ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article PUF-Based Robust and Anonymous Authentication and Key Establishment Scheme for V2G Networks
Cited 29 time in scopus Download 73 time Share share facebook twitter linkedin kakaostory
Authors
Sungjin Yu, Kisung Park
Issue Date
2024-05
Citation
IEEE Internet of Things Journal, v.11, no.9, pp.15450-15464
ISSN
2327-4662
Publisher
Institute of Electrical and Electronics Engineers Inc.
Language
English
Type
Journal Article
DOI
https://dx.doi.org/10.1109/JIOT.2024.3349689
Abstract
V2G improves flexibility, reliability, and efficiency and ensures effective charging services by enabling two-way communication along with two-way electricity transmission between the power grid and electric vehicle (EV). However, V2G networks are fragile to lethal security threats because an attacker may try to compromise and control the communication participants at any time. Recently, Sureshkumar et al. presented a robust and lightweight authentication and key establishment (AKE) for secure V2G networks to provide essential security properties. However, we prove that their scheme suffered from various security threats and lacked essential security properties. To protect against physical security attacks, a promising solution is the use of physical unclonable function (PUF) technology and many AKE schemes have been designed for V2G networks. However, these schemes are still fragile to machine learning (ML)-based modeling attacks as well as existing security threats. Thus, we design a PUF-based robust and anonymous AKE scheme for V2G networks, called R2AKEV2G to resist ML-based modeling attacks. We prove the security of R2AKEV2G by performing formal security analyses. Moreover, we perform a network simulator (NS) 3 implementation in compliance with IEEE 802.11 to prove its feasibility and verify that R2AKE-V2G is suitable for practical V2G networks. Consequently, R2AKE-V2G supports better security features and functionalities attributes and also guarantees superior costs with regard to communication and computation as compared to existing relevant schemes.
KSP Keywords
Anonymous Authentication, Electricity transmission, IEEE 802.11(Wi-Fi), Key Establishment, Lightweight Authentication, Machine learning (ml), Modeling attacks, Network Simulator(NS2), Physical security, Security attacks, Security properties
This work is distributed under the term of Creative Commons License (CCL)
(CC BY)
CC BY