A new lightweight conditional privacy preserving authentication and key – agreement protocol in social internet of things for vehicle to smart grid networks

L Agilandeeswari,Swapnil Paliwal,Anvita Chandrakar,M Prabukumar
DOI: https://doi.org/10.1007/s11042-022-12946-5
IF: 2.577
2022-03-28
Multimedia Tools and Applications
Abstract:Smart grid systems play a vital role in resource management and distributions within a given supply chain. Vehicle-to-grid (V2G) technology is a perfect fit for real-world application as it provides a better and more efficient means for managing electric power. However, ensuring the security and privacy of this technology has become a significant concern, which is due to the difficulty in achieving security goals. In this paper, a lightweight Authentication and Key Agreement protocol named A2P that can ensure low energy consumption and rapid delivery from the source is proposed. Here, a lightweight XOR-based authentication scheme with an unpredictable pseudonym update phase is introduced. The pseudonym update phase is in such a fashion that no relationship amongst two updated pseudonyms can ever be derived even if sensitive information was compromised, thus enhancing privacy. The proposed A2P protocol can reduce the load on the grid and establish an expedited response system for future needs. To provide evidence for the real-time application of the proposal, we have presented a formal and informal analysis of our work. The formal analysis is achieved using Automated Validation Information Security Protocols and Applications (AVISPA), and simulation in the Real – or – Random Oracle (ROR) model, while an informal analysis via proving how our proposals can withstand malicious attacks namely DOS attack, replay attack, party corruption, etc. An extensive performance analysis proves that the proposed A2P system is 22.22% computationally efficient when compared to the related state–of–art methods.
computer science, information systems, theory & methods,engineering, electrical & electronic, software engineering
What problem does this paper attempt to address?