在充电站点对点双竞价 V2V 电力交易中抵御选环攻击的隐私保护方案

IF 3.3 3区 工程技术 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Electric Power Systems Research Pub Date : 2024-10-15 DOI:10.1016/j.epsr.2024.111155
Shaomin Zhang , Xu Wang , Baoyi Wang
{"title":"在充电站点对点双竞价 V2V 电力交易中抵御选环攻击的隐私保护方案","authors":"Shaomin Zhang ,&nbsp;Xu Wang ,&nbsp;Baoyi Wang","doi":"10.1016/j.epsr.2024.111155","DOIUrl":null,"url":null,"abstract":"<div><div>With the development of Electric Vehicles (EVs), the number of public charging piles cannot meet the immediate charging needs of EV users sometimes. The charging stations provide flexible electricity transaction schemes for users by managing charging piles and Vehicle-to-Vehicle (V2V). Users can freely choose transaction partners and submit transaction plans to multiple charging stations. The mobility of EVs results in users randomly selecting rings multiple times, which may cause them to appear in different rings. Attackers can link multiple transaction plans and infer user privacy information. The leakage of transaction information may threaten the fairness of transactions. Aiming at the above situations, a privacy protection scheme to resist ring selection attack in Peer-to-Peer double auction V2V electricity transaction for charging stations is proposed. Firstly, the ring signcryption algorithm is improved to resist ring selection attack. Secondly, a real identity verification algorithm is designed to track malicious users. Theoretical analysis proves that the security of the proposed privacy protection scheme. The elliptic curve point multiplication is used in the scheme to improve computational efficiency. Experiments show that this scheme has low computational and communication costs. Verification cost increases slowly with the increase of the number of ring members.</div></div>","PeriodicalId":50547,"journal":{"name":"Electric Power Systems Research","volume":"238 ","pages":"Article 111155"},"PeriodicalIF":3.3000,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A privacy protection scheme to resist ring selection attack in peer-to-peer double auction V2V electricity transaction for charging stations\",\"authors\":\"Shaomin Zhang ,&nbsp;Xu Wang ,&nbsp;Baoyi Wang\",\"doi\":\"10.1016/j.epsr.2024.111155\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>With the development of Electric Vehicles (EVs), the number of public charging piles cannot meet the immediate charging needs of EV users sometimes. The charging stations provide flexible electricity transaction schemes for users by managing charging piles and Vehicle-to-Vehicle (V2V). Users can freely choose transaction partners and submit transaction plans to multiple charging stations. The mobility of EVs results in users randomly selecting rings multiple times, which may cause them to appear in different rings. Attackers can link multiple transaction plans and infer user privacy information. The leakage of transaction information may threaten the fairness of transactions. Aiming at the above situations, a privacy protection scheme to resist ring selection attack in Peer-to-Peer double auction V2V electricity transaction for charging stations is proposed. Firstly, the ring signcryption algorithm is improved to resist ring selection attack. Secondly, a real identity verification algorithm is designed to track malicious users. Theoretical analysis proves that the security of the proposed privacy protection scheme. The elliptic curve point multiplication is used in the scheme to improve computational efficiency. Experiments show that this scheme has low computational and communication costs. Verification cost increases slowly with the increase of the number of ring members.</div></div>\",\"PeriodicalId\":50547,\"journal\":{\"name\":\"Electric Power Systems Research\",\"volume\":\"238 \",\"pages\":\"Article 111155\"},\"PeriodicalIF\":3.3000,\"publicationDate\":\"2024-10-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Electric Power Systems Research\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0378779624010411\",\"RegionNum\":3,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Electric Power Systems Research","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0378779624010411","RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

摘要

随着电动汽车(EV)的发展,公共充电桩的数量有时无法满足电动汽车用户的即时充电需求。充电站通过管理充电桩和车对车(V2V),为用户提供灵活的电力交易方案。用户可以自由选择交易伙伴,并向多个充电站提交交易计划。电动汽车的流动性导致用户多次随机选择环,从而可能出现在不同的环中。攻击者可以链接多个交易计划并推断用户隐私信息。交易信息的泄露可能会威胁到交易的公平性。针对上述情况,本文提出了一种在充电站点对点双竞价 V2V 电力交易中抵御选环攻击的隐私保护方案。首先,改进了环形签名加密算法,以抵御环形选择攻击。其次,设计了一种真实身份验证算法来跟踪恶意用户。理论分析证明了所提隐私保护方案的安全性。方案中使用了椭圆曲线点乘法来提高计算效率。实验表明,该方案的计算和通信成本较低。验证成本随着环成员数量的增加而缓慢增加。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A privacy protection scheme to resist ring selection attack in peer-to-peer double auction V2V electricity transaction for charging stations
With the development of Electric Vehicles (EVs), the number of public charging piles cannot meet the immediate charging needs of EV users sometimes. The charging stations provide flexible electricity transaction schemes for users by managing charging piles and Vehicle-to-Vehicle (V2V). Users can freely choose transaction partners and submit transaction plans to multiple charging stations. The mobility of EVs results in users randomly selecting rings multiple times, which may cause them to appear in different rings. Attackers can link multiple transaction plans and infer user privacy information. The leakage of transaction information may threaten the fairness of transactions. Aiming at the above situations, a privacy protection scheme to resist ring selection attack in Peer-to-Peer double auction V2V electricity transaction for charging stations is proposed. Firstly, the ring signcryption algorithm is improved to resist ring selection attack. Secondly, a real identity verification algorithm is designed to track malicious users. Theoretical analysis proves that the security of the proposed privacy protection scheme. The elliptic curve point multiplication is used in the scheme to improve computational efficiency. Experiments show that this scheme has low computational and communication costs. Verification cost increases slowly with the increase of the number of ring members.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Electric Power Systems Research
Electric Power Systems Research 工程技术-工程:电子与电气
CiteScore
7.50
自引率
17.90%
发文量
963
审稿时长
3.8 months
期刊介绍: Electric Power Systems Research is an international medium for the publication of original papers concerned with the generation, transmission, distribution and utilization of electrical energy. The journal aims at presenting important results of work in this field, whether in the form of applied research, development of new procedures or components, orginal application of existing knowledge or new designapproaches. The scope of Electric Power Systems Research is broad, encompassing all aspects of electric power systems. The following list of topics is not intended to be exhaustive, but rather to indicate topics that fall within the journal purview. • Generation techniques ranging from advances in conventional electromechanical methods, through nuclear power generation, to renewable energy generation. • Transmission, spanning the broad area from UHV (ac and dc) to network operation and protection, line routing and design. • Substation work: equipment design, protection and control systems. • Distribution techniques, equipment development, and smart grids. • The utilization area from energy efficiency to distributed load levelling techniques. • Systems studies including control techniques, planning, optimization methods, stability, security assessment and insulation coordination.
期刊最新文献
Electromechanical analysis of underbuilt wire use in transmission lines Optimal power flow solution via noise-resilient quantum interior-point methods Protection without current transformers for electrical installations with three-phase bus ducts Joint trading of energy and reserve considering microgrid agent fraudulent behaviors Aggregated vulnerability assessment of power transmission lines under operational and hurricane induced outages
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1