CN114629712B - Controllable anonymous privacy protection system and method for smart grid V2G - Google Patents

Controllable anonymous privacy protection system and method for smart grid V2G Download PDF

Info

Publication number
CN114629712B
CN114629712B CN202210295870.0A CN202210295870A CN114629712B CN 114629712 B CN114629712 B CN 114629712B CN 202210295870 A CN202210295870 A CN 202210295870A CN 114629712 B CN114629712 B CN 114629712B
Authority
CN
China
Prior art keywords
charging station
block chain
electric automobile
electric vehicle
demand
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210295870.0A
Other languages
Chinese (zh)
Other versions
CN114629712A (en
Inventor
张伟剑
陈岑
何德彪
包子健
吕卓
李暖暖
郭志民
罗敏
彭聪
杨文�
张铮
狄立
蔡军飞
李鸣岩
常昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University WHU
Electric Power Research Institute of State Grid Henan Electric Power Co Ltd
Original Assignee
Wuhan University WHU
Electric Power Research Institute of State Grid Henan Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University WHU, Electric Power Research Institute of State Grid Henan Electric Power Co Ltd filed Critical Wuhan University WHU
Priority to CN202210295870.0A priority Critical patent/CN114629712B/en
Publication of CN114629712A publication Critical patent/CN114629712A/en
Application granted granted Critical
Publication of CN114629712B publication Critical patent/CN114629712B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00006Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment
    • H02J13/00028Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment involving the use of Internet protocols
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00032Systems characterised by the controlled or operated power network elements or equipment, the power network elements or equipment not otherwise provided for
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00032Systems characterised by the controlled or operated power network elements or equipment, the power network elements or equipment not otherwise provided for
    • H02J13/00034Systems characterised by the controlled or operated power network elements or equipment, the power network elements or equipment not otherwise provided for the elements or equipment being or involving an electric power substation
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J3/00Circuit arrangements for ac mains or ac distribution networks
    • H02J3/28Arrangements for balancing of the load in a network by storage of energy
    • H02J3/32Arrangements for balancing of the load in a network by storage of energy using batteries with converting means
    • H02J3/322Arrangements for balancing of the load in a network by storage of energy using batteries with converting means the battery being on-board an electric or hybrid vehicle, e.g. vehicle to grid arrangements [V2G], power aggregation, use of the battery for network load balancing, coordinated or cooperative battery charging
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J3/00Circuit arrangements for ac mains or ac distribution networks
    • H02J3/38Arrangements for parallely feeding a single network by two or more generators, converters or transformers
    • H02J3/381Dispersed generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Electric Propulsion And Braking For Vehicles (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)

Abstract

A controllable anonymous privacy protection system and method for a smart grid V2G have the advantages of achieving privacy protection, being safe and efficient and the like, privacy safety of an electric automobile to both supply and demand parties of the power grid V2G can be protected, the electric automobile sends power demands to a gathering unit in an anonymous mode through short random signatures, the gathering unit sends the demands to a block chain, and a charging station waits for sending a service request on the block chain. And after the matching is successful, the charging station performs anonymous identity authentication by using the short random signature. In particular, the trusted authority TA can trace back the electric vehicle/charging station when a dispute occurs.

Description

Controllable anonymous privacy protection system and method for smart grid V2G
Technical Field
The invention belongs to the technical field of power grid information communication safety, and particularly relates to a controllable anonymous privacy protection system and method for smart power grid V2G.
Background
The smart grid refers to a modern power system which can achieve system optimized operation by scheduling and controlling various devices and components according to self requirements, and the novel power grid smart grid formed by highly integrating a communication technology, an information technology, a sensing measurement technology and an automatic control technology on the basis of a power transmission and distribution infrastructure of a traditional power grid has bidirectional flowing information flow and power flow, is a widely distributed and highly automated power supply network, can schedule and control various components in the network according to self requirements, and achieves intellectualization, transparency, automation and controllability of the power grid.
In view of the widespread use of Electric Vehicles (EVs) in the near future, vehicle-to-Grid (V2G) systems are envisaged as a key component of smart grids. V2G specifically refers to a rechargeable electric vehicle, such as a pure electric vehicle, a plug-in hybrid electric vehicle, or a hydrogen fuel cell vehicle, which can communicate with the power transmission network, and can provide a service in response to a demand, such as delivering power back to the power grid, or adjusting the charging speed according to the power fee.
At present, the requirement of privacy protection is rarely considered in the V2G application scene in the existing smart power grid.
Prior art document 1 (CN 11339516A) discloses a privacy protection identity authentication system and method facing Internet of vehicles. The system comprises a certificate authority CRA, a vehicle user, a roadside unit RSU and an identity examination and authentication center IRA. The method comprises the following steps: an initial stage and an anonymous voucher issuing stage; a credential presentation and verification phase and an anonymous credential identity vetting phase. The invention uses the anonymous voucher, ensures that the user completes identity authentication under the condition of not exposing the real identity of the user, can also carry out identity examination and identity recovery on vehicle users with illegal behaviors in the network, and ensures the conditional anonymity of the user. The disadvantages of the prior art document 1 are: 1) The method mainly protects the private communication between the vehicle and roadside units/other vehicles, and does not pay attention to V2G networks in electric vehicles and smart grids; 2) The bottom layer of the technical document 1 adopts an anonymous credential technology, and related authentication operation cannot be performed on a message.
Prior art 2 (CN 108510252B) discloses a block chain-based intelligent electric vehicle power grid security payment system and method. The system of the invention is divided according to roles and comprises electric vehicle users, a Registration Authority (RA) and a block chain network. The payment management system comprises a registration module, a payment execution module and a data sharing module according to functional division. Based on the block chain technology and the cryptography technology, a special registration mechanism, an authentication mechanism and a new payment mechanism are adopted. The method can solve the problems of data sharing and identity privacy protection of the user in the V2G network payment field, and can realize effective supervision and privacy protection. The existing document 2 has a disadvantage that although privacy protection of payment on a block chain is completed, privacy protection is not performed on identities between an electric vehicle (payer) and an electric vehicle (payee), and the privacy protection requirement under a smart grid V2G scene can be perfected by focusing on the privacy protection requirement of the identities charged between the V2G electric vehicle and a charging station, and between the electric vehicle and the electric vehicle.
Disclosure of Invention
In order to solve the defects in the prior art, the invention provides a controllable anonymous privacy protection system and method facing a smart grid V2G, an anonymous authentication mechanism based on short random signatures is used, a block chain is used as a bulletin board to match supply and demand, and a TA (trusted application) can reveal the identity of an electric vehicle/charging station when necessary.
The invention adopts the following technical scheme. The invention provides a controllable anonymous privacy protection system facing a smart grid V2G, which comprises a trusted third party TA, a plurality of convergence units, an electric vehicle, a charging station and a block chain unit; wherein:
the trusted third party TA is a completely trusted third party organization and is responsible for selecting, releasing and maintaining the security parameters of the system, selecting an identity number and generating a public and private key pair for each participant and acquiring the real identity information of each participant;
the convergence units are communication terminals arranged in an intelligent power grid, each convergence unit completes communication with the electric vehicles and the charging stations in the corresponding area, and the convergence units jointly form and maintain a block chain unit;
the block chain units are used for matching power supply and charging requirements, the electric automobile and the charging station acquire or write data in the block chain units through communication with the aggregation units, and the plurality of aggregation units operate a consensus algorithm to maintain the block chain units;
when the electric automobile is in power shortage and needs to be charged or can feed electricity to a power grid, the electric automobile sends the demand information to the convergence unit closest to the electric automobile;
the charging station checks the charging request through the block chain on the gathering unit, matches the demand and authenticates the demand, realizes the demand matching of the electric automobile, and completes the charging or feeding of the electric automobile.
Preferably, the consensus algorithm is a workload proving mechanism or a Byzantine fault tolerance mechanism.
The invention also provides a controllable anonymous privacy protection method facing the smart grid V2G based on the controllable anonymous privacy protection system, which comprises the following steps:
step 1, each electric automobile and each charging station respectively register with a trusted third party TA to generate identity numbers and public and private key pairs of each participant, namely each electric automobile and each charging station;
step 2, when the electric automobile participates in V2G, namely, the V2G network is utilized for charging or feeding power to the power distribution network, the encrypted demand information and the randomized signature are sent to a gathering unit closest to the electric automobile together, and after the gathering unit verifies the encrypted demand information, the encrypted demand information is sent to a block chain which is participated and maintained by all the gathering units together;
and 3, checking the electric vehicle demand information on the block chain in real time by the convergence unit of the region where each charging station is located, judging whether the demand of the electric vehicle is met, and when the demand is met, verifying the identity of each charging station by using a randomized signature, and sending the received demand information to the block chain to realize demand matching of the electric vehicle and the charging stations.
And 4, when the electric automobile and the charging station are disputed in the service requirement matching process, the identity of the electric automobile user is traced through the trusted third party TA.
Preferably, in step 1,
a self group public and private key pair is generated between the electric automobile or the charging station and the trusted third party TA through an interactive protocol.
Preferably, in step 2, when the electric vehicle requests a service, the demand information is generated and encrypted; selecting a random number to randomize the original signature generated by the electric automobile in the step 1; and the electric automobile sends the encrypted demand information and the signature subjected to randomization processing to the aggregation unit closest to the electric automobile.
Preferably, after receiving the encrypted demand information and the signature subjected to the randomization processing, the aggregation unit verifies the signature;
after the verification is passed, the demand information is decrypted, and then the request time, the address of the request service and the electric quantity value required for charging/capable of feeding in the demand information are transmitted to the block chain.
Preferably, in step 3,
charging station and electric automobile use intelligent contract to match, and the request information on the intelligent contract block chain is looked over in real time to the charging station, judges whether accord with the electric automobile demand, when according with the demand, uses the signature verification self identity of randomization, will accept on demand information sends the block chain, wherein, whether the following condition is accorded with in intelligent contract block chain judgement: and if the power supply time is within the request time, the service address contains the request service address, and the supplied power is greater than the requested charging power, and if the conditions are met, the matching is finished.
Preferably, in step 3,
if a plurality of charging stations judge that the required content of the electric vehicle can be met, a first-come-first-serve algorithm is adopted, and the charging station power supply requests which are firstly linked and meet the required content are matched.
Preferably, in step 3, the charging station verifies its own identity using the randomized signature without being able to link the user identity.
Compared with the prior art, the method has the advantages that the anonymous authentication mechanism based on the short random signature can only obtain the state information of the electric automobile/charging station and the conclusion that the state information has a legal identity for the convergence unit, but can not obtain the real identity information of the electric automobile/charging station, so that the safety of the identity information of the electric automobile/charging station is fundamentally ensured. For an attacker, even if the attacker obtains the data by eavesdropping. The attacker also cannot judge the real identity of the electric vehicle/charging station according to the position information and cannot know the specific content of the ciphertext data information.
Drawings
Fig. 1 shows a model diagram of a controllable anonymous privacy protection system facing a smart grid V2G according to the present invention.
Fig. 2 shows a flowchart of a controllable anonymous privacy protection method for smart grid V2G according to the present invention.
Detailed Description
The present application is further described below with reference to the accompanying drawings. The following examples are only used to illustrate the technical solutions of the present invention more clearly, and the protection scope of the present application is not limited thereby.
As shown in fig. 1, embodiment 1 of the present invention provides a controllable anonymous privacy protection system facing a smart grid V2G, including a trusted authority TA, a convergence unit, an electric vehicle, a charging station, and a block chain, wherein,
the trusted authority TA is a completely trusted third party organization, is a security basis of the entire system, and is responsible for selecting, issuing and maintaining security parameters of the system, selecting identity numbers for each participant and generating a public and private key pair, so that the real identity information of each participant can be known.
The convergence units are communication terminals arranged in an intelligent power grid, each convergence unit completes communication with the electric vehicles and the charging stations in the corresponding area, and the convergence units jointly form and maintain a block chain unit to assist the electric vehicles/the charging stations to complete information matching tasks.
The block chain units are used for matching power supply and charging requirements, the electric vehicles and the charging stations can acquire or write data in the block chain units through communication with the aggregation units, a plurality of aggregation units operate a consensus algorithm to maintain the block chain units, and the consensus algorithm is a workload certification mechanism (Proof of Work) or a Byzantine Fault Tolerance mechanism (Byzantine Fault Tolerance).
When the electric automobile needs to be charged in the absence of electricity or can feed electricity to a power grid, the electric automobile sends the demand information to the gathering unit closest to the electric automobile.
The charging station checks the charging request through the block chain on the gathering unit, matches the demand and authenticates the demand, realizes the demand matching of the electric automobile, and completes the charging or feeding of the electric automobile.
The block chain is commonly maintained by a plurality of convergence units, can be regarded as an unalterable public account book, can run corresponding intelligent contract codes, and is responsible for matching application requirements of the electric vehicle and the charging station.
As shown in fig. 2, an embodiment 2 of the present invention provides a controllable anonymous privacy protection method for a smart grid V2G, including the following steps:
step 1, information initialization, in the system initialization phase, an electric vehicle/charging station registers to a trusted third party TA. The specific process is as follows:
step 1.1, TA selects a safety parameter n, generates a parameter
Figure BDA0003563287820000051
In the formula: e denotes a bilinear pair of type-3, e: G 1 ×G 2 →G T G is G 1 In a generating unit of (4)>
Figure BDA0003563287820000052
Is G 2 Is p is G 1 ,G 2 The order of the cyclic group, H, is the hash function. TA random selection->
Figure BDA0003563287820000053
As private key of TA, Z p The residual class ring of integer number p is expressed, and calculation is carried out
Figure BDA0003563287820000054
The public key of TA is->
Figure BDA0003563287820000055
Step 1.2, electric vehicle/charging station i generation (usk [ i ])],upk[i])←Keygen(1 n ) For signatures, where usk [ i ]]Is a private key, upk [ i]Is a public key and sends upk [ i]To TA.
The electric vehicle/charging station i and TA use an interactive protocol, first randomly generating a sk i Then generating a key pair
Figure BDA0003563287820000056
And the signature of τ η ← Σ · Sign (usk [ i]τ) to TA using public key upk [ i]The correctness of the signature eta is checked, and check->
Figure BDA0003563287820000057
Whether or not this is true.
If both are correct, the electric vehicle/charging station uses zero knowledge proof to prove sk i . Then, TA randomly generates u ∈ Z p To calculate sigma i ←(σ 1i2i )←(g u ,(g x ·(τ) y ) u ). Finally, TA stores
Figure BDA0003563287820000061
To oneself database->
Figure BDA0003563287820000062
In, and sends σ i For electric vehicle/charging station, electric vehicle/charging station use (sk) ii ,e(σ 1i Y)) as the public key gsk i
Step 1.3, the convergence unit z generates its own private key sk [ z ] and public key pk [ z ], and sends pk [ z ] to the TA.
And 2, when the electric automobile participates in V2G, namely, the V2G network is utilized for charging or feeding power to the power distribution network, the encrypted demand information and the randomized signature are sent to the aggregation unit closest to the electric automobile, and after the aggregation unit is verified, the demand information is sent to a block chain which is participated and maintained by all the aggregation units together. The specific flow is as follows:
step 2.1, when the electric automobile i needs to request service from the convergence unit z, a charging request RQ needs to be generated i Requesting a time interval t 1 ,t 2 ]Address LC of the requested service i Required electric power e i Temporary private key k i Encryption using the ElGamal encryption algorithm m = Encrypt pk[z] (RQ i ,t 1 ,t 2 ,LC i ,e i ,k i ),
In the formula:
RQ i which indicates a request for charging of the battery,
[t 1 ,t 2 ]which indicates the time interval of the request,
LC i indicating the address of the requested service and,
e i which is indicative of the required electrical power,
k i representing the temporary private key or keys, and,
m represents the encrypted ciphertext,
Encrypt pk[z] indicating the use of pk [ z]To (RQ) i ,t 1 ,t 2 ,LC i ,e i ,k i ) Encryption is performed.
And selecting a random number t, calculating
Figure BDA0003563287820000063
This step is equivalent to randomizing the original signature.
Computing sk i I.e. electric vehicle i randomly selects a k, calculates e (σ' 1i ,Y) k ←e(σ 1i ,Y) k·t And c ← H (σ' 1 ,σ′ 2 ,e(σ 1i ,Y) k·t M), where H is a hash function.
Finally, the electric vehicle calculates s ← k + c sk j Output (σ' 1i ,σ′ 2i And c, s) as a signature. That is to say, (sigma ') of electric automobile' 1i ,σ′ 2i C, s, m) are sent to the convergence unit in a unified way.
Step 2.2, the convergence unit z decrypts m by using sk [ z ], and verifies whether the signature is correct, which specifically comprises the following steps:
computing
Figure BDA0003563287820000071
R is an element generated by multiplying the bilinear pairs.
Verify c = H (σ) 12 ,R,m)。
If it is correct, the information { request time [ t } 1 ,t 2 ]Address LC of the requested service i Required electric power e i Uploading to a block chain intelligent contract, and waiting for demand matching of each charging station.
And 3, checking the electric vehicle demand information on the block chain in real time by the convergence unit of the region where each charging station is located, judging whether the demand of the electric vehicle is met, and when the demand is met, verifying the identity of each charging station by using a randomized signature, and sending the received demand information to the block chain to realize demand matching of the electric vehicle and the charging stations. The specific flow is as follows:
and 3.1, the charging station x finds the self requirement meeting by looking up the intelligent contract of the requirement of the block chain, and authenticates the self identity by using the randomized signature. Charging station x needs to generate power supply request Sp x Service provided address LC x Time of power supply t x Supplied electric power e x Encryption using the ElGamal encryption algorithm m' = Encrypt pk[z] (Sp x ,LC x ,t x ,e x ) And selecting a random number t' to calculate
Figure BDA0003563287820000072
And calculating sk x I.e. charging station x randomly selects one k ', calculates e (σ' 1x ,Y) k′ ←e(σ 1x ,Y) k′·t′ And c '. About.H (σ' 1x ,σ′ 2x ,e(σ 1x ,Y) k′·t′ M'), where H is a hash function. Finally, the charging station calculates s ' ← k ' + c '. Sk x Output (σ' 1x ,σ′ 2x And c ', s') as a signature. Charging station x will be (σ' 1 ,σ′ 2 C ', s ', m ') are sent to the convergence unit z in a unified manner.
Step 3.2, the convergence unit z decrypts m' and verifies whether the signature is correct, which specifically comprises:
computing
Figure BDA0003563287820000073
R' is an element generated by multiplying the bilinear pairs
Verification c '= H (σ' 1 ,σ′ 2 ,R′,m′)。
If the signature is correct, the charging request m = Encrypt upk[x] (RQ i ,t 1 ,t 2 ,LC i ,e i ,k i ) Sending the information to a convergence unit x, and after the charging station decrypts the information, using a temporary private key k by the charging station x and the electric vehicle i i And carrying out communication to complete subsequent services.
If a plurality of charging stations judge that the required content of the electric vehicle can be met, a first-come-first-serve algorithm is adopted, and the charging station power supply requests which are firstly linked and meet the required content are matched.
And 4, when the electric automobile and the charging station are disputed in the service requirement matching process, tracing the identity of the electric automobile user through the TA. The specific flow is as follows:
TA base (σ) when it is desired to open an identity 12 ) Find in its own database, verify all entries
Figure BDA0003563287820000081
Until a decision is made as to whether or not a decision is made>
Figure BDA0003563287820000082
I.e. the identity entry of the electric vehicle/charging station is known.
The scheme of the invention emphasizes that anonymous signature can be carried out on the message, and meanwhile, encryption operation needs to be carried out on the data, and the scheme is combined with the actual V2G application scene.
Compared with the prior art, the method has the advantages that the requirement of privacy protection is rarely considered in the V2G application scene in the existing smart grid, the anonymous authentication mechanism based on the short random signature is adopted, the block chain is used as a bulletin board to match supply and demand, and the TA can reveal the anonymous identity of the electric vehicle/charging station when necessary.
For the convergence unit, only the state information and the anonymous identity information of the electric vehicle/charging station can be obtained, but the real identity information of the electric vehicle/charging station cannot be obtained, so that the safety of the identity information of the electric vehicle/charging station is fundamentally ensured.
For an attacker, even if the attacker obtains the data by eavesdropping. The attacker also cannot judge the real identity of the electric vehicle/charging station user according to the position information and cannot know the specific content of the ciphertext data information.
The present applicant has described and illustrated embodiments of the present invention in detail with reference to the accompanying drawings, but it should be understood by those skilled in the art that the above embodiments are merely preferred embodiments of the present invention, and the detailed description is only for the purpose of helping the reader to better understand the spirit of the present invention, and not for limiting the scope of the present invention, and on the contrary, any improvement or modification made based on the spirit of the present invention should fall within the scope of the present invention.

Claims (9)

1. A controllable anonymous privacy protection method facing a smart grid V2G is characterized by comprising the following steps:
step 1, each electric automobile and each charging station respectively register to a trusted third party TA to generate identity numbers and public and private key pairs of each participant, namely each electric automobile and each charging station; the method specifically comprises the following steps:
step 1.1, TA selects a safety parameter n, generates a parameter
Figure FDA0003981005410000011
In the formula: e denotes a bilinear pair of type-3, e G 1 ×G 2 →G T G is G 1 The generation element of (a) is generated,
Figure FDA0003981005410000012
is G 2 Is p is G 1 ,G 2 Order of the cyclic group, H is a hash function, TA is randomly selected
Figure FDA0003981005410000013
As private key of TA, Z p The residual class ring of integer number p is expressed, and calculation is carried out
Figure FDA0003981005410000014
The public key of TA is
Figure FDA0003981005410000015
Step 1.2, the electric vehicle and the charging station i generate (usk [ i ]],upk[i])←Keygen(1 n ) For signatures, where usk [ i ]]Is a private key, upk [ i]Is a public key and sends upk [ i]Feeding TA;
the electric vehicle, charging station i and TA use an interactive protocol, first randomly generating a sk i Then generating a key pair
Figure FDA0003981005410000016
And the signature of τ η ← Σ · Sign (usk [ i]τ), sent to TA using public key upk [ i [ ]]Checking the correctness of the signature eta, and checking
Figure FDA0003981005410000017
Whether the result is true or not;
if both are correct, the electric vehicle, the charging station uses zero knowledge proof to prove sk i Then, TA randomly generates u ∈ Z p To calculate sigma i ←(σ 1i2i )←(g u ,(g x ·(τ) y ) u ) Finally, TA store
Figure FDA0003981005410000018
To its own database
Figure FDA0003981005410000019
In, and sends σ i For electric vehicle, charging station, electric vehicle, charging station use (sk) ii ,e(σ 1i Y)) as the public key gsk i
Step 1.3, the convergence unit z generates a private key sk [ z ] and a public key pk [ z ] of the convergence unit z, and sends pk [ z ] to the TA;
step 2, when the electric automobile participates in V2G, namely, the V2G network is utilized for charging or feeding power to the power distribution network, the encrypted demand information and the randomized signature are sent to a gathering unit closest to the electric automobile together, and after the gathering unit verifies the encrypted demand information, the encrypted demand information is sent to a block chain which is participated and maintained by all the gathering units together;
step 3, checking the electric vehicle demand information on the block chain in real time by the convergence unit of the area where each charging station is located, judging whether the demand of the electric vehicle is met, and when the demand is met, verifying the identity of each charging station by using a randomized signature, and sending the received demand information to the block chain to realize demand matching of the electric vehicle and the charging stations;
and 4, when the electric automobile and the charging station are disputed in the service requirement matching process, tracing the identity of the electric automobile user through the TA.
2. The controllable anonymous privacy preserving method of claim 1, further comprising:
in step 1, the following contents are specifically included:
a self group public and private key pair is generated between the electric automobile or the charging station and the trusted third party TA through an interactive protocol.
3. The controllable anonymous privacy preserving method of claim 2, further comprising:
in step 2, when the electric vehicle requests service, generating demand information and encrypting the demand information; selecting a random number to randomize the original signature generated by the electric vehicle in the step 1; and the electric automobile sends the encrypted demand information and the signature subjected to randomization processing to the aggregation unit closest to the electric automobile.
4. A controllable anonymous privacy preserving method as claimed in claim 3, characterized by: after receiving the encrypted demand information and the randomized signature sent by the electric vehicle, the convergence unit firstly verifies the signature;
after the verification is passed, the demand information is decrypted, and then the request time in the demand information, the address of the request service, and the electric quantity value required to be charged or capable of being fed are transmitted to the block chain.
5. The controllable anonymous privacy protection method of claim 4, wherein:
in the step 3, the process is carried out,
charging station and electric automobile use intelligent contract to match, and the request information on the intelligent contract block chain is looked over in real time to the charging station, judges whether accord with the electric automobile demand, when according with the demand, uses the signature verification self identity of randomization, will accept on demand information sends the block chain, wherein, whether the following condition is accorded with in intelligent contract block chain judgement: and the power supply time is within the request time, the service address comprises an address requesting service, the supplied power is greater than the requested charging power, and if the conditions are met, the matching is completed.
6. The controllable anonymous privacy preserving method of claim 5, further comprising:
in the step 3, the process is carried out,
if a plurality of charging stations judge that the required content of the electric vehicle can be met, a first-come-first-serve algorithm is adopted, and the charging station power supply requests which are firstly linked and meet the required content are matched.
7. The controllable anonymous privacy preserving method of claim 2, wherein:
in step 3, the charging station verifies the identity of the charging station by using the randomized signature, and the identity of the charging station cannot be linked with the identity of the user.
8. A controllable anonymous privacy protection system facing a smart grid V2G is realized based on the controllable anonymous privacy protection method of any one of claims 1 to 7, and comprises a trusted third party TA, a plurality of convergence units, electric vehicles, charging stations and a block chain unit; the method is characterized in that:
the trusted third party TA is a completely trusted third party organization and is responsible for selecting, releasing and maintaining the security parameters of the system, selecting identity numbers for all the participants, generating public and private key pairs and acquiring the real identity information of all the participants;
the convergence units are communication terminals arranged in an intelligent power grid, each convergence unit completes communication with the electric vehicles and the charging stations in the corresponding area, and the convergence units jointly form and maintain a block chain unit;
the block chain units are used for matching power supply or charging requirements, the electric vehicle and the charging station acquire or write data in the block chain units through communication with the aggregation units, and the aggregation units operate a consensus algorithm to maintain the block chain units;
when the electric automobile is in power shortage and needs to be charged or can feed electricity to a power grid, the electric automobile sends demand information to the convergence unit closest to the electric automobile;
the charging station checks the charging request through the block chain on the aggregation unit, matches the demand and authenticates the demand, realizes the demand matching of the electric automobile, and completes the charging or feeding of the electric automobile.
9. A controllable anonymous privacy protection system as claimed in claim 8, wherein:
the consensus algorithm is a workload certification mechanism or a Byzantine fault tolerance mechanism.
CN202210295870.0A 2022-03-24 2022-03-24 Controllable anonymous privacy protection system and method for smart grid V2G Active CN114629712B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210295870.0A CN114629712B (en) 2022-03-24 2022-03-24 Controllable anonymous privacy protection system and method for smart grid V2G

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210295870.0A CN114629712B (en) 2022-03-24 2022-03-24 Controllable anonymous privacy protection system and method for smart grid V2G

Publications (2)

Publication Number Publication Date
CN114629712A CN114629712A (en) 2022-06-14
CN114629712B true CN114629712B (en) 2023-03-24

Family

ID=81903861

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210295870.0A Active CN114629712B (en) 2022-03-24 2022-03-24 Controllable anonymous privacy protection system and method for smart grid V2G

Country Status (1)

Country Link
CN (1) CN114629712B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102023107805A1 (en) 2023-03-28 2024-10-02 Dr. Ing. H.C. F. Porsche Aktiengesellschaft Method and device for coordination between vehicles and charging infrastructure

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108510252B (en) * 2018-03-24 2020-08-18 北京理工大学 Intelligent electric vehicle power grid safety payment method based on block chain
CN110599261B (en) * 2019-09-21 2022-03-08 江西理工大学 Electric automobile safety electric power transaction and excitation system based on energy source block chain
CN111832066B (en) * 2020-05-20 2022-10-14 南京邮电大学 Block chain assisted V2G security authentication and privacy data aggregation method

Also Published As

Publication number Publication date
CN114629712A (en) 2022-06-14

Similar Documents

Publication Publication Date Title
CN110599261B (en) Electric automobile safety electric power transaction and excitation system based on energy source block chain
Irshad et al. A provably secure and efficient authenticated key agreement scheme for energy internet-based vehicle-to-grid technology framework
CN109687976B (en) Motorcade building and managing method and system based on block chain and PKI authentication mechanism
Garg et al. An efficient blockchain-based hierarchical authentication mechanism for energy trading in V2G environment
CN111083131B (en) Lightweight identity authentication method for power Internet of things sensing terminal
Chen et al. Secure electricity trading and incentive contract model for electric vehicle based on energy blockchain
Liu et al. Role-dependent privacy preservation for secure V2G networks in the smart grid
CN113114630B (en) Authentication method and system for dynamic wireless charging privacy protection of electric vehicle
CN111832066B (en) Block chain assisted V2G security authentication and privacy data aggregation method
Jeong et al. Blockchain based billing system for electric vehicle and charging station
Roman et al. Authentication protocol in CTNs for a CWD-WPT charging system in a cloud environment
Yeh et al. PBS: a portable billing scheme with fine-grained access control for service-oriented vehicular networks
Hussain et al. PBF: a new privacy‐aware billing framework for online electric vehicles with bidirectional auditability
Xia et al. Effective charging identity authentication scheme based on fog computing in V2G networks
CN113079215B (en) Block chain-based wireless security access method for power distribution Internet of things
Nicanfar et al. Security and privacy of electric vehicles in the smart grid context: problem and solution
CN113129518A (en) Electric vehicle charging system and resource management method thereof
CN112019549A (en) Electric power transaction system based on block chain, transaction method and bill query method
CN113395164A (en) Electronic voting method based on ring signature and block chain
CN108494559B (en) Electronic contract signing method based on semi-trusted third party
CN114629712B (en) Controllable anonymous privacy protection system and method for smart grid V2G
CN102404329A (en) Method for validating and encrypting interaction between user terminal and virtual community platform
Zhao et al. A secure and privacy-preserving payment system for Electric vehicles
CN115473623A (en) Method for safely aggregating multidimensional user data in smart power grid
Belkaaloul et al. Anonymous authentication protocol for efficient communications in vehicle to grid networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant