CN114629712A - Controllable anonymous privacy protection system and method for smart grid V2G - Google Patents
Controllable anonymous privacy protection system and method for smart grid V2G Download PDFInfo
- Publication number
- CN114629712A CN114629712A CN202210295870.0A CN202210295870A CN114629712A CN 114629712 A CN114629712 A CN 114629712A CN 202210295870 A CN202210295870 A CN 202210295870A CN 114629712 A CN114629712 A CN 114629712A
- Authority
- CN
- China
- Prior art keywords
- charging station
- block chain
- electric automobile
- demand
- electric vehicle
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J13/00—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
- H02J13/00006—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment
- H02J13/00028—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment involving the use of Internet protocols
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J13/00—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
- H02J13/00032—Systems characterised by the controlled or operated power network elements or equipment, the power network elements or equipment not otherwise provided for
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J13/00—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
- H02J13/00032—Systems characterised by the controlled or operated power network elements or equipment, the power network elements or equipment not otherwise provided for
- H02J13/00034—Systems characterised by the controlled or operated power network elements or equipment, the power network elements or equipment not otherwise provided for the elements or equipment being or involving an electric power substation
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J3/00—Circuit arrangements for ac mains or ac distribution networks
- H02J3/28—Arrangements for balancing of the load in a network by storage of energy
- H02J3/32—Arrangements for balancing of the load in a network by storage of energy using batteries with converting means
- H02J3/322—Arrangements for balancing of the load in a network by storage of energy using batteries with converting means the battery being on-board an electric or hybrid vehicle, e.g. vehicle to grid arrangements [V2G], power aggregation, use of the battery for network load balancing, coordinated or cooperative battery charging
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J3/00—Circuit arrangements for ac mains or ac distribution networks
- H02J3/38—Arrangements for parallely feeding a single network by two or more generators, converters or transformers
- H02J3/381—Dispersed generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
A controllable anonymous privacy protection system and method for a smart power grid V2G have the advantages of achieving privacy protection, safety, high efficiency and the like, privacy safety of an electric vehicle to both supply and demand parties of a power grid V2G can be protected, the electric vehicle sends power requirements to a gathering unit in an anonymous mode through short random signatures, the gathering unit sends the requirements to a block chain, and a charging station waits for sending a service request on the block chain. And after the matching is successful, the charging station performs anonymous identity authentication by using the short random signature. In particular, the trusted authority TA can trace back the electric vehicle/charging station when a dispute occurs.
Description
Technical Field
The invention belongs to the technical field of power grid information communication safety, and particularly relates to a controllable anonymous privacy protection system and method for a smart power grid V2G.
Background
The smart grid is a modern power system which can achieve the optimized operation of the system by scheduling and controlling each device and each component according to the self requirement, and the novel power grid smart grid formed by highly integrating a communication technology, an information technology, a sensing measurement technology and an automatic control technology on the basis of a power transmission and distribution infrastructure of a traditional power grid has bidirectional flowing information flow and power flow, is a widely distributed and highly automated power supply network, can realize the scheduling and control of each component in the network according to the self requirement, and realizes the intellectualization, transparence, automation and controllability of the power grid.
In view of the widespread use of Electric Vehicles (EVs) in the near future, Vehicle-to-Grid (V2G) systems are envisioned as a key component of smart grids. V2G specifically refers to a rechargeable electric vehicle, such as a pure electric vehicle, a plug-in hybrid vehicle or a hydrogen fuel cell vehicle, which can communicate with the power transmission network, and can respond to demand, either by sending power back to the power grid or by adjusting the charging rate based on the power rate.
The application scenario of V2G in the existing smart grid rarely considers the requirement of privacy protection.
Prior art document 1(CN 11339516A) discloses a privacy protection identity authentication system and method for internet of vehicles. The system comprises a certificate authority CRA, a vehicle user, a roadside unit RSU and an identity examination and authentication center IRA. The method comprises the following steps: an initial stage and an anonymous voucher issuing stage; a credential presentation and verification phase and an anonymous credential identity vetting phase. The invention uses the anonymous voucher, ensures that the user completes identity authentication under the condition of not exposing the real identity of the user, can also carry out identity examination and identity recovery on vehicle users with illegal behaviors in the network, and ensures the conditional anonymity of the user. The disadvantages of the prior art document 1 are that: 1) it focuses on protecting the private communication of vehicles with roadside units/other vehicles, and does not focus on the V2G network in electric vehicles and smart grids; 2) the bottom layer of the technical document 1 adopts an anonymous credential technology, and related authentication operation cannot be performed on a message.
Prior art 2(CN108510252B) discloses a block chain-based smart electric vehicle power grid security payment system and method. The system of the invention is divided according to roles and comprises electric vehicle users, a Registration Authority (RA) and a block chain network. The payment management system comprises a registration module, a payment execution module and a data sharing module according to functional division. Based on the block chain technology and the cryptography technology, a special registration mechanism, an authentication mechanism and a new payment mechanism are adopted. The method can solve the problems of data sharing and identity privacy protection of the user in the V2G network payment field, and can realize effective supervision and privacy protection. The existing document 2 has a disadvantage that although privacy protection of payment on a blockchain is completed, privacy protection is not performed on identities between an electric vehicle (a payer) and an electric vehicle (a payee), but the patent focuses on the privacy protection requirements of identities between a V2G electric vehicle and a charging station, and between the electric vehicle and the electric vehicle, and can improve the privacy protection requirements under the smart grid V2G scene.
Disclosure of Invention
In order to solve the defects in the prior art, the invention provides a controllable anonymous privacy protection system and method facing a smart grid V2G, an anonymous authentication mechanism based on short random signatures is used, a block chain is used as a bulletin board to match supply and demand, and TA can reveal the identity of an electric vehicle/charging station when necessary.
The invention adopts the following technical scheme. The invention provides a controllable anonymous privacy protection system facing a smart grid V2G, which comprises a trusted third party TA, a plurality of convergence units, an electric vehicle, a charging station and a block chain unit; wherein:
the trusted third party TA is a completely trusted third party organization and is responsible for selecting, releasing and maintaining the security parameters of the system, selecting an identity number and generating a public and private key pair for each participant and acquiring the real identity information of each participant;
the convergence units are communication terminals arranged in an intelligent power grid, each convergence unit completes communication with the electric vehicles and the charging stations in the corresponding area, and the convergence units jointly form and maintain a block chain unit;
the block chain units are used for matching power supply and charging requirements, the electric automobile and the charging station acquire or write data in the block chain units through communication with the aggregation units, and the plurality of aggregation units operate a consensus algorithm to maintain the block chain units;
when the electric automobile is in power shortage and needs to be charged or can feed electricity to a power grid, the electric automobile sends the demand information to the convergence unit closest to the electric automobile;
the charging station checks the charging request through the block chain on the gathering unit, matches the demand and authenticates the demand, realizes the demand matching of the electric automobile, and completes the charging or feeding of the electric automobile.
Preferably, the consensus algorithm is a workload proving mechanism or a Byzantine fault tolerance mechanism.
On the other hand, the invention provides a controllable anonymous privacy protection method facing a smart grid V2G based on the controllable anonymous privacy protection system, which comprises the following steps:
step 1, each electric automobile and each charging station respectively register with a trusted third party TA to generate identity numbers and public and private key pairs of each participant, namely each electric automobile and each charging station;
step 2, when the electric automobile participates in V2G, namely, the V2G network is utilized for charging or feeding power to a power distribution network, the encrypted demand information and the randomized signature are sent to a gathering unit closest to the electric automobile together, and after the gathering unit verifies the encrypted demand information, the encrypted demand information is sent to a block chain which is participated and maintained by all the gathering units together;
and 3, checking the electric vehicle demand information on the block chain in real time by the convergence unit of the region where each charging station is located, judging whether the demand of the electric vehicle is met, and when the demand is met, verifying the identity of each charging station by using a randomized signature, and sending the received demand information to the block chain to realize demand matching of the electric vehicle and the charging stations.
And 4, when the electric automobile and the charging station are disputed in the service requirement matching process, the identity of the electric automobile user is traced through the trusted third party TA.
Preferably, in step 1, the first step of the method,
a self group public and private key pair is generated between the electric automobile or the charging station and the trusted third party TA through an interactive protocol.
Preferably, in step 2, when the electric vehicle requests a service, the demand information is generated and encrypted; selecting a random number to randomize the original signature generated by the electric vehicle in the step 1; and the electric automobile sends the encrypted demand information and the signature subjected to randomization processing to the aggregation unit closest to the electric automobile.
Preferably, after receiving the encrypted demand information and the signature subjected to the randomization processing, the aggregation unit verifies the signature;
after the verification is passed, the demand information is decrypted, and then the request time, the address of the request service and the electric quantity value required to be charged/capable of being fed in the demand information are transmitted to the block chain.
Preferably, in step 3,
charging station and electric automobile use intelligent contract to match, and the request information on the intelligent contract block chain is looked over in real time to the charging station, judges whether accord with the electric automobile demand, when according with the demand, uses the signature verification self identity of randomization, will accept on demand information sends the block chain, wherein, whether the following condition is accorded with in intelligent contract block chain judgement: and if the power supply time is within the request time, the service address contains the request service address, and the supplied power is greater than the requested charging power, and if the conditions are met, matching is completed.
Preferably, in step 3, the first step of the method,
if a plurality of charging stations judge that the required content of the electric vehicle can be met, a first-come-first-serve algorithm is adopted, and the charging station power supply requests which are firstly linked and meet the required content are matched.
Preferably, in step 3, the charging station verifies its own identity using the randomized signature without being able to link the user identity.
Compared with the prior art, the method has the advantages that the anonymous authentication mechanism based on the short random signature can only obtain the state information of the electric automobile/charging station and the conclusion that the state information has a legal identity for the convergence unit, but can not obtain the real identity information of the electric automobile/charging station, so that the safety of the identity information of the electric automobile/charging station is fundamentally ensured. For an attacker, even if the attacker obtains the data by eavesdropping. The attacker also cannot judge the real identity of the electric vehicle/charging station according to the position information and cannot know the specific content of the ciphertext data information.
Drawings
Fig. 1 shows a model diagram of a controllable anonymous privacy protection system facing a smart grid V2G provided by the present invention.
Fig. 2 shows a flow chart of the controllable anonymous privacy protection method for the smart grid V2G according to the present invention.
Detailed Description
The present application is further described below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present application is not limited thereby.
As shown in fig. 1, embodiment 1 of the present invention provides a controllable anonymous privacy protection system facing a smart grid V2G, including a trusted authority TA, a convergence unit, an electric vehicle, a charging station, and a block chain, wherein,
the trusted authority TA is a completely trusted third-party organization, is a security basis of the entire system, and is responsible for selecting, issuing and maintaining security parameters of the system, selecting an identity number for each participant and generating a public and private key pair, so that the real identity information of each participant can be known.
The convergence units are communication terminals arranged in an intelligent power grid, each convergence unit completes communication with the electric vehicles and the charging stations in the corresponding area, and the convergence units jointly form and maintain a block chain unit to assist the electric vehicles/the charging stations to complete information matching tasks.
The block chain units are used for matching power supply and charging requirements, the electric vehicles and the charging stations can acquire or write data in the block chain units through communication with the aggregation units, a plurality of aggregation units operate a consensus algorithm to maintain the block chain units, and the consensus algorithm is a workload certification mechanism (Proof of Work) or a Byzantine Fault Tolerance mechanism (Byzantine Fault Tolerance).
When the electric automobile is in power shortage and needs to be charged or can feed power to a power grid, the demand information is sent to the aggregation unit closest to the electric automobile.
The charging station checks the charging request through the block chain on the gathering unit, matches the demand and authenticates the demand, realizes the demand matching of the electric automobile, and completes the charging or feeding of the electric automobile.
The block chain is commonly maintained by a plurality of gathering units, can be regarded as an untrustworthy public account book, can run corresponding intelligent contract codes, and is responsible for matching application requirements of the electric automobile and the charging station.
As shown in fig. 2, embodiment 2 of the present invention provides a controllable anonymous privacy protection method for a smart grid V2G, including the following steps:
step 1, information initialization, in the system initialization phase, an electric vehicle/charging station registers to a trusted third party TA. The specific process is as follows:
step 1.1, TA selects a safety parameter n, generates a parameterIn the formula: e denotes a bilinear pair of type-3, e: G1×G2→GTG is G1The generation element of (a) is generated,is G2Is p is G1,G2The order of the cyclic group, H, is the hash function. TA random selectionAs private key of TA, ZpThe residual class ring of integer number p is expressed, and calculation is carried outThe public key of TA is
Step 1.2, electric vehicle/charging station i generation (usk [ i ])],upk[i])←Keygen(1n) For signatures, where usk [ i ]]Is a private key, upk[i]Is a public key and sends upk [ i ]]To TA.
The electric vehicle/charging station i and TA use an interactive protocol, first randomly generating a skiThen generating a key pairAnd the signature of τ η ← Σ · Sign (usk [ i]τ) to TA using public key upk [ i []Checking the correctness of the signature eta, and checkingWhether or not this is true.
If both are correct, the electric vehicle/charging station uses zero knowledge proof to prove ski. Then TA randomly generates u e ZpTo calculate sigmai←(σ1i,σ2i)←(gu,(gx·(τ)y)u). Finally, TA storesTo its own databaseIn, and sends σiFor electric vehicles/charging stations, electric vehicles/charging stations (sk)i,σi,e(σ1iY)) as the public key gski。
Step 1.3, the convergence unit z generates its own private key sk [ z ] and public key pk [ z ], and sends pk [ z ] to the TA.
And 2, when the electric automobile participates in V2G, namely, the electric automobile is charged by using a V2G network or feeds power to a power distribution network, sending the encrypted demand information and the randomized signature to an aggregation unit closest to the electric automobile, and after the aggregation unit verifies the encrypted demand information and the randomized signature, sending the demand information to a block chain which is participated and maintained by all aggregation units together. The specific flow is as follows:
step 2.1, when the electric automobile i needs to request service from the convergence unit z, a charging request RQ needs to be generatediRequesting a time interval t1,t2]Requesting serviceAddress LC ofiRequired electric power eiTemporary private key kiEncryption using the ElGamal encryption algorithm m ═ Encryptpk[z](RQi,t1,t2,LCi,ei,ki),
In the formula:
RQiwhich indicates a request for charging of the battery,
[t1,t2]which indicates the time interval of the request,
LCiindicating the address of the requested service and,
eiwhich is indicative of the power required for the power,
kirepresenting the temporary private key or keys, and,
m represents the encrypted ciphertext,
Encryptpk[z]indicating the use of pk [ z]To (RQ)i,t1,t2,LCi,ei,ki) Encryption is performed.
And selecting a random number t, calculatingThis step is equivalent to randomizing the original signature.
Computing skiI.e. electric vehicle i randomly selects one k, calculates e (σ'1i,Y)k←e(σ1i,Y)k·tAnd c ← H (σ'1,σ′2,e(σ1i,Y)k·tM), where H is a hash function.
Finally, the electric vehicle calculates s ← k + c skjOutput (σ'1i,σ′2iAnd c, s) as a signature. That is to say, (sigma ') of electric automobile'1i,σ′2iC, s, m) are sent to the convergence unit in a unified way.
Step 2.2, the convergence unit z decrypts m by using sk [ z ], and verifies whether the signature is correct, which specifically comprises the following steps:
Verify that c is H (σ)1,σ2,R,m)。
If it is correct, the information { request time [ t }1,t2]Address LC of the requested serviceiRequired electric power eiUploading to a block chain intelligent contract, and waiting for demand matching of each charging station.
And 3, checking the electric vehicle demand information on the block chain in real time by the convergence unit of the region where each charging station is located, judging whether the demand of the electric vehicle is met, and when the demand is met, verifying the identity of each charging station by using a randomized signature, and sending the received demand information to the block chain to realize demand matching of the electric vehicle and the charging stations. The specific process is as follows:
and 3.1, the charging station x finds the self requirement meeting by looking up the intelligent contract of the requirement of the block chain, and authenticates the self identity by using the randomized signature. Charging station x needs to generate power supply request SpxService provided address LCxTime of power supply txSupplied electric power exEncryption of m' ═ Encrypt using the ElGamal encryption algorithmpk[z](Spx,LCx,tx,ex) And selecting a random number t' to calculateAnd calculating skxI.e. charging station x randomly selects one k ', calculates e (σ'1x,Y)k′←e(σ1x,Y)k′·t′And c '← H (σ'1x,σ′2x,e(σ1x,Y)k′·t′M'), where H is a hash function. Finally, the charging station calculates s ' ← k ' + c '. skxOutput (σ'1x,σ′2xAnd c ', s') as a signature. Charging station x will be (σ'1,σ′2C ', s ', m ') are sent to the convergence unit z in a unified manner.
Step 3.2, the convergence unit z decrypts m' and verifies whether the signature is correct, which specifically comprises:
Verification of c ═ H (σ'1,σ′2,R′,m′)。
If the signature is correct, the charging request m ″, Encryptupk[x](RQi,t1,t2,LCi,ei,ki) Sending the information to a convergence unit x, and after the charging station decrypts the information, using a temporary private key k by the charging station x and the electric vehicle iiAnd carrying out communication to complete subsequent services.
If a plurality of charging stations judge that the required content of the electric vehicle can be met, a first-come-first-serve algorithm is adopted, and the charging station power supply requests which are firstly linked and meet the required content are matched.
And 4, when the electric automobile and the charging station are disputed in the service requirement matching process, tracing the identity of the electric automobile user through the TA. The specific process is as follows:
TA base (σ) when it is desired to open an identity1,σ2) Find in its own database, verify all entriesUntil obtainingI.e. the identity entry of the electric vehicle/charging station is known.
The scheme of the invention emphasizes that the message can be anonymously signed, and simultaneously, the data needs to be encrypted, and the scheme is combined with the actual V2G application scene.
Compared with the prior art, the invention has the beneficial effects that the application scene of V2G in the existing smart grid rarely considers the requirement of privacy protection, the anonymous authentication mechanism based on the short random signature is adopted, the block chain is used as a bulletin board to match supply and demand, and the TA can reveal the anonymous identity of the electric vehicle/charging station when necessary.
For the convergence unit, only the state information and the anonymous identity information of the electric vehicle/charging station can be obtained, but the real identity information of the electric vehicle/charging station cannot be obtained, so that the safety of the identity information of the electric vehicle/charging station is fundamentally ensured.
For an attacker, even if the attacker obtains the data by eavesdropping. The attacker also cannot judge the real identity of the electric vehicle/charging station user according to the position information and cannot know the specific content of the ciphertext data information.
The present applicant has described and illustrated embodiments of the present invention in detail with reference to the accompanying drawings, but it should be understood by those skilled in the art that the above embodiments are only preferred embodiments of the present invention, and the detailed description is only for the purpose of helping the reader to better understand the spirit of the present invention, and not for the purpose of limiting the scope of the present invention, and on the contrary, any modifications or modifications based on the spirit of the present invention should fall within the scope of the present invention.
Claims (10)
1. A controllable anonymous privacy protection system facing a smart grid V2G comprises a trusted third party TA, a plurality of aggregation units, electric vehicles, charging stations and a block chain unit; the method is characterized in that:
the trusted third party TA is a completely trusted third party organization and is responsible for selecting, releasing and maintaining the security parameters of the system, selecting identity numbers for all the participants and generating public and private key pairs to acquire the real identity information of all the participants;
the convergence units are communication terminals arranged in an intelligent power grid, each convergence unit completes communication with the electric vehicles and the charging stations in the corresponding area, and the convergence units jointly form and maintain a block chain unit;
the block chain units are used for matching power supply and charging requirements, the electric automobile and the charging station acquire or write data in the block chain units through communication with the aggregation units, and the plurality of aggregation units operate a consensus algorithm to maintain the block chain units;
when the electric automobile is in power shortage and needs to be charged or can feed electricity to a power grid, the electric automobile sends demand information to the gathering unit closest to the electric automobile;
the charging station checks the charging request through the block chain on the aggregation unit, matches the demand and authenticates the demand, realizes the demand matching of the electric automobile, and completes the charging or feeding of the electric automobile.
2. The controllable anonymous privacy protection system based on claim 1, wherein the controllable anonymous privacy protection method facing a smart grid V2G comprises the following steps:
step 1, each electric automobile and each charging station respectively register to a trusted third party TA to generate identity numbers and public and private key pairs of each participant, namely each electric automobile and each charging station;
step 2, when the electric vehicle participates in V2G, namely, the electric vehicle is charged by using a V2G network or feeds power to a power distribution network, the encrypted demand information and the randomized signature are sent to a gathering unit closest to the electric vehicle, and after the gathering unit verifies the encrypted demand information, the encrypted demand information and the randomized signature are sent to a block chain which is participated and maintained by all gathering units together;
and 3, checking the electric vehicle demand information on the block chain in real time by the convergence unit of the region where each charging station is located, judging whether the demand of the electric vehicle is met, and when the demand is met, verifying the identity of each charging station by using a randomized signature, and sending the received demand information to the block chain to realize demand matching of the electric vehicle and the charging stations.
3. The controllable anonymous privacy preserving method of claim 2, wherein:
the controllable anonymous privacy preserving method further comprises the following steps,
and 4, when the electric automobile and the charging station are disputed in the service requirement matching process, the identity of the electric automobile user is traced through the trusted third party TA.
4. The controllable anonymous privacy preserving method of claim 2, wherein:
in step 1, the following contents are specifically included:
a self group public and private key pair is generated between the electric automobile or the charging station and the trusted third party TA through an interactive protocol.
5. The controllable anonymous privacy preserving method of claim 2, further comprising:
in step 2, when the electric vehicle requests service, generating demand information and encrypting the demand information; selecting a random number to randomize the original signature generated by the electric automobile in the step 1; and the electric automobile sends the encrypted demand information and the signature subjected to randomization processing to the aggregation unit closest to the electric automobile.
6. The controllable anonymous privacy protection method of claim 5, wherein: after receiving the encrypted demand information and the randomized signature sent by the electric vehicle, the convergence unit firstly verifies the signature;
after the verification is passed, the demand information is decrypted, and then the request time, the address of the request service and the electric quantity value required to be charged/capable of being fed in the demand information are transmitted to the block chain.
7. The controllable anonymous privacy preserving method of claim 2, wherein:
in the step 3, the process is carried out,
charging station and electric automobile use intelligent contract to match, and the request information on the intelligent contract block chain is looked over in real time to the charging station, judges whether accord with the electric automobile demand, when according with the demand, uses the signature verification self identity of randomization, will accept on demand information sends the block chain, wherein, whether the following condition is accorded with in intelligent contract block chain judgement: and the power supply time is within the request time, the service address comprises an address requesting service, the supplied power is greater than the requested charging power, and if the conditions are met, the matching is completed.
8. The controllable anonymous privacy protection method of claim 7, wherein:
in the step 3, the process is carried out,
if a plurality of charging stations judge that the required content of the electric vehicle can be met, a first-come-first-serve algorithm is adopted, and the charging station power supply requests which are firstly linked and meet the required content are matched.
9. A controllable anonymous privacy protection system as claimed in claim 1, wherein:
the consensus algorithm is a workload certification mechanism or a Byzantine fault tolerance mechanism.
10. The controllable anonymous privacy preserving method of claim 2, wherein:
in step 3, the charging station verifies the identity of the charging station by using the randomized signature, and the identity of the charging station cannot be linked with the identity of the user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210295870.0A CN114629712B (en) | 2022-03-24 | 2022-03-24 | Controllable anonymous privacy protection system and method for smart grid V2G |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210295870.0A CN114629712B (en) | 2022-03-24 | 2022-03-24 | Controllable anonymous privacy protection system and method for smart grid V2G |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114629712A true CN114629712A (en) | 2022-06-14 |
CN114629712B CN114629712B (en) | 2023-03-24 |
Family
ID=81903861
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210295870.0A Active CN114629712B (en) | 2022-03-24 | 2022-03-24 | Controllable anonymous privacy protection system and method for smart grid V2G |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114629712B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108510252A (en) * | 2018-03-24 | 2018-09-07 | 北京理工大学 | A kind of intelligent electric automobile power grid security payment system and method based on block chain |
CN110599261A (en) * | 2019-09-21 | 2019-12-20 | 江西理工大学 | Electric automobile safety electric power transaction and excitation system based on energy source block chain |
CN111832066A (en) * | 2020-05-20 | 2020-10-27 | 南京邮电大学 | Block chain assisted V2G security authentication and private data aggregation method |
US20220069602A1 (en) * | 2020-08-27 | 2022-03-03 | Hyundai Motor Company | Method and apparatus for automatically authenticating electric vehicle charging user based on blockchain |
-
2022
- 2022-03-24 CN CN202210295870.0A patent/CN114629712B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108510252A (en) * | 2018-03-24 | 2018-09-07 | 北京理工大学 | A kind of intelligent electric automobile power grid security payment system and method based on block chain |
CN110599261A (en) * | 2019-09-21 | 2019-12-20 | 江西理工大学 | Electric automobile safety electric power transaction and excitation system based on energy source block chain |
CN111832066A (en) * | 2020-05-20 | 2020-10-27 | 南京邮电大学 | Block chain assisted V2G security authentication and private data aggregation method |
US20220069602A1 (en) * | 2020-08-27 | 2022-03-03 | Hyundai Motor Company | Method and apparatus for automatically authenticating electric vehicle charging user based on blockchain |
Also Published As
Publication number | Publication date |
---|---|
CN114629712B (en) | 2023-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Irshad et al. | A provably secure and efficient authenticated key agreement scheme for energy internet-based vehicle-to-grid technology framework | |
CN111083131B (en) | Lightweight identity authentication method for power Internet of things sensing terminal | |
CN110599261B (en) | Electric automobile safety electric power transaction and excitation system based on energy source block chain | |
CN109687976B (en) | Motorcade building and managing method and system based on block chain and PKI authentication mechanism | |
CN111372243B (en) | Security distributed aggregation and access system and method based on fog alliance chain | |
Garg et al. | An efficient blockchain-based hierarchical authentication mechanism for energy trading in V2G environment | |
CN109474610B (en) | Anonymous certifiable key exchange method based on smart grid | |
Li et al. | BCSE: Blockchain-based trusted service evaluation model over big data | |
CN113114630B (en) | Authentication method and system for dynamic wireless charging privacy protection of electric vehicle | |
CN108494559B (en) | Electronic contract signing method based on semi-trusted third party | |
Hussain et al. | PBF: A new privacy-aware billing framework for online electric vehicles with bidirectional auditability | |
Yeh et al. | PBS: a portable billing scheme with fine-grained access control for service-oriented vehicular networks | |
Baza et al. | Privacy-preserving and collusion-resistant charging coordination schemes for smart grids | |
Nicanfar et al. | Security and privacy of electric vehicles in the smart grid context: problem and solution | |
CN111769937A (en) | Two-party authentication key agreement protocol oriented to advanced measurement system of smart grid | |
Xia et al. | Effective charging identity authentication scheme based on fog computing in V2G networks | |
CN113395164A (en) | Electronic voting method based on ring signature and block chain | |
Sharma et al. | An efficient physically unclonable function based authentication scheme for V2G network | |
CN102404329A (en) | Method for validating and encrypting interaction between user terminal and virtual community platform | |
Zhao et al. | A secure and privacy-preserving payment system for Electric vehicles | |
CN110752934B (en) | Method for network identity interactive authentication under topological structure | |
Zhao et al. | An anonymous payment system to protect the privacy of electric vehicles | |
Zhang et al. | A lightweight privacy preserving scheme of charging and discharging for electric vehicles based on consortium blockchain in charging service company | |
Belkaaloul et al. | Anonymous authentication protocol for efficient communications in vehicle to grid networks | |
CN114629712B (en) | Controllable anonymous privacy protection system and method for smart grid V2G |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |