Next Article in Journal
Supporting Meteorologists in Data Analysis through Knowledge-Based Recommendations
Previous Article in Journal
An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

ECQV-Based Lightweight Revocable Authentication Protocol for Electric Vehicle Charging

by
Abdullah M. Almuhaideb
1,* and
Sammar S. Algothami
2
1
SAUDI ARAMCO Cybersecurity Chair, Department of Networks and Communications, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia
2
Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia
*
Author to whom correspondence should be addressed.
Big Data Cogn. Comput. 2022, 6(4), 102; https://doi.org/10.3390/bdcc6040102
Submission received: 29 July 2022 / Revised: 14 September 2022 / Accepted: 20 September 2022 / Published: 27 September 2022

Abstract

:
In the near future, using electric vehicles will almost certainly be required for the sustainability of nature and our planet. The most significant challenge that users are concerned about is the availability of electric vehicle charging stations. Therefore, to maximize the availability of electric vehicle charging stations, we suggest taking benefit from individual sellers who produce renewable energy from their homes or electric vehicle owners who have charging piles installed in their homes. However, energy services that are rapidly being offered by these businesses do not have a trust connection developed with the consumers and stakeholders in these new systems. Exchange of data related to electric vehicles and energy aggregators can be used to identify users’ behavior and compromise their privacy. Consequently, it is necessary to set up a charging system that will guarantee privacy and security. Several electric vehicle charging systems have been proposed to provide security and privacy preservation. However, ensuring anonymity alone is not enough to guarantee protection from reconstructing the victim vehicle’s route by the tracking adversary, even if the exchanged messages are completely anonymous. Furthermore, anonymity should not be absolute in order to protect the system and function as necessary by all entities. In this research, we propose an effective, secure, and privacy-preserving authentication method based on the Elliptic Curve Qu–Vanstone for an electric vehicle charging system. The proposed scheme provides all the necessary requirements and a reauthentication protocol to minimize the overhead of subsequent authentication processes. To create credentials and validate electric vehicles and energy aggregators, the scheme makes use of the Elliptic Curve Qu–Vanstone implicit certificate mechanism. The new protocols give EVs security and privacy while cutting computational time by 95% thanks to reauthentication, as demonstrated by the performance comparison with earlier works.

1. Introduction

Transportation produces over 30% of global greenhouse gas (GHG) emissions, which has a big impact on air quality [1]. With environmental concerns and a reduction in fossil fuel consumption, countries are increasingly promoting clean renewable energy alternatives to fossil energy. The electric vehicle (EV) is a good choice for tackling the energy crisis and climate change because it is reasonably priced and emission-free. EVs have recently attracted a lot of attention as a way to cut fuel use and GHG emissions and increase energy efficiency [2].
For three primary reasons, the growth of EVs is expected to continue, even with a higher rate of adoption in the coming years [3]:
  • Clean-fuel vehicles and initiatives to reduce carbon emissions should be encouraged: Saudi Arabia, the world’s leading oil producer, declared that at least 30% of the cars in its capital city will be electric by 2030. Similarly, China seeks 25% of all new cars to be electrified by 2025. The UK attempts to stop producing and selling fossil-fuel vehicles by 2030 [4].
  • Resolve uncertainty for EV drivers: EV drivers still face uncertainty, even though more people are adopting the technology. As reported by the climate group EV100′s members, the most significant challenge that users are concerned about is the availability of EV charging stations (e.g., charging station location, EV parking space, and charge cost) [5,6]. As a result, charging stations need to be strategically positioned and used efficiently as the demand for EVs increases [7]. Because work was disrupted in major areas due to the COVID-19 pandemic, the installation of publicly available chargers increased by 45%, a slower rate than the 85% seen in 2019. The company also cited a persistent barrier as the lack of suitable vehicle types. The cost of buying an electric vehicle remains a significant barrier [5];
  • Make EV charging a smooth experience: Remote control using smartphone applications is one of the features of smart EV charging. This feature makes EV charging faster as well as easier to use and, hence, more accessible to a wider variety of clients [3].
Advancements in distributed renewable production, storage systems, and EVs are causing evolving energy systems to become more decentralized. Energy services are rapidly being offered by businesses (such as individual sellers who produce renewable energy from their homes or EV owners who have charging piles installed in their homes) that have not developed trust connections with the consumers and stakeholders in these new systems [8]. The quality of power distributed by the grid is impacted by unregulated electric vehicle charging systems, which results in significant load changes in the electrical grid. As a result, existing energy systems experience severe negative effects, such as higher load peaks, degradation in power quality, and higher consumption of energy [9].
While an EV is connected to an electric vehicle charging station (EVCS), the energy aggregator (EAG) and EV continually exchange information. The EAG functions as an information collector for EVs and controls the charging of the EVs. The EV reports confidential details, such as the EV’s identity (ID), battery status, consumed energy, and geographical location, to potentially untrustworthy charging entities [10]. The EV can share its distance from the service provider to hide the vehicle’s exact location from adversaries. However, it is feasible for adversaries to determine the EV’s precise location when its distance is disclosed [11]. Additional critical information, including the EV’s identification information, its owners, and its travel behavior, can be inferred from the given information [12]. The information shared can be subject to numerous forms of attacks, since the EV and EAG connect using the internet, Wi-Fi, Bluetooth, dedicated short-range communications (DSRC), etc. These attacks may lead to inconsistent battery charging, poor EVCS operation, money theft, incorrect payment transaction outcomes, and more. The primary attacks that could happen are denial-of-service (DoS) attacks, replay attacks, impersonation attacks, and man-in-the-middle (MITM) attacks [10].

1.1. Problem Statement

One of the biggest hurdles to the widespread adoption of EVs is EV charging. Legal authorities are responsible for issuing EV credentials, which allow vehicle identification and authentication. Because these credentials hold EVs’ genuine identifiers, they can be used to track vehicles. Furthermore, certain data in the electrical transactions must be hidden to prevent personal information (e.g., EV identity, battery charge status, geographical location, payment information, etc.) from being leaked. Furthermore, if a vehicle is not validated, an adversary vehicle can easily imitate an authorized vehicle to broadcast false information. This is because trading data can be utilized to analyze individuals’ behaviors and invade their privacy. For instance, EV charging schedules can reveal when an owner remains at home or outside, allowing potential criminals to attempt robbery [13]. Furthermore, the majority of deployed EV charging stations lack physical security and are seldom supervised; an adversary could cause damage to it or install malware in them. Such malware could be utilized to steal energy, obtain users’ data (such as ID card number to impersonate their identity for a transaction), or disrupt EV charging by causing a denial of service [14]. Additionally, in a wireless sensor network (WSN), a passive adversary may secretly intercept messages and employ traffic analysis methods to deduce details about the structure of the network topology and the profiles of network entities [15]. As a result, how to protect end-user privacy while dealing with electrical transaction data becomes a significant privacy-preserving challenge for researchers throughout EV charging and discharging.
An Elliptic Curve Qu–Vanstone (ECQV)-based EV charging system may be created to address these issues and provide security and straightforward authentication to EV clients. The ECQV implicit certificate is necessary for enabling mutual authentication, key establishment, and secret key exchange for Internet of Things (IoT) devices. There have been several EV charging solutions suggested to offer security and privacy preservation. However, the terms privacy and anonymity are sometimes used interchangeably. Privacy is much broader and refers to all aspects of maintaining user privacy, whereas anonymity is focused on maintaining user identity confidentiality. These systems tend to lack in achieving a balance between the need for privacy (trade traceability to achieve anonymity, etc.) and security considerations.

1.2. Paper Motivation and Contribution

In an effort to meet the requirements for preserving privacy and security mentioned previously, these are the contributions made by this paper:
  • Present an ECQV-based authentication solution that is more effective at preserving privacy and providing secure authentication for electric vehicle charging stations;
  • Use Burrows–Abadi–Needham (BAN) logic and the AVISPA simulation tool to conduct a formal security study to demonstrate that the proposed scheme is secure against numerous attacks. In addition, we perform an informal security analysis to show the proposed protocol’s security;
  • Compare the computational costs with other related work, to illustrate that the proposed techniques will perform better.

1.3. Paper Organization

Following is the format for the remaining portion of the paper: Section 2 covers the preliminary material. In Section 3, we show an analysis of the literature that is relevant to the proposed protocol. In Section 4, the proposed scheme is presented. The formal and informal security analyses are discussed in Section 5. In Section 6, security, functional, and computational aspects are compared with those of related schemes. Finally, Section 7 is the conclusion.

2. Preliminaries

The criteria for EV charging’s authentication solution are covered in this section. Additionally, the concept of an elliptic curve Qu–Vanstone (ECQV) implicit certificate is introduced in this section.

2.1. Solution Requirements

Authentication that protects the privacy and the system’s ability to thwart both active and passive attacks (against system entities) are necessary for the feasibility and acceptability of EV charging systems. These key security requirements must be met before a charging system may be used. However, the current approaches have flaws that raise several questions about EV charging systems. As a result, the proposed scheme needs to fulfill the following criteria:
  • Mutual authentication: The system must allow the parties to confirm one another’s identities and guarantee that communication is based on trust. To verify the EAG’s identification and registration with the trusted charging system operator (OP), the EV must authenticate the EAG. The EAG will verify the EV’s registration with the OP concurrently. The OP issues certificates for authentication, consequently reducing the likelihood of a masquerade attack [16];
  • Anonymity: Anonymity is the capability to evade being recognized within a group of subjects. The EV’s true identity should not be revealed to the EAG while it is charging [17]. Un-traceability is the ability to keep the activities of a subject un-traceable. Eavesdroppers cannot guess or trace the EV’s activities [16];
  • Un-linkability: Un-linkability is where the attacker cannot tell whether two actions are related. EVs during various charging sessions should not be linkable [17];
  • Traceability: This characteristic guarantees that, if necessary, the trustworthy organization (OP) can determine or reveal a malicious EV’s real identity [18];
  • Perfect forward security: If a long-lasting private key is exposed, the adversary cannot obtain a future session key [19];
  • Perfect backward security: If a long-lasting private key is exposed, an adversary cannot obtain the old session key [19];
  • Joint key control: The session key will be created using a random number that is contributed by both EAG and EV. As a result, no other party has access to or can acquire any session keys;
  • Effective reauthentication: The process where the EAG reauthenticates the EV, causing an overhead. The EAG should, therefore, be able to verify the EV using the information given by a reliable third party (OP) during the initial encounter. Therefore, the EAG does not need to rely on the OP for future access because it can reauthenticate the EV;
  • Revocation method: If a user’s registration is ended or the EAG/EV secret key is publicly disclosed, the corresponding information should be revoked. It is critical to grant a revocation mechanism for the system;
  • Attack resistance: Adversaries may launch attacks during the communication between EAG and EV, as it is carried out in an insecure environment. Thus, the proposed scheme must be capable of thwarting attacks such as MITM attacks, replay attacks, impersonation attacks, etc.

2.2. ECQV Implicit Certificates

In comparison to the standard certificate (such as X.509 certificates), the implicit certificate provided by the ECQV method offers the advantages of having a smaller certificate that is computationally quicker and more ideal for IoT devices with limited resources [20].
A conventional certificate needs to have its signature verified, whereas an implicit certificate only needs to have its public key derived, and the latter is quicker than the former. The entity seeking the security material is the only one who can derive the private key; hence it is not even accessible to the certificate authority (CA). Hence, the technique is protected against key escrow attacks. Furthermore, a secure connection is not necessary during the operation because all variables may be delivered via the open channel [21].
(1)
ECQV Basic Notations
In Table 1 below, the fundamental notations used in the ECQV scheme are defined.
(2)
ECQV Algorithms
ECQV implicit certificates are produced using ECQV technology, which is based on elliptic curve cryptography. The elliptic curve domain settings for this method must be agreed upon by the entities and the CA before it can be used. Figure 1 shows the details of this strategy, which consists of three steps [22]:
  • ECQV certificate request: A user generates an EC pair of keys and sends the public key together with the user’s ID to the CA;
  • ECQV certificate generation: The CA validates the ID and creates data for public reconstruction that may be used to obtain the user’s public key. Next, ECQV certificate data are incorporated and contain both ID and public reconstruction information. The resulting ECQV certificate and the private key of the CA are then used to compute the user’s private reconstruction data. The user then receives the private reconstruction data and the ECQV certificate from the CA;
  • ECQV certificate reception: The user creates a public/private-key pair using the first step’s private key, private reconstruction information, and ECQV certificate (acquired from CA). In order to confirm that the obtained certificate was indeed issued by the CA, the user then performs a verification process.
IoT devices can create a secure communication channel using ECQV implicit certificates and Elliptic Curve Diffie–Hellman (ECDH) for authenticated key exchange. The process of the ECQV implicit certificate-based authenticated key exchange algorithm is presented in Figure 2.

3. Literature Review

The most relevant, significant EV charging privacy preservation and security techniques are reviewed in this section. Multiple security systems already in use are discussed, as well as their advantages and disadvantages, along with the efforts this study took to solve the issues. To simplify the authentication process and make it less difficult, this work aims to propose a safe authentication strategy for EV charging that protects the privacy and offers a reliable reauthentication mechanism. Previous works in the security and privacy systems sectors have been reviewed for the intended outcome.
There are two main categories that the authentication protocols fall into: public-key authentication and symmetric-key authentication. Asymmetric cryptography, commonly known as public-key cryptography, is an encryption/decryption technique that utilizes a key pair made up of public/private keys [23]. However, symmetric-key cryptography relies on a single key that may be used for both encryption/decryption [24].
It was recently demonstrated that utilizing only XOR and hash operations in symmetric-key-based authentication protocols [25,26,27] can ensure anonymity and the un-traceability of a user’s behavior. Li et al. (2017) applied symmetric-key cryptography to provide an authentication technique for a dynamic charge system. The technique enables EVs to authenticate anonymously to charging piles (CP) while maintaining their geographical privacy. However, the process of forwarding the credentials (pseudonyms) and the distribution of associated keys to all CPs is inefficient, as it requires a large space to store all these data within CPs and leads to communication overhead. Additionally, an EV’s real identity is revealed to the service provider to create the pseudonym identity, which is risky and expensive computationally [25].
For EV charging, a blockchain-based security model was proposed by Huang et al. (2018). It provides mutual authentication through symmetric-key cryptography. However, the lightning network charging mechanism was not efficient, and the system was not able to protect the security of the keys. Moreover, the proposed model lacks privacy-preserving features such as anonymity, un-likability, and traceability. Moreover, the proposed authentication protocol requires a secure channel between EV and CP, which is hard to establish and increases the overall cost of the system [26].
The blockchain-based security framework introduced by Kim et al. (2019) used XOR and hash operations to reduce the computational cost of communication. However, the process of authentication must be repeated for each charging session. Furthermore, due to the requirement of all nodes to solve the mathematical computation, the system suffers from latency as the number of electric vehicles grows. Moreover, it does not provide some required privacy-preserving features including un-linkability and traceability [27].
To guarantee secure communication among the various network components, a combination of asymmetric and symmetric cryptography with simple hashing can be used. ElGhanam et al. (2021) applied this combination to provide a lightweight authentication mechanism that enables legitimate EVs to charge while assuring secure and fair payments. The mechanism resists well-known attacks such as replay attacks, MITM attacks, and impersonation attacks. For privacy preservation, it ensures an EV’s real identity, anonymity, and un-linkability through the utilization of pseudonyms for each charging process. However, it only provides partial privacy preservation to the EV, as it fails to ensure traceability. If required, the charging company cannot disclose the true identity of the EV that is acting maliciously or inappropriately. They encouraged other researchers to utilize asymmetric cryptography techniques to reduce the computational costs of their scheme [28].
For dynamic charging systems, Babu et al. (2021) presented a robust elliptic curve cryptography-based authentication mechanism. The proposed scheme can mitigate well-known EV attacks including replay attacks, MITM attacks, impersonation attacks, etc. For privacy preservation, it ensures an EV’s anonymity and un-traceability. However, similar to other studies in the literature review, it only provides partial privacy preservation to the EV, as there are no mechanisms for un-linkability, traceability, or reauthentication to cut down on communication costs during the authentication process [29].
To preserve the privacy of vehicles, an EV can be first authenticated to the EVCS using a blind signature [30,31,32]. A digital signature known as a “blind signature” enables the user to have the signer sign any document without being aware of what it contains [33]. Rabieh and Wei (2017) applied a blind signature along with a hash chain to authenticate EVs for dynamic charging while keeping their identities anonymous and un-linkable to other sessions. This was achieved through the usage of pseudonym tickets (to ensure un-linkability) that are published in the revocation list used for authentication and the need for EVs to authenticate themselves multiple times in all phases of the scheme. Unfortunately, the scheme suffers from latency and requires large storage as the number of EVs increases. Moreover, these pseudonyms are generated by EVs randomly and are unregulated. If an EV generates a repeated pseudonym without its knowledge, it will be rejected at the charging center [30].
A partial blind signature along with a hash chain to authenticate EVs for dynamic charging was proposed by Gunukula et al. (2017) to maintain privacy (anonymity and un-linkability). It guarantees resistance to MITM attacks; however, it does not investigate other attacks that could have a wide impact on the system. Furthermore, the system relies on the bank to verify the validity of charging coins, which in turn causes a delay in the authentication process [31].
Roman and Gondim (2019), proposed an authentication protocol for EV dynamic charging infrastructure based on a blind signature along with a hash chain. It ensures resistance to well-known attacks, anonymity, and un-linkability. On the other hand, the scheme requires a secure channel (as it reveals EVs’ real identities) in the ticket-purchasing phase; secure channel establishment is hard and is mainly achieved by physical contact prior to the service request from the charging company. We believe that better solutions exist for handling such requirements [32].
Other techniques used to authenticate EVs and maintain their privacy are public-key, sign-encryption, and group-signature algorithms. They allow signing messages exchanged by EV users, making it impossible for malicious individuals or other network attackers to learn target EVs’ real identities. In contrast to the signature-then-encryption method, signcryption is public-key cryptography (PKC) primitive that simultaneously delivers a digital signature and public-key encryption [34].
Xia et al. (2021) applied the concept of group-signature-based authentication to eliminate the disclosure of an EV’s identity to entities other than the CA. Fog computing was used to reduce the interaction between EVs and cloud servers. However, the scheme needs to reduce the entities’ interaction, as it is considered to be high [35].
Two of the techniques used to improve the protocol’s communication cost are partial identity-based signcryption (IBSC) and pairing-based protocol for EV group authentication, as in the protocol proposed by Roman et al. (2019), where a group message is used to protect the anonymity of EVs. The protocol ensures communication confidentiality, location privacy, and resistance to several attacks. However, at the registration stage, a public/private-key pair is generated for the group; due to this process, there is a need for larger storage and the issue of single-group association must be considered (unchanged until EV requests to leave the group). Furthermore, there is no plan in place to guard against the compromise of single-group association [36].
Kumar et al. (2020) introduced a framework for EV charging using signcryption cryptography to ensure security and privacy preservation. It uses pseudo-identity to provide anonymity for EVs and it resists several attacks including replay attacks, MITM attacks, impersonation attacks, etc. However, the scheme does not provide un-linkability, traceability, or a mutual or reauthentication mechanism to reduce the overhead of the authentication process [37].
Public-key infrastructure (PKI) with smart cards or contract certificates was proposed by Vaidya and Mouftah (2020) to authenticate EVs in plug-and-charge systems. The scheme ensures resistance to MITM and impersonation attacks. However, it does not provide assurance against replay and stolen card attacks, and it is feasible to eavesdrop on data exchange by placing fake card reader devices. Moreover, the system lacks the protection of EV privacy. The scheme has low communication, but it lacks security and privacy [38].
Additionally, according to [39], group-signature authentication has some drawbacks that should be taken into account when designing the system, such as how the private key for the group of EVs is distributed, how frequently the public/private-key pairs need to be changed, and how the key management mechanism works.
Many security protection solutions in vehicle-to-grid (V2G) networks currently rely on anonymity, pseudonymity, and encryption technologies. To address the issue of anonymity, existing research and protocols employ traditional processes such as blind signatures and bilinear pairing. The performance–security trade-off is significantly impacted by all of these systems’ high processing and communication requirements. Due to the complexity of signature and encryption mechanisms, the time required for authentication between an EV and the power grid would significantly increase (such as blind signatures). Simple anonymity and pseudonym solutions are no longer sufficient in addressing the issue of identification for EV users [40].
Solutions by [26,30,32] require a secure channel to purchase the tickets, which is both hard to establish and costly. PKI is the only way to avoid such a secure channel [38]. Studies [30,32] use certificates to initially register and authenticate and are categorized as token-based authentication schemes, as they use tickets for EV authentication. For security and privacy preservation, various blockchain-based EV charging systems have been developed. Anonymous communication hides an EV’s real identity; however, if the same anonymous ID is used multiple times, it threatens the EV’s privacy (un-linkability). By linking data to other publicly available datasets such as transactions, data might be utilized to execute privacy-related linkage attacks, and the cloud can carry out attacks using a variety of data-mining techniques and algorithms. However, absolute anonymity is the main privacy feature considered in most of these systems, which is not sufficient in maintaining order in the EV charging infrastructure [41].
As IoT devices tend to be resource-constrained and the applications of vehicular ad hoc networks (VANETs) are latency-critical, Ha et al. (2016) introduced a security scheme based on ECQV implicit authentication. For IoT devices to have mutual authentication, key establishment, and key exchange capabilities, an ECQV implicit certificate is essential. Ha et al. were able to demonstrate through a computational test that ECQV implicit certificates are preferable to traditional certificates for use in IoT devices with limited resources [22]. In their study, Baee et al. (2019) explored how much the authentication overhead in latency-critical apps affects the safety of EV drivers. They also demonstrated that combining the Elliptic Curve Digital Signature Algorithm (ECDSA) and ECQV over the National Institute of Standard and Technology (NIST) P-256 curve and validating certificates can be a viable solution [42].
The earlier authentication techniques did not consider other fundamental privacy-preserving criteria in VANETs, such as un-linkability and traceability. These requirements integrate into each other because the EV’s real identity is hidden, different sessions are not linkable, and misbehaving anonymous vehicles are traced by authorities. Additionally, we noticed that the concept of token-based reauthentication for authentic EVs within a short period of time has not been tackled. Our work is the first to suggest using ECQV to authenticate EVs EAGs in the charging system, to our knowledge. In order to ensure that the privacy of EVs is maintained for EV charging systems, we provide a lightweight ECQV-based authentication scheme. It delivers reliable and safe authentication and reauthentication.

4. Proposed System

In this section, we present the proposed authentication protocols that address the solution requirements. Table 2 details the notation used for this scheme’s phases: (1) Initialization, (2) Registration, (3) Authentication, and (4) Charging.

4.1. System Architecture

The entities electricity operator (OP), energy aggregator (EAG), and electric vehicles (EVs) compose our scheme. Figure 3 shows the architecture, and the list of entities in our design are listed below:
  • Operator (OP): Any EV or EAG seeking to use the charging system must first register their identification information with the OP, where OP acts as the initializer for the proposed protocol. Authorized EVs can use the EAG’s services and develop trust with one another because the OP acts as a certificate generator (trusted third party). The OP can also identify malicious or misbehaving nodes by revealing their identities;
  • Energy Aggregator (EAG): A data aggregator is a smart device or collection of smart devices that serves as a data aggregator of available EV power information while the EVs are charging and supplying power to the EVs via a number of EVCSs. To coordinate the charging, the EAG has an authentication mechanism to identify authorized EVs;
  • Electric Vehicle (EV): It is a smart device that communicates charging requests to EAGs and mutually validates an EAG’s eligibility to use its service (charging).
From the architecture in Figure 3, the first step in establishing the communication between an EV and an EAG is the registration with an OP. After receiving credentials, these entities become part of the system and can communicate and authenticate each other if necessary. After successful verification, the EV can access a charging service. The EAG authenticates the EV using the A E V signed by the OP and A i d i by the EV, without the direct involvement of the OP. The other way around, the EV authenticates the EAG using A E A G signed by the OP to thwart impersonation attacks. The proposed solution makes use of symmetric, ECQV, and PKC methodologies to ensure secure communication and to shorten the computation time in order to establish mutual authentication between the EV and EAG. For effective reauthentication, the proposed solution permits the reuse of A T E V E A G (similar to [43] and our previous work [44]) and utilizes the speed constraint in [11] to countermeasure location-related attacks. A T E V E A G is issued by the EAG once it has authenticated the EV. The utilization of A T E V E A G reduces the time required to verify A E V in upcoming charging requests. Since there are not enough public EVCSs, which is the main problem with the EV charging infrastructure, EV owners may help other EVs in need by lending them their personal charging stations. In return, personal EVCS owners can earn some incentives through sharing with other EVs or by selling excess power to OPs.

4.2. Threat Model

The EAG is responsible for energy node matching and providing location-based services to electric vehicle owners during the energy trading process. We assume that the location-related communication is not secure enough (internet, Wi-Fi, Bluetooth, dedicated short-range communications (DSRC), etc.), and adversaries can use these services to determine the precise location of the target EV owner. Since EV owners’ location data includes vital information such as their house, workplace, hospitals, and so on, once learned by the adversary, the privacy of EV owners will be compromised, and their personal safety may be jeopardized.
The two types of attackers that are interested in obtaining the location data and credentials of EV owners are outsider and insider attackers. The transaction data collected by the system can be used by an outsider attacker to obtain information about the location of EV owners; a malicious internal node in our proposed scheme acts as an insider attacker and can gather user data. We assume that the EAG is a potential insider threat who is capable of learning the credentials or precise location of EV owners throughout the trading process.

4.3. Initialization Phase

The following steps describe how the OP initializes the system to set up the network:
Step 1:
A base point G of order n is chosen by OP on the elliptic curve E p , where n is a significant prime number. Select the curve coefficients a and b , field size q , and cofactor h , where h n is the number of points on the elliptic curve (these are the elliptic curve domain parameters);
Step 2:
Select an approved hash function H . . The OP and certificate requester (EV or EAG) specify the generator of random numbers to be used throughout the certificate request/creation procedures to generate the private keys;
Step 3:
OP obtains an EC-key pair ( P R O P ,   P K O P ), which is associated with the elliptic curve domain parameters (established in the first step).
Step 4:
Both EV and EAG obtain, in an authentic manner, the EC domain parameters, H . , and P K O P (OP’s public key).

4.4. Registration Phase

Before EVs and EAGs can join the charging system, they must produce their identities and pair of public/private keys. After which, they receive the corresponding certificate, authenticator, information about constructing the private key, and anonymous identity from the OP (for EV only).

4.4.1. EV Registration

The registration process for EVs is presented in Figure 4 and is detailed as follows:
Step 1:
EV selects its identity i d E V ; generate EC-key pair ( k E V ,   R E V ), where k E V   ϵ R   1 ,   ,   n 1 and R E V = k E V . G . Compute I E V = h R E V ,   i d E V ,   N E V to ensure integrity. Then, send it to OP i d E V ,   R E V ,   N E V ,   I E V encrypted with P K O P (OP’s public key);
Step 2:
OP retrieves the content of the message using its private key P R O P and verifies I E V . Then, choose k   ϵ R   1 ,   ,   n 1 and generate EV’s implicit certificate C e r t E V = R E V + k G ; compute e = h C e r t E V , S E V = e k + P R O P m o d   n , the private key construction data of EV. OP uses Formula (1) to create EV’s pseudo-identity and signs it using OP’s private key, where the real identity of EV is encrypted with P K O P to assure its anonymity and A i d i is agreed to be incremented sequentially ( A i d N o ) by EV itself every time it requests a service. Compute EV’s authenticator using Formula (2), which contains the issued C e r t E V with its time-life ( T L ) signed using the private key of OP. Compute A H E V = H A E V to ensure integrity. Compute registration key R K = h ( R E V , N E V ,   P K O P ) that is shared between OP and EV only. Then, send to EV A E V ,   A H E V ,   A i d i , S E V encrypted with R K . Lastly, OP destroys R E V , k , S E V to prevent the possession of EV’s private key by an adversary;
A i d i = { ( S i g O P   P K O P i d E V , T L ) ,   A i d N o }
A E V = { ( S i g O P   C e r t E V , T L ,   A i d i )
Step 3:
EV calculates the shared registration key R K = h ( R E V , N E V ,   P K O P ) to retrieve and verify A E V ,   A i d i through OP’s public key and check A H E V . Compute e = h C e r t E V to generate its private/public-key pair P R E V / P K E V using Formulas (3) and (4).
P R E V = e . k E V + S E V m o d   n
P K E V = e . C e r t E V + P K O P
To ensure the validity of P K E V , it computes P K E V = P R E V . G ; then, check if P K E V = = P K E V as follows:
P R E V = e . k E V + S E V m o d   n = e . k E V + e . k + P R O P m o d   n = e . ( k E V + k ) + P R O P m o d   n )
C e r t E V = R E V + k G   = k E V . G + k . G = ( k E V + k ) . G
P K E V = e . C e r t E V + P K O P   = e . ( k E V + k ) . G + P R O P . G         = e . ( ( k E V + k ) + P R O P ) . G = P R E V   . G
After the validation of P K E V = = P K E V , EV adds its signature to A i d i using its own private key. Lastly, EV stores { A E V , A i d i } encrypted with P K E V in memory (on-board unit—OBU). Destroy R E V , k E V , S E V to prevent the possession of an EV’s private key by an adversary.

4.4.2. EAG Registration

The registration process for the EAG is presented in Figure 5 and is detailed as follows:
Step 1:
EAG selects its identity i d E A G ; generate EC-key pair ( k E A G ,   R E A G ), where k E A G   ϵ R   1 ,   ,   n 1 and R E A G = k E A G . G . Compute I E A G = h R E A G ,   i d E A G ,   N E A G to ensure integrity. Then, send it to OP i d E A G ,   R E A G ,   N E A G ,   I E A G encrypted with P K O P .
Step 2:
OP retrieves the content of the message using its private key P R O P and verifies I E A G ; choose k   ϵ R   1 ,   ,   n 1 and generate EAG’s implicit certificate C e r t E A G = R E A G + k G ; compute e = h C e r t E A G , S E A G = e k + P R O P m o d   n , the private key construction data of EAG. Compute the authenticator by Formula (8); it contains the issued C e r t E A G , i d E A G , its time-life ( T L ) signed using the private key of OP. Then, compute A H E A G = H A E A G to ensure integrity. Compute registration key R K = h ( R E A G , N E A G ,   P K O P ) that is shared between OP and EAG only. Then, send it to EAG A E A G ,   A H E A G , S E A G encrypted with R K . Lastly, OP destroys R E A G , k , S E A G to prevent the possession of EAG’s private key by adversaries.
A E A G = ( S i g O P C e r t E A G ,   T L ,   i d E A G
Step 3:
EAG computes the registration key R K = h ( R E A G , N E A G ,   P K O P ) to retrieve and verify the A E A G through OP’s public key and checks A H E A G . Compute e = h C e r t E A G to generate its private/public-key pair P R E A G / P K E A G using Formulas (9) and (10).
P R E A G = e . k E A G + S E A G m o d   n
P K E A G = e . C e r t E A G + P K O P
To ensure the validity of P K E A G , it computes P K E A G = P R E A G . G ; then, check if P K E A G = = P K E A G as follows:
P R E A G = e . k E A G + S E A G m o d   n = e . k E A G + e . k + P R O P m o d   n = e . ( k E A G + k ) + P R O P m o d   n )
C e r t E A G = R E A G + k G = k E A G . G + k . G = ( k E A G + k ) . G
P K E A G = e . C e r t E A G + P K O P = e . ( k E A G + k ) . G + P R O P . G   = e . ( ( k E A G + k ) + P R O P ) . G = P R E A G   . G
After the validation of P K E A G = = P K E A G , EAG stores A E A G encrypted with P K E A G in memory and destroys R E A G , k E A G , S E A G to prevent the possession of EAG’s private key by an adversary.

4.5. Authentication Phase

When an EV wishes to access the charging system, the EV and EAG must authenticate one another and create a session key. The authentication phase is separated into two groups: mutual authentication, in which EV and EAG have not yet developed a relationship of trust. Thus, they rely on the information provided by the OP (third party). The second is lightweight reauthentication, where the EV and EAG authenticate each other on their own without a third trusted party (OP).

4.5.1. Mutual Authentication Protocol

This process is conducted initially, where the EAG relays on the OP’s information to authenticate the EV, unless A E V is terminated. Figure 6 illustrates the procedure and provides the following details:
Step 1:
EV generates the charging request C H E V = a m o u n t ,   p r i c e , d i s t a n c e , T L , where “ a m o u n t ” states the amount of power needed, “ p r i c e ” specifies how much the EV is willing to pay for the service (to keep the location of the EV private), “ d i s t a n c e ” should specify how far it is from the local EAG, and “ T L ” states the time-life of the request. Then, EV sends C H E V to their local EAG;
Step 2:
The EAG sends its A E A G ,   A H E A G as a response to the EV charging request;
Step 3:
EV verifies A E A G through OP’s signature and checks if it is valid by the T L ; retrieve C e r t E A G and compute e = h C e r t E A G to extract the EAG’s public key P K E A G = e . C e r t E A G + P K O P . Generate a random number N E V , time stamp T E V , and the master shared key K E V E A G using Formula (14). Increase the A i d i counter one at a time (by adding 1 to the previous EV’s pseudo-identification) to generate a new anonymous identity for the current session. This prevents linking between multiple sessions of an EV. Then, send to EAG A E V , A i d i ,   N E V ,   T E V encrypted with P K E A G .
K E V E A G = P R E V   .   P K E A G = P R E V   .   P R E A G   . G
Step 4:
To decrypt the message, EAG employs its own private key and uses OP’s signature to confirm that A E V is authentic, and checks T E V to make sure the message is not being replayed. Compute e = H C e r t E V to extract EV’s public key P K E V = e . C e r t E V + P K O P . Verify A i d i by OP’s signature and EV’s signature ( P K E V ) that is included in it. Then, generate N E A G , T E A G , the master shared key using Formula (15), and the authorization token by Formula (16), where A i d i ,   K E V E A G are encrypted with P K E A G . Moreover, generate the initial and session key using Formulas (17) and (18), receptively. Then, send to EV A T E V E A G ,   T E A G encrypted by I K E V E A G , the EAG schedule charging service for EVs that is protected by S K E V E A G .
K E V E A G = P R E A G   .   P K E V = P R E A G   .   P R E V   . G
A T E V E A G = S i g E A G A T N o ,   T L ,   i d E A G ,   P K E A G P K E V ,   K E V E A G ) }
I K E V E A G = h i d E A G ,   N E V ,   T E V
S K E V E A G = h K E V E A G ,   A T N o ,     P K E V ,   N E V
Step 5:
EV generates I K E V E A G by Formula (17) to retrieve A T E V E A G ,   A T N o and checks the validity of T E A G . Next, create the session key to be used during the charging session using Formula (18). EV stores the A T E V E A G issued by EAG, and updates A i d i . By the end of this process, EV and EAG shall have both established trust between them, without having to depend on OP in the future for session authentication.

4.5.2. Lightweight Mutual Reauthentication Protocol

As noted before, at this point, the EV and EAG should have developed a relationship of trust. Now, they can directly and mutually authenticate one another in upcoming charging services. Since charging is a rapidly needed service and a matching process is vital in providing the service, reauthentication can guarantee faster matching for the EV to obtain the service faster. When the user has a valid A T E V E A G and is scheduled to the same aggregator within a 48-h period, this phase (reauthentication phase) can be utilized. The reauthentication time window is chosen on the basis of EVs’ frequent need for recharging and due to EV memory constraints. Furthermore, if the user is already trusted, it is impractical and expensive to generate all the variables for a new session key. The process of efficient reauthentication is presented in Figure 7, detailed as follows:
Step 1:
EV creates N E V ,   N E V , and applies Formula (18) to determine the previous session key to be used in A i d i , N E V ,   T E V encryption. Increment the A i d i counter sequentially (add 1 to the EV’s previous pseudo-identity) to have a new anonymous identity for this session to maintain un-linkability. Then, EV sends A T E V E A G , N E V ,   { N E V } S K E V E A G to EAG.
Step 2:
EAG validates the authenticity of A T E V E A G via the signature S i g E A G using P K E A G and T L . Decrypt the A T E V E A G using P R E A G to retrieve P K E V ,   K E V E A G . EAG needs to compute S K E V E A G in order to obtain A i d i , N E V ,   T E V , and confirm that the A T E V E A G was transmitted by the authorized EV. Then, use N E V , T E V , A i d N o , A T N o to generate the temporary key T K E V E A G using Formula (19). Generate N E A G ,   T E A G , a fresh session key S K E V E A G as in the Formula (20). EAG then sends N E A G ,   T E A G encrypted by T K E V E A G to EV. The EAG manages the EV charging service that is secured by S K E V E A G .
T K E V E A G = h A T N o ,   A i d N o ,   N E V ,   T E V
S K E V E A G = h T K E V E A G ,   K E V E A G ,   N E A G ,   P K E V
Step 3:
EV generates the T K E V E A G to retrieve N E A G and verifies T E A G . Then, use Formula (20) to create S K E V E A G for the charging session; A i d i is updated.

4.6. Revocation Protocol

The scheme offers a revocation mechanism to protect the entities from malicious impersonation and MITM attacks and announce that the parameters are no longer reliable even before the validity period has expired. A i d i and A T E V E A G tokens are revoked in case the EV suspects they were stolen by an adversary, with recency proof (RP) confirming the legitimacy of the OP (e.g., month-old time-stamp proof). The process of A i d i revocation is detailed as follows:
Step 1:
EV creates the A i d i revocation request R e v E V i d = { P K O P S i g E V , A i d i ,   R e v A i d ,   T E V } ; forward it to OP after being encrypted with OP’s public key P K O P .
Step 2:
OP decrypts the revocation request by its P R O P and verifies S i g E V using P K E V and S i g O P , which is within A i d i , and to avoid replay attack, OP checks T E V to verify whether it is valid or not. Finally, OP updates the A i d i status as revoked. A fake revocation request cannot be produced by the adversary since EV’s signature is necessary.
The process of A T E V E A G revocation is detailed below:
Step 1:
EV uses Formula (21) to create the A T E V E A G revocation request, which is subsequently sent to EAG after being partially encrypted using Formula (22).
R e v E V A T = A T E V E A G , N E V ,   V K E V E A G S i g E V , T E V ,   R e v A T ,   A T N o
V K E V E A G = h K E V E A G ,   A T N o ,   N E V
Step 2:
EAG validates the A T E V E A G through the signature using P K E A G and decrypts internal part P K E A G P K E V ,   K E V E A G using its P R E A G . Then, EAG uses K E V E A G , A T N o ,   N E V , to generate the revocation key V K E V E A G using Formula (22) and retrieving the other part of the message. Verify the request belongs to the same A T E V E A G by A T N o and S i g E V using the retrieved P K E V , then check whether T E V is valid or not. Finally, EAG updates A T E V E A G status as revoked. The use of revoked A T E V E A G leads to the rejection of EV’s charging service request. Furthermore, since the master key K E V E A G is used to construct the revocation key V K E V E A G , an adversary cannot produce a fake revocation request.

5. Security Analysis

We discuss the proposed protocol’s security analysis as well as formal/informal analysis in this section.

5.1. Formal Security Analysis BAN Logic

In authentication protocols, trust connections are evaluated using authentication logic. BAN logic [45] is a frequently used technique for verifying authentication protocols. The proposed protocols’ authentication goals will be examined and verified using this logic (Table 3). A protocol analysis utilizing BAN logic can be broken down into four steps for each given protocol:
  • Clearly state the goals to achieve;
  • Form assumptions about the initial situation;
  • Affirm the protocol in its idealized state;
  • Utilize the logic to obtain associated party beliefs.
The actions and messages of the participating individuals should first be converted into formulas in order to employ the BAN logic. The essential rules for BAN logic are as follows:
Rule1 (Message-meaning rule):
R 1 = P   |   P           K         Q ,   P X Y P   Q     X
Rule2 (Nonce-verification rule):
R 2 = P   # X , P   Q   | X P   Q   X
Rule3 (Jurisdiction rule):
R 3 = P   Q |   X , P Q | X P   | X
Rule4 (Freshness-conjuncatenation rule):
R 4 = P   | #   X P   | #   X , Y
Rule5 (Belief rule):
R 5 = P   X , P   Y   P   | X , Y
Rule6 (Session keys rule):
R 6 = P   | # X , P   Q   X   P   |   P           K         Q

5.1.1. Analyzing Authentication Protocol

The steps listed below are taken to show that the proposed authentication protocol is accurate.
Step 1:
Goals. The analysis’ key goals, which comprise the secrecy of the exchanged session key, are listed below:
Goal 1:
E V   |   E V   S K     E A G
Goal 2:
E V   E A G     E V   S K     E A G
Goal 3:
E A G   | E V   S K     E A G
Goal 4:
E A G   E V     E V   S K     E A G
Step 2:
Assumptions. The proposed protocol’s preliminary assumptions are as follows:
P1.
EAG |≡ # ( T E V )
P2.
EV |≡ # ( T E A G )
P3.
EAG |≡ # ( N E V )
P4.
EAG |≡ ( E V   N E V ,   T E V   E A G )
P5.
EV |≡ ( E V   T E A G   E A G )
P6.
EAG |≡ ( E V   K   E A G )
P7.
EV |≡ ( E V   K   E A G )
P8.
EAG|≡ EV |   ( E V   S K   E A G )
P9.
EV |≡ EAG |   ( E V   S K   E A G )
Step 3:
Idealization. The following is an idealized version of the proposed protocol:
M1.
EV → EAG: ( { P K E V   E V A E V ,   N E V ,   T E V   } P K E A G   E A G )
M2.
EAG → EV: ( { A T N o A T E V E A G ,   T E A G } h i d E A G ,   N E V ,   T E V , C h a r g e h E V   K   E A G ,   A T N o   ,   P K E V   E V   ,   N E V )
Step 4:
Analysis. The beliefs that both the EV and EAG can obtain in the proposed protocol are derived here. Then, we investigate, based on BAN logic rules, which authentication goals can be met.
Statement 1: Applying the see rule to M1, we obtain:
S 1 :   E A G   ( { P K E V   E V A E V ,   N E V ,   T E V   } P K E A G   E A G )
Statement 2: In accordance with Rule (1) (message-meaning rule) and S 1 and P6, we obtain:
S 2 :   E A G     E V   ( { P K E V   E V A E V ,   N E V ,   T E V   } P K E A G   E A G )
Statement 3: In accordance with freshness conjuncatenation (Rule (4)) and nonce verification (Rule (2)) with S 2 , P1, and P3, we obtain:
S 3 :   E A G   E V   ( { P K E V   E V A E V ,   N E V ,   T E V   } P K E A G   E A G )
Statement 4: Since the session key S K E V E A G = h E V   K   E A G ,   A T N o   ,   P K E V   E V ,   N E V and based on the session keys rule (Rule (6)) with S 3 and P4, we obtain:
S 4 :   E A G     E V   E V   S K     E A G ( Goal   4 )
Statement 5: Based on the jurisdiction (Rule (3)) with S 4 and P8, we obtain:
S 5 :   E A G   |   E V   S K     E A G ( Goal   3 )
Statement 6: Applying the see rule to M2, we obtain:
S 6 :   E V   ( { A T N o A T E V E A G ,   T E A G } h i d E A G ,   N E V ,   T E V ,   C h a r g e h E V   K   E A G ,   A T N o   ,   P K E V   E V   ,   N E V )
Statement 7: In accordance with message meaning (Rule (1)) with S 6 and P7, we obtain:
S 7 :   E V     E A G   ( { A T N o A T E V E A G ,   T E A G } h i d E A G ,   N E V ,   T E V ,   C h a r g e h E V   K   E A G ,   A T N o   ,   P K E V   E V   ,   N E V )
Statement 8: In accordance with freshness conjuncatenation (Rule (4)) and nonce verification (Rule (2)) with S 7 and P2, we obtain:
S 8 :   E V     E A G   ( { A T N o A T E V E A G ,   T E A G } h i d E A G ,   N E V ,   T E V ,   C h a r g e h E V   K   E A G ,   A T N o   ,   P K E V   E V   ,   N E V )
Statement 9: Since the session key S K E V E A G = h E V   K   E A G ,   A T N o   ,   P K E V   E V ,   N E V and based on the session keys rule (Rule (6)) with S 8 and P5, we obtain:
S 9 :   E V     E A G   E V   S K     E A G ( Goal   2 )
Statement 10: Based on the jurisdiction (Rule (3)) with S 9 and P9, we obtain:
S 10 :   E V   |   E V   S K     E A G ( Goal   1 )
In summary, the proposed protocol provides the EV and EAG with secure mutual authentication. Additionally, based on the achieved Goals 1, 2, 3, and 4, the EV and EAG can confidently share the session key (SK). Accordingly, using BAN logic, we could say that the proposed protocol provides secure mutual authentication, ensuring that the EV and EAG are the only parties with access to the session key, maintaining security.

5.1.2. Analyzing Reauthentication Protocol

To prove that the proposed reauthentication protocol is accurate, the steps listed below are performed.
Step 1:
Goals. The analysis’ key goals, which comprise the secrecy of the exchanged session key, are listed below:
Goal 1:
E V   |   E V   S K     E A G
Goal 2:
E V   E A G     E V   S K     E A G
Goal 3:
E A G   | E V   S K     E A G
Goal 4:
E A G   E V     E V   S K     E A G
Step 2:
Assumptions. The proposed protocol’s preliminary assumptions are as follows:
P1.
EAG |≡ # ( N E V )
P2.
EAG |≡ # ( T E V )
P3.
EAG |≡ # ( N E V )
P4.
EV |≡ # ( N E A G )
P5.
EAG |≡ ( E V   N E V , N E V ,   T E V   E A G )
P6.
EV |≡ ( E V   N E A G   E A G )
P7.
EAG |≡ ( E V   K   E A G )
P8.
EV |≡ ( E V   K   E A G )
P9.
EAG|≡ EV |   ( E V   S K   E A G )
P10.
EV |≡ EAG |   ( E V   S K   E A G )
Step 3:
Idealization. The following is an idealized version of the proposed protocol:
M1.
EV → EAG:   ( ( A T N o A T E V E A G , { P K E V   E V , E V   K   E A G } P K E A G   E A G ) , N E , N E V ,   T E V ,   A i d N o A E V h E V   K   E A G , A T N o   ,     P K E V   E V , N E V )
M2.
EAG → EV: ( N E A G h A T N o , A i d N o , N E V , T E V , C h a r g e h E V   T K   E A G , E V   K   E A G , N E A G ,     P K E V   E V )
Step 4:
Analysis. The beliefs that both the EV and EAG can obtain in the proposed protocol are derived here. Then, we investigate which authentication goals can be met.
Statement 1: Applying the see rule to M1, we obtain:
S 1 :   E A G ( ( A T N o A T E V E A G , {   P K E V   E V ,   E V   K   E A G } P K E A G   E A G ) , N E ,     N E V ,   T E V ,   A i d N o A E V h E V   K   E A G ,     A T N o   ,     P K E V   E V ,     N E V )
Statement 2: In accordance with Rule (1) (message-meaning rule) and S 1 and P7, we obtain:
S 2 :   E A G     E V   ( ( A T N o A T E V E A G , {   P K E V   E V ,   E V   K   E A G } P K E A G   E A G ) , N E , N E V ,   T E V ,   A i d N o A E V h E V   K   E A G , A T N o   ,     P K E V   E V , N E V )
Statement 3: In accordance with freshness conjuncatenation (Rule (4)) and nonce verification (Rule (2)) with S 2 , P1, P2, and P3, we obtain:
S 3 :   E A G   E V     ( A T N o A T E V E A G , {   P K E V   E V ,   E V   K   E A G } P K E A G   E A G ) , N E ,     N E V ,   T E V ,   A i d N o A E V h E V   K   E A G ,     A T N o   ,     P K E V   E V ,     N E V )
Statement 4: Since the session key S K E V E A G = h E V   T K   E A G , E V   K   E A G , N E A G ,     P K E V   E V , T K E V E A G = h A T N o , A i d N o , N E V , T E V , and based on the session keys rule (Rule (6)) with S 3 and P5, we obtain:
S 4 :   E A G     E V   E V   S K     E A G ( Goal   4 )
Statement 5: Based on the jurisdiction (Rule (3)) with S 4 and P9, we obtain:
S 5 :   E A G   |   E V   S K     E A G ( Goal   3 )
Statement 6: Applying the see rule to M2, we obtain:
S 6 :   E V   ( N E A G h A T N o ,     A i d N o ,     N E V ,     T E V , C h a r g e h E V   T K   E A G ,     E V   K   E A G ,     N E A G ,     P K E V   E V )
Statement 7: In accordance with message meaning (Rule (1)) with S 6 and P8, we obtain:
S 7 :   E V     E A G   ( N E A G h A T N o ,     A i d N o ,     N E V ,     T E V , C h a r g e h E V   T K   E A G ,     E V   K   E A G ,     N E A G ,     P K E V   E V )
Statement 8: In accordance with freshness conjuncatenation (Rule (4)) and nonce verification (Rule (2)) with S 7 and P4, we obtain:
S 8 :   E V     E A G   ( N E A G h A T N o ,     A i d N o ,     N E V ,     T E V , C h a r g e h E V   T K   E A G ,     E V   K   E A G ,     N E A G ,     P K E V   E V )
Statement 9: Since the session key S K E V E A G = h E V   T K   E A G , E V   K   E A G , N E A G ,     P K E V   E V and based on the session keys rule (Rule (6)) with S 3 and P6, we obtain:
S 9 :   E V     E A G     E V   S K     E A G ( Goal   2 )
Statement 10: Based on the jurisdiction (Rule (3)) with S 9 and P10, we obtain:
S 10 :   E V   |   E V   S K     E A G ( Goal   1 )
Achieving Goals 1, 2, 3, and 4 implies that the proposed protocol offers secure mutual authentication and the session key is exclusively shared for security between the EV and EAG.

5.2. Security Simulation with AVISPA Tool

A popular formal security verification method used to evaluate if systems or protocols can withstand replay and MITM assaults [46,47,48,49] is the automated validation of internet security-sensitive protocols and applications (AVISPA) tool [50], using a security protocol animator (SPAN) [51]. In order to evaluate the authentication protocol’s resilience to MITM and replay attacks, we conducted a formal security test of the proposed system using the AVISPA simulation tool.
The high-level protocol specification language (HLPSL) was used to write the AVISPA module [52]. The HLPSL is composed of four backends: SAT-based model checker (SATMC), tree, automate-based protocol analyzer (TA4SP), CL-based attack searcher (CL-AtSe) [53], and on-the-fly model checker (OFMC) [54].

5.2.1. Mutual Authentication HLPSL Specification of AVISPA Simulation

Role, session, and environment are the three components of the HLPSL, where role denotes an entity, session denotes system parameters, and environment denotes the knowledge of the intruder, security, and authentication objectives. The mutual authentication HLPSL specifications for different roles (EV, OP, and EAG) are shown in Figure 8, Figure 9 and Figure 10, respectively. Figure 11 shows the specifications of the session and environment.
The role of the EV is presented in Figure 8. As soon as an EV enters its initial transition (State 0), it obtains the starting request and begins the registration procedure by sending a request i d E V ,   R E V ,   N E V ,   I E V encrypted with P K O P to the OP via an open channel, changes the state value to 2, and then employs the secret function to determine whether the entity is a legitimate user.
In State 2, the EV receives its credentials A E V ,   A H E V ,   A i d i , S E V encrypted with R K from the OP and sends the authentication request A E V ,   N E V ,   T E V encrypted with P K E A G to the EAG via an open channel and modifies the state value to 4. Moreover, witness(EV, EAG, ev_eag_auth, A i d i ) is declared by the EV to show that A i d i is a weak authentication factor. In State 4, the EV receives the response A T E V E A G ,   T E A G encrypted by I K E V E A G from the EAG, modifies the state value to 6, and calculates the session key S K E V E A G ; EV declare request(EAG, EV, eag_ev_auth, A T E V E A G ) to authenticate each other.

5.2.2. Mutual Authentication AVISPA Verification Results

In order to assess the proposed mutual authentication scheme’s security, we display the AVISPA findings and use the OFMC and CL-AtSe. The OFMC validates that the proposed system is safe against MITM attacks. Furthermore, the CL-AtSe illustrates the protocol’s resistance to replay attacks. The proposed mutual authentication technique is safe against MITM and replay attacks, as shown in Figure 12, which shows the results of the AVISPA simulation.

5.2.3. Reauthentication HLPSL Specifications of AVISPA Simulation

The reauthentication HLPSL specifications for different roles (EV and EAG) are shown in Figure 13 and Figure 14, respectively. Figure 15 shows the specifications of the session and environment.
The role of EV is presented in Figure 13. At an EV’s first transition (State 0), it receives the starting request and then the EV sends the request { A T E V E A G , N E V ,   { A i d i , N E V . T E V } S K E V E A G } to the EAG via an open channel, modifies the state value to 1, and then uses the secret function to validate if the entity is a legitimate user. Moreover, witness(EV, EAG, ev_eag_auth, A T E V E A G ) is declared by the EV to show that A T E V E A G is a weak authentication factor.
In State 1, the EV receives the response N E A G ,   T E A G encrypted by T K E V E A G from the EAG, modifies the state value to 2, and calculates the session key S K E V E A G ; EV declare request(EAG, EV, eag_ev_auth, N E A G ) to authenticate each other.

5.2.4. Reauthentication AVISPA Verification Results

In order to assess the proposed reauthentication scheme’s security, we display the AVISPA findings and use the OFMC and CL-AtSe. The proposed reauthentication system is resilient to MITM and replay attacks as an outcome of the AVISPA simulation, as illustrated in Figure 16.

5.3. Informal Security Analysis

To show that the previously stated solution requirements are met, the proposed protocol is analyzed:

5.3.1. Mutual Authentication

Through the verification of the OP’s signature on the A E A G , which holds the EAG’s identity and certificate C e r t E A G , the EV can ensure that it interacts with the valid EAG during the authentication phase. The EAG also can validate an EV by two credentials, the OP’s signature on the A E V , which contains the EV’s certificate C e r t E V , and the EV’s signature S i g E V in its A i d i . Our system can successfully create mutual authentication among the communicating entities (EV and EAG), as shown by a BAN logic demonstration that we carried out as well.

5.3.2. Anonymity

The EV’s true identity i d E V is encrypted using the OP’s public key P K O P i d E V in the A i d i , which is issued during the registration phase. It can be accessed by the OP only and no other party. Therefore, neither the EAG nor any other party may reveal i d E V . This was dissimilar to the studies [26,38], which used the real identity of the EV in the authentication phase, threatening its privacy.

5.3.3. Un-Linkability

For every session, the EV will have an anonymous identity ( A i d i ). As the A i d i was initialized by the OP, EV increments the previous A i d i sequentially (add 1) for each charging session requested by EV. This was dissimilar to the studies [35,36], where every new charging request contains information about the previous charge, or the EV is associated with a single group until it requests a group change. These techniques enable the adversary to track the targeted EV and threaten its privacy. However, because they have different identities, the proposed protocol sessions are un-linkable to one another.

5.3.4. Traceability

The EV utilizes an anonymous identity A i d i issued by the OP and even though the EV’s real identity is hidden and protected P K O P i d E V within A i d i , malicious EVs or misbehaving EVs cannot get away unknown by the authorities. Only the OP can reveal i d E V if necessary to maintain order in the system. Other schemes such as [27] concealed the real identity even from the system operator to preserve anonymity. Anonymity maintenance should not be absolute in order to protect the system and work as required by all parties.

5.3.5. Forward/Backward Security

The future/old session keys’ ( S K E V E A G ) secrecy should not be affected in the case an adversary were able to capture any S K E V E A G . Dynamic session keys are generated for the authentication phase as it includes a unique random number N E V . For the reauthentication phase, it includes a unique random number N E A G . A symmetric temporary key ( T K E V E A G ) protects the N E A G , and in every new session T K E V E A G updates dynamically with a new unique random number N E V . Moreover, since the master shared key K E V E A G is a long-lasting key, it was not used to encrypt any message transmitted between the EV and EAG. If the adversary guesses one of the session keys, he/she will only be able to view the relevant communication since each session creates a different session key. As a result, the proposed protocol ensures both forward and backward protection.

5.3.6. Joint Key Control

Without the assistance of other parties (even an OP), a random number N is generated by both parties (EV and EAG) included within the session key ( S K E V E A G ) as well as a fresh session key ( S K E V E A G ). Only these two individuals are able to receive the master key K E V E A G because it is generated by the combination of their private and public keys. Thus, the proposed protocol provides joint key control. This is dissimilar to studies [25,31], where the session key is provided by the service provider.

5.3.7. Effective Reauthentication

To shorten the time consumed and reduce the cost, the EAG reauthenticates the EV within the 48-h time-life of the issued A T E V E A G . The EAG first relies on information from the OP (trusted third party) to authenticate the EV. Afterward, the EAG can authenticate the EV directly without the OP’s information, as an EV holds A T E V E A G , unlike the schemes [25,26,27,28,29,30,31,32,33,34,35,36,37,38]. Hence, they established full trust between them (EAG and EV).

5.3.8. Revocation Functionality

To prevent the misuse of stolen tokens ( A E V ,   A i d i , or A T E V E A G ) by an adversary or in the case the EV reports to the OP to revoke its A i d i   A E V , or the EV report to the EAG to revoke its A T E V E A G , the tokens will be considered revoked. The revocation protocol gives the EV a way to alert either the OP or EAG if it suspects an A i d i , A E V , or A T E V E A G has been stolen through recency proof (RP). Related work [25] did not provide a revocation method for the pseudonyms issued by the service provider.

5.3.9. Resist MITM/Replay Attack

Even if the attacker manages to steal A E V , the master key ( K E V E A G ) for EAG authentication must be generated using the EV’s private key. In the case that the adversary is able to capture A T E V E A G , the master key ( K E V E A G ) cannot be recovered since it is encrypted within A T E V E A G using the EAG’s public key. The adversary will, therefore, be unable to generate the session key required for a MITM attack without K E V E A G . Additionally, in order to prevent replays of previous sessions, random numbers and time stamps are transmitted in every communication between the parties. Therefore, a replay attack is not possible in the proposed protocol.

5.3.10. Resist Impersonation Attack

An adversary with an EAG or OP name cannot generate A E V ,   A i d i , or A T E V E A G tokens, as they involve the issuer’s signature. So, A E V , A i d i   , and A T E V E A G counterfeiting or cloning is doubtful, because the issuer’s signature may be used to verify the legitimacy.

5.3.11. Resist DOS Attack

We incorporated the message-specific puzzles and client puzzles of [55] into our authentication mechanisms to thwart DoS attacks. Each EAG handles access requests normally, that is, without discrimination, when there is no evidence of a DoS attack. However, if an EAG suspects a DoS attack, it selectively executes expensive access request authentication. Particularly, the EAG inserts a special puzzle within the beacon messages and demands the puzzle answer be included in each access request message. Only when the answer is correct does the EAG dedicate resources to handle an access request.

6. Comparison with Related Schemes

The proposed approach is compared with related systems in this section based on security and functional properties as well as computing costs. These are the existing EV charging system schemes that have an emphasis on secure EV-to-EAG communication.

6.1. Security and Functional Features Comparison

Table 4 displays the suggested system’s security and functional feature evaluation along with the related systems. There are well-known attacks that could be used against the solutions in [26,30,31,34,38]. Furthermore, solutions in [25,26,27,28,29,30,31,32,33,34,35,36,37,38] do not meet the necessary security and privacy-preservation criteria for EV charging, incorporating traceability, un-linkability, backward security, and efficient re-authentication. In [31,32] it requires an additional message, which increases the overhead on the communication channel. When compared to similar studies, it is shown that our proposed scheme meets all solution requirements.

6.2. Computational Cost Comparison

Based on all of the operations that the authentication protocols offer, this section determines the computing cost of the protocols. The EAG performs at a high level; thus, it has the potential to carry out all necessary processes. In contrast to the EAG, the computational resources and memory of EVs are constrained. Therefore, we must focus on the EV computational costs. An illustration of the timing operations is shown in Table 5. Table 6 and Figure 17 indicate the computing costs of the proposed protocol and relevant studies. According to [37,56], a one-way hash function ( T h ) takes 0.0023 milliseconds (ms), the symmetric encryption ( T s y m ) takes 0.0046 ms, and the elliptic curve encryption ( T e n c e c c ) takes 0.43 ms.
For the authentication phase, the EV’s computational cost in Kim et al.’s scheme [27] requires 0.4484 ms, while in Kumar et al.’s scheme [37], it requires 0.4346 ms. The proposed protocol requires   0.4461 ms; although it is slightly higher than Kumar et al.’s scheme [37], it provides better security and privacy preservation for the EV. In terms of the reauthentication process for the EV, the proposed protocol requires 0.0207 ms, while Kim et al.’s scheme [27] requires 0.4484 ms, and Kumar et al.’s scheme [37] requires 0.4346 ms. Hence, the computational cost of the proposed reauthentication protocol is nearly 95% less than previous protocols. Considering the EV’s capability, it is clear now that the proposed protocol outperforms the previous two protocols.

7. Conclusions

An efficient, secure, privacy-preserving authentication system for an electric vehicle charging system is provided in this work. It also includes a reauthentication protocol to minimize the overhead of subsequent authentication processes. A smaller certificate and faster computation have been made available by using the ECQV mechanism’s implicit authentication, which is better suited to IoT devices with fewer resources than the conventional certificate. The proposed protocol’s ability to perform mutual authentication and meet solution requirements has been demonstrated using BAN logic and informal security analysis. The comparison with previous research reveals that while Kumar et al.‘s scheme [37] efficiently reduces the cost of the authentication computational process by around 2.5%, the proposed scheme provides the EV with enhanced security and privacy preservation. However, compared to the other two protocols, the proposed reauthentication protocol outperforms them, with a reduction of about 95%. The real-time experiment is one of the limitations of the proposed scheme. For future work, we intend to study the utilization of machine learning and artificial intelligence to cover a wider range of security. Additionally, we will consider the utilization of a combined certification model (software and hardware certification mechanism). We also suggest studying the possibility of either improving existing evaluation tools (AVISPA, ProVerif, etc.) or exploring new implementations to cover the gap between theoretical analysis and actual implementation.

Author Contributions

Conceptualization, A.M.A. and S.S.A.; methodology, A.M.A. and S.S.A.; validation, A.M.A. and S.S.A.; writing—original draft preparation, S.S.A.; writing—review and editing, A.M.A.; supervision, A.M.A.; funding acquisition, A.M.A. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by the SAUDI ARAMCO Cybersecurity Chair at Imam Abdulrahman Bin Faisal University, Saudi Arabia.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

No data were reported in this study.

Acknowledgments

The authors would like to express their appreciation to the Journal Editor, the Associate Editor, and the anonymous reviewers for their insightful comments. We would like to thank Imam Abdulrahman Bin Faisal University for facilitating access to the resources used in this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. US EPA. Sources of Greenhouse Gas Emissions. Available online: https://www.epa.gov/ghgemissions/sources-greenhouse-gas-emissions (accessed on 12 April 2022).
  2. Ahmadi, P. Environmental Impacts and Behavioral Drivers of Deep Decarbonization for Transportation through Electric Vehicles. J. Clean. Prod. 2019, 225, 1209–1219. [Google Scholar] [CrossRef]
  3. Acharya, S.; Dvorkin, Y.; Pandžić, H.; Karri, R. Cybersecurity of Smart Electric Vehicle Charging: A Power Grid Perspective. IEEE Access 2020, 8, 214434–214453. [Google Scholar] [CrossRef]
  4. Nereim, V. Saudi Arabia to Start Electric-Vehicle Push in Capital Riyadh. Available online: www.bloomberg.com/news/articles/2021-10-23/saudi-arabia-to-start-electric-vehicle-push-in-capital-riyadh (accessed on 23 October 2021).
  5. Global EV Outlook 2021—Analysis. IEA. Available online: https://www.iea.org/reports/global-ev-outlook-2021 (accessed on 2 November 2021).
  6. Yi, T.; Zhang, C.; Lin, T.; Liu, J. Research on the Spatial-Temporal Distribution of Electric Vehicle Charging Load Demand: A Case Study in China. J. Clean. Prod. 2020, 242, 118457. [Google Scholar] [CrossRef]
  7. Fu, Z.; Dong, P.; Ju, Y. An Intelligent Electric Vehicle Charging System for New Energy Companies Based on Consortium Blockchain. J. Clean. Prod. 2020, 261, 121219. [Google Scholar] [CrossRef]
  8. Gorenflo, C.; Golab, L.; Keshav, S. Mitigating Trust Issues in Electric Vehicle Charging Using a Blockchain. In Proceedings of the Tenth ACM International Conference on Future Energy Systems; e-Energy ’19. Association for Computing Machinery: New York, NY, USA, 2019; pp. 160–164. [Google Scholar] [CrossRef]
  9. Al-Ogaili, A.S.; Tengku Hashim, T.J.; Rahmat, N.A.; Ramasamy, A.K.; Marsadek, M.B.; Faisal, M.; Hannan, M.A. Review on Scheduling, Clustering, and Forecasting Strategies for Controlling Electric Vehicle Charging: Challenges and Recommendations. IEEE Access 2019, 7, 128353–128371. [Google Scholar] [CrossRef]
  10. Nedyalkov, I.; Arnaudov, D. Attacks and Security Measures of the Exchanged Information in the Charging Infrastructure for Electromobiles. In Proceedings of the IEEE XXVIII International Scientific Conference Electronics (ET), Sozopol, Bulgaria, 12–14 September 2019; pp. 1–4. [Google Scholar] [CrossRef]
  11. Wang, X.; Hou, X.; Rios, R.; Tippenhauer, N.O.; Ochoa, M. Constrained Proximity Attacks on Mobile Targets. ACM Trans. Priv. Secur. 2022, 25, 20. [Google Scholar] [CrossRef]
  12. Kilari, V.T.; Yu, R.; Misra, S.; Xue, G. Robust Revocable Anonymous Authentication for Vehicle to Grid Communications. IEEE Trans. Intell. Transp. Syst. 2020, 21, 4845–4857. [Google Scholar] [CrossRef]
  13. Zhang, X.; Liu, C.; Chai, K.K.; Poslad, S. A Privacy-Preserving Consensus Mechanism for an Electric Vehicle Charging Scheme. J. Netw. Comput. Appl. 2021, 174, 102908. [Google Scholar] [CrossRef]
  14. ElHussini, H.; Assi, C.; Moussa, B.; Atallah, R.; Ghrayeb, A. A Tale of Two Entities: Contextualizing the Security of Electric Vehicle Charging Stations on the Power Grid. ACM Trans. Internet Things 2021, 2, 9. [Google Scholar] [CrossRef]
  15. Baroutis, N.; Younis, M. Location Privacy in Wireless Sensor Networks. In Mission-Oriented Sensor Networks and Systems: Art and Science: Volume 1: Foundations; Ammari, H.M., Ed.; Studies in Systems, Decision and Control; Springer International Publishing: Cham, Switzerland, 2019; pp. 669–714. [Google Scholar] [CrossRef]
  16. Saxena, N.; Grijalva, S.; Chukwuka, V.; Vasilakos, A.V. Network Security and Privacy Challenges in Smart Vehicle-to-Grid. IEEE Wirel. Commun. 2017, 24, 88–98. [Google Scholar] [CrossRef]
  17. Hansen, M.; Jensen, M.; Rost, M. Protection Goals for Privacy Engineering. In Proceedings of the 2015 IEEE Security and Privacy Workshops, San Jose, CA, USA, 21–22 May 2015; pp. 159–166. [Google Scholar] [CrossRef]
  18. Mundhe, P.; Verma, S.; Venkatesan, S. A Comprehensive Survey on Authentication and Privacy-Preserving Schemes in VANETs. Comput. Sci. Rev. 2021, 41, 100411. [Google Scholar] [CrossRef]
  19. Zhang, J.; Cui, J.; Zhong, H.; Chen, Z.; Liu, L. PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks. IEEE Trans. Dependable Secure Comput. 2021, 18, 722–735. [Google Scholar] [CrossRef]
  20. Brown, D.R.L.; Gallant, R.; Vanstone, S.A. Provably Secure Implicit Certificate Schemes. In Financial Cryptography; Syverson, P., Ed.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2002; pp. 156–165. [Google Scholar] [CrossRef]
  21. Campagna, M. Sec 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV). Standards for Efficient Cryptography, Version. 2013; 1. Available online: www.secg.org/sec4-1.0.pdf (accessed on 24 November 2021).
  22. Ha, D.A.; Nguyen, K.T.; Zao, J.K. Efficient Authentication of Resource-Constrained IoT Devices Based on ECQV Implicit Certificates and Datagram Transport Layer Security Protocol. In Proceedings of the Seventh Symposium on Information and Communication Technology, Ho Chi Minh City, Vietnam, 8–9 December 2016; SoICT ’16. Association for Computing Machinery: New York, NY, USA, 2016; pp. 173–179. [Google Scholar] [CrossRef]
  23. Khan, A.G.; Basharat, S.; Riaz, M.U. Analysis of Asymmetric Cryptography in Information Security Based on Computational Study to Ensure Confidentiality during Information Exchange. Int. J. Sci. Eng. Res. 2018, 9, 992–999. [Google Scholar]
  24. Bokhari, M.U.; Shallal, Q.M. A Review on Symmetric Key Encryption Techniques in Cryptography. Int. J. Comput. Appl. 2016, 147, 43–48. [Google Scholar]
  25. Li, H.; Dán, G.; Nahrstedt, K. Portunes+: Privacy-Preserving Fast Authentication for Dynamic Electric Vehicle Charging. IEEE Trans. Smart Grid 2017, 8, 2305–2313. [Google Scholar] [CrossRef]
  26. Huang, X.; Xu, C.; Wang, P.; Liu, H. LNSC: A Security Model for Electric Vehicle and Charging Pile Management Based on Blockchain Ecosystem. IEEE Access 2018, 6, 13565–13574. [Google Scholar] [CrossRef]
  27. Kim, M.; Park, K.; Yu, S.; Lee, J.; Park, Y.; Lee, S.-W.; Chung, B. A Secure Charging System for Electric Vehicles Based on Blockchain. Sensors 2019, 19, 3028. [Google Scholar] [CrossRef]
  28. ElGhanam, E.; Ahmed, I.; Hassan, M.; Osman, A. Authentication and Billing for Dynamic Wireless EV Charging in an Internet of Electric Vehicles. Future Internet 2021, 13, 257. [Google Scholar] [CrossRef]
  29. Babu, P.R.; Amin, R.; Reddy, A.G.; Das, A.K.; Susilo, W.; Park, Y. Robust Authentication Protocol for Dynamic Charging System of Electric Vehicles. IEEE Trans. Veh. Technol. 2021, 70, 11338–11351. [Google Scholar] [CrossRef]
  30. Rabieh, K.; Wei, M. Efficient and Privacy-Aware Authentication Scheme for EVs Pre-Paid Wireless Charging Services. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–6. [Google Scholar] [CrossRef]
  31. Gunukula, S.; Sherif, A.B.T.; Pazos-Revilla, M.; Ausby, B.; Mahmoud, M.; Shen, X.S. Efficient Scheme for Secure and Privacy-Preserving Electric Vehicle Dynamic Charging System. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–6. [Google Scholar] [CrossRef]
  32. Roman, L.F.A.; Gondim, P.R.L. Authentication Protocol in CTNs for a CWD-WPT Charging System in a Cloud Environment. Ad Hoc Netw. 2020, 97, 102004. [Google Scholar] [CrossRef]
  33. Fuchsbauer, G.; Vergnaud, D. Fair Blind Signatures without Random Oracles. In Progress in Cryptology—AFRICACRYPT 2010; Bernstein, D.J., Lange, T., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2010; pp. 16–33. [Google Scholar] [CrossRef]
  34. Li, F.; Xin, X.; Hu, Y. Efficient Certificate-Based Signcryption Scheme from Bilinear Pairings. Int. J. Comput. Appl. 2008, 30, 129–133. [Google Scholar] [CrossRef]
  35. Xia, Z.; Fang, Z.; Gu, K.; Wang, J.; Tan, J.; Wang, G. Effective Charging Identity Authentication Scheme Based on Fog Computing in V2G Networks. J. Inf. Secur. Appl. 2021, 58, 102649. [Google Scholar] [CrossRef]
  36. Roman, L.F.A.; Gondim, P.R.L.; Lloret, J. Pairing-Based Authentication Protocol for V2G Networks in Smart Grid. Ad Hoc Netw. 2019, 90, 101745. [Google Scholar] [CrossRef]
  37. Kumar, G.; Saha, R.; Rai, M.K.; Buchanan, W.J.; Thomas, R.; Geetha, G.; Hoon-Kim, T.; Rodrigues, J.J.P.C. A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption. IEEE Trans. Veh. Technol. 2020, 69, 7707–7722. [Google Scholar] [CrossRef]
  38. Vaidya, B.; Mouftah, H.T. Multimodal and Multi-Pass Authentication Mechanisms for Electric Vehicle Charging Networks. In Proceedings of the International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June 2020; pp. 371–376. [Google Scholar] [CrossRef]
  39. Al-Shareeda, M.A.; Anbar, M.; Hasbullah, I.H.; Manickam, S. Survey of Authentication and Privacy Schemes in Vehicular Ad Hoc Networks. IEEE Sens. J. 2021, 21, 2422–2433. [Google Scholar] [CrossRef]
  40. Braeken, A.; Touhafi, A. AAA—Autonomous Anonymous User Authentication and Its Application in V2G. Concurr. Comput. Pract. Exp. 2018, 30, e4303. [Google Scholar] [CrossRef]
  41. Lu, Z.; Qu, G.; Liu, Z. A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy. IEEE Trans. Intell. Transp. Syst. 2019, 20, 760–776. [Google Scholar] [CrossRef]
  42. Baee, M.A.R.; Simpson, L.; Foo, E.; Pieprzyk, J. Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2. IEEE Trans. Veh. Technol. 2019, 68, 11577–11587. [Google Scholar] [CrossRef]
  43. Almuhaideb, A.M. Re-AuTh: Lightweight Re-Authentication with Practical Key Management for Wireless Body Area Networks. Arab. J. Sci. Eng. 2021, 46, 8189–8202. [Google Scholar] [CrossRef]
  44. Almuhaideb, A.M.; Algothami, S.S. Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV. J. Sens. Actuator Netw. 2022, 11, 28. [Google Scholar] [CrossRef]
  45. Burrows, M.; Abadi, M.; Needham, R.M. A Logic of Authentication. Proc. R. Soc. Lond. Math. Phys. Sci. 1989, 426, 233–271. [Google Scholar] [CrossRef]
  46. Park, K.; Park, Y.; Park, Y.; Das, A.K. 2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment. IEEE Access 2018, 6, 30225–30241. [Google Scholar] [CrossRef]
  47. Yu, S.; Lee, J.; Lee, K.; Park, K.; Park, Y. Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications. Sensors 2018, 18, 3191. [Google Scholar] [CrossRef]
  48. Park, K.; Park, Y.; Park, Y.; Goutham Reddy, A.; Das, A.K. Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks. IEEE Access 2017, 5, 25110–25125. [Google Scholar] [CrossRef]
  49. Odelu, V.; Das, A.K.; Choo, K.-K.R.; Kumar, N.; Park, Y. Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices. IEEE Access 2017, 5, 27707–27721. [Google Scholar] [CrossRef]
  50. Armando, A.; Basin, D.; Cuellar, J.; Rusinowitch, M.; Viganò, L. AVISPA: Automated Validation of Internet Security Protocols and Applications. Available online: https://www.ercim.eu/publication/Ercim_News/enw64/armando.html (accessed on 11 April 2022).
  51. SPAN—Security Protocol Animator for AVISPA. Available online: http://people.irisa.fr/Thomas.Genet/span/ (accessed on 11 April 2022).
  52. Von Oheimb, D. The High-Level Protocol Specification Language HLPSL Developed in the EU Project AVISPA. Proceedings of APPSEM 2005 Workshop, Frauenchiemsee, Germany, 12–15 September 2005; pp. 1–17. [Google Scholar]
  53. Turuani, M. The CL-Atse Protocol Analyser. In Term Rewriting and Applications; Pfenning, F., Ed.; Springer: Berlin/Heidelberg, Germany, 2006; pp. 277–286. [Google Scholar] [CrossRef]
  54. Basin, D.; Mödersheim, S.; Viganò, L. OFMC: A Symbolic Model Checker for Security Protocols. Int. J. Inf. Secur. 2005, 4, 181–208. [Google Scholar] [CrossRef]
  55. Juels, A.; Brainard, J. Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. In Proceedings of the Networks and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 1 January 1999. [Google Scholar]
  56. Kilinc, H.H.; Yanik, T. A Survey of SIP Authentication and Key Agreement Schemes. IEEE Commun. Surv. Tutor. 2014, 16, 1005–1023. [Google Scholar] [CrossRef]
Figure 1. Generation of implicit certificates for ECQV [22].
Figure 1. Generation of implicit certificates for ECQV [22].
Bdcc 06 00102 g001
Figure 2. The ECQV implicit certificate-based authenticated key exchange algorithm [22].
Figure 2. The ECQV implicit certificate-based authenticated key exchange algorithm [22].
Bdcc 06 00102 g002
Figure 3. Proposed system architecture.
Figure 3. Proposed system architecture.
Bdcc 06 00102 g003
Figure 4. The proposed EV registration.
Figure 4. The proposed EV registration.
Bdcc 06 00102 g004
Figure 5. The proposed EAG registration phase.
Figure 5. The proposed EAG registration phase.
Bdcc 06 00102 g005
Figure 6. The proposed authentication phase.
Figure 6. The proposed authentication phase.
Bdcc 06 00102 g006
Figure 7. The proposed reauthentication phase.
Figure 7. The proposed reauthentication phase.
Bdcc 06 00102 g007
Figure 8. Mutual Authentication Specification of EV.
Figure 8. Mutual Authentication Specification of EV.
Bdcc 06 00102 g008
Figure 9. Mutual Authentication Specification of EAG.
Figure 9. Mutual Authentication Specification of EAG.
Bdcc 06 00102 g009
Figure 10. Mutual Authentication Specification of OP.
Figure 10. Mutual Authentication Specification of OP.
Bdcc 06 00102 g010
Figure 11. Mutual Authentication Specification of the session and environment.
Figure 11. Mutual Authentication Specification of the session and environment.
Bdcc 06 00102 g011
Figure 12. Mutual Authentication: AVISPA simulation results.
Figure 12. Mutual Authentication: AVISPA simulation results.
Bdcc 06 00102 g012
Figure 13. Reauthentication Specification of EV.
Figure 13. Reauthentication Specification of EV.
Bdcc 06 00102 g013
Figure 14. Reauthentication Specification of EAG.
Figure 14. Reauthentication Specification of EAG.
Bdcc 06 00102 g014
Figure 15. Reauthentication Specification of the session and environment.
Figure 15. Reauthentication Specification of the session and environment.
Bdcc 06 00102 g015
Figure 16. Reauthentication AVISPA simulation results.
Figure 16. Reauthentication AVISPA simulation results.
Bdcc 06 00102 g016
Figure 17. Comparison of several EV’s authentication protocols computational cost [27,37].
Figure 17. Comparison of several EV’s authentication protocols computational cost [27,37].
Bdcc 06 00102 g017
Table 1. ECQV basic notations.
Table 1. ECQV basic notations.
NotationsMeaning
d A EC private key for entity A
Q A EC public key for entity A
k   R [1,…, n − 1] k integer, a random value between 1 to n − 1
GBase point in E p with order n
E p Elliptic curve (EC) over a finite field with p being a significant prime number
H . One-way hash function
r Private reconstruction data
P A Public reconstruction data
I D A Identity of entity A
e Hash of certificate
C e r t x Certificates of entity x
Table 2. Notations.
Table 2. Notations.
NotationsMeaning
EVElectric vehicle
EAGEnergy aggregator
OPElectricity operator
E p Elliptic curve (EC) over a finite field, with p being a significant prime integer
G E p s base point with order n
i d E V , i d E A G EV/EAG’s true identity
k x ,   R x Pair of EC keys for entity x
S x Data used to construct entity x ‘s private key
C e r t x Entity x ’s certificate
S i g x   ( y ) Message y is signed by entity x using x ’s private key
P K x   y Using entity x s public key, entity x encrypts message y
A x Entity x ’s authenticator
A H x Hash of entity x ’s authenticator
T x Time stamp produced by x
TLTime-life
e Certificate hash
P K x ,   P R x Entity x ’s Public/Private-key pair
RK, RK’EV and OP/EAG and OP registration key
A i d i EV s   i t h anonymous identity established by OP
A i d N o A i d i counter that is incremented by EV
N x Nonce by x
A T E V E A G EV’s authorization token, generated by EAG
K E V E A G EV and EAG shared symmetric master key
I K E V E A G EV and EAG shared symmetric initial key
T K E V E A G EV and EAG shared symmetric temporary key
S K E V E A G EV and EAG shared symmetric session key
H . One-way hash function
y , x Concatenation operation
Table 3. BAN logic notations.
Table 3. BAN logic notations.
NotationsDescription
P|≡ XPrincipal P believes statement X is true.
#(X)Statement X is fresh.
P   | XP has jurisdiction over statement X.
P     XP sees X, indicating that P has received statement X and could read it.
P   |   XP once said the statement X.
(X, Y)The formula (X, Y) includes the terms X or Y.
X Y X combined with Y.
X , Y K   The key K is used to encrypt either X or Y.
X , Y K   The key K is used to hash X or Y.
P             K           Q
P K X   X
K is a secret parameter that P and Q share (or will share).

Entity X’s public key.
Table 4. Comparison of the proposed protocol’s security features with similar studies. Note: ”✓” means “available”; ”×” means “not available”.
Table 4. Comparison of the proposed protocol’s security features with similar studies. Note: ”✓” means “available”; ”×” means “not available”.
Feature/ApproachLi et al. [25]Rabieh and Wei [30]Gunukula et al. [31]Huang et al. [26]Roman et al. [36]Kim et al. [27]Roman and Gondim [32]Vaidya and Mouftah [38]Kumar et al. [37]ElGhanam et al. [28]Xia et al. [35]Proposed
201620172017201820192019201920202020202120212022
Mutual Authentication××
Forward security×××××
Anonymity××
Resist replay attack××
Resist impersonation attack××××
Resist MITM attack×
Backward security××××××××××
Un-linkability×××××××
Traceability××××××××××
Effective Reauthentication×××××××××××
Revocation method××××××××
Joint key control×××××××
Number of Messages (EV)225322531212
Table 5. Operations’ Timing [37,56].
Table 5. Operations’ Timing [37,56].
Notation/Operation T e n c e c c / Elliptic   Curve   Encryption T h / Hash T s y m / Symmetric
Time (ms)0.430.00230.0046
Table 6. Comparison of the computational cost.
Table 6. Comparison of the computational cost.
Approach/Efficiency FeatureEV’s Computational Cost
Authentication PhaseReauthentication Phase
Kim et al.’s scheme 27 T e n c e c c + 9 T h 0.4484   ms T e n c e c c + 9 T h 0.4484   ms
Kumar et al.’s scheme 37 T e n c e c c + 2 T h   0.4346   ms T e n c e c c + 2 T h   0.4346   ms
Proposed scheme T e n c e c c + 3 T h + 2 T s y m   0.4461   ms 3 T h + 3 T s y m   0.0207   ms
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Almuhaideb, A.M.; Algothami, S.S. ECQV-Based Lightweight Revocable Authentication Protocol for Electric Vehicle Charging. Big Data Cogn. Comput. 2022, 6, 102. https://doi.org/10.3390/bdcc6040102

AMA Style

Almuhaideb AM, Algothami SS. ECQV-Based Lightweight Revocable Authentication Protocol for Electric Vehicle Charging. Big Data and Cognitive Computing. 2022; 6(4):102. https://doi.org/10.3390/bdcc6040102

Chicago/Turabian Style

Almuhaideb, Abdullah M., and Sammar S. Algothami. 2022. "ECQV-Based Lightweight Revocable Authentication Protocol for Electric Vehicle Charging" Big Data and Cognitive Computing 6, no. 4: 102. https://doi.org/10.3390/bdcc6040102

APA Style

Almuhaideb, A. M., & Algothami, S. S. (2022). ECQV-Based Lightweight Revocable Authentication Protocol for Electric Vehicle Charging. Big Data and Cognitive Computing, 6(4), 102. https://doi.org/10.3390/bdcc6040102

Article Metrics

Back to TopTop