IEEE Access (Jan 2020)

Anonymous Key-Agreement Protocol for V2G Environment Within Social Internet of Vehicles

  • Shafiq Ahmed,
  • Saru Kumari,
  • Muhammad Asad Saleem,
  • Kadambri Agarwal,
  • Khalid Mahmood,
  • Ming-Hour Yang

DOI
https://doi.org/10.1109/ACCESS.2020.3003298
Journal volume & issue
Vol. 8
pp. 119829 – 119839

Abstract

Read online

The blend of Internet of Things (IoT) and social networking has introduced the emerging notion of social Internet of Things, which is bringing advancements in the operation of concerned industries. There are various prevailing applications of social internet of things; smart grid is one of them. The smart grid is considered as economical robust and intuitive replacement of the conventional grid. However, smart grid experiences two significant challenges, i.e. privacy and security. This article is dedicated to resolve the privacy and security concerns for the vehicle to grid networks to facilitate their large-scale integration with smart grids. As anticipation, a vigorous key agreement protocol is introduced to achieve mutual authentication with an aided feature of user anonymity. Moreover, efficiency in terms of computation, communication and storage needs to be taken care for resource-constrained infrastructure like vehicle to grid network. We have introduced a lightweight key agreement protocol using lightweight cryptographic operations such as exclusive-OR and hash etc. This protocol is validated through a formal security model. An informal security analysis is also elaborated to present the security strength of our protocol against well-known attacks. Furthermore, we have implemented all the cryptographic operations used at trusted agent's side on a desktop system, while the operations used at battery vehicle unit's side are implemented on an Arduino to get the experimental results. In the end, we have presented a performance analysis to compare the performance of our protocol with related ones. This comparison highlights that our protocol is not only lightweight but also efficient in terms of communication and storage cost of related protocols.

Keywords