publication Publication Date Title
Irshad et al. A provably secure and efficient authenticated key agreement scheme for energy internet-based vehicle-to-grid technology framework
CN111083131B (en) Lightweight identity authentication method for power Internet of things sensing terminal
CN110599261B (en) Electric automobile safety electric power transaction and excitation system based on energy source block chain
CN109687976B (en) Motorcade building and managing method and system based on block chain and PKI authentication mechanism
CN111372243B (en) Security distributed aggregation and access system and method based on fog alliance chain
Garg et al. An efficient blockchain-based hierarchical authentication mechanism for energy trading in V2G environment
CN109474610B (en) Anonymous certifiable key exchange method based on smart grid
Li et al. BCSE: Blockchain-based trusted service evaluation model over big data
CN113114630B (en) Authentication method and system for dynamic wireless charging privacy protection of electric vehicle
CN108494559B (en) Electronic contract signing method based on semi-trusted third party
Hussain et al. PBF: A new privacy-aware billing framework for online electric vehicles with bidirectional auditability
Yeh et al. PBS: a portable billing scheme with fine-grained access control for service-oriented vehicular networks
Baza et al. Privacy-preserving and collusion-resistant charging coordination schemes for smart grids
Nicanfar et al. Security and privacy of electric vehicles in the smart grid context: problem and solution
CN111769937A (en) Two-party authentication key agreement protocol oriented to advanced measurement system of smart grid
Xia et al. Effective charging identity authentication scheme based on fog computing in V2G networks
CN113395164A (en) Electronic voting method based on ring signature and block chain
Sharma et al. An efficient physically unclonable function based authentication scheme for V2G network
CN102404329A (en) Method for validating and encrypting interaction between user terminal and virtual community platform
Zhao et al. A secure and privacy-preserving payment system for Electric vehicles
CN110752934B (en) Method for network identity interactive authentication under topological structure
Zhao et al. An anonymous payment system to protect the privacy of electric vehicles
Zhang et al. A lightweight privacy preserving scheme of charging and discharging for electric vehicles based on consortium blockchain in charging service company
Belkaaloul et al. Anonymous authentication protocol for efficient communications in vehicle to grid networks
CN114629712B (en) Controllable anonymous privacy protection system and method for smart grid V2G

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant