Professional Documents
Culture Documents
I. INTRODUCTION
of the time, their batteries could be used to let electricity flow
D. Batch Verification
References [18]–[24] use an efficient cryptographic primitive
called batch signature, which supports simultaneously verifying
the signature of any number of packets. The batch signature is
suitable for a same source (same sender) to sign a batch packets
using the same private key. For example, a DSA batch verifi-
cation protocol is proposed in [18], in which the signer gener-
ates signatures through interactions with the verifier, and then
the verifier validates these signatures at one time based on
the batch verification criterion. Another secure interactive batch
verification protocol is proposed in [19], which works correctly
by grouping the same base terms together, and then adding the
Our scheme will comply with the above DSRC standard. exponent terms together. Thus, it also means using the same pri-
However, in IEEE 802.11P, the theoretical communication vate key (same sender) to sign a batch of packets. In addition,
range is 1000 m. Because of the dynamic characteristics of this scheme requires a pre-computation for the whole batch of
vehicle with high speed, the connection time between the ve- signatures, and hence it is inefficient in the case of V2G com-
hicle and the aggregator is very short. Thus, the characteristics munication.
of vehicle communication will be taken into consideration to One of DSA variant is proposed in [20] to process batch
design the unique authentication protocol between the vehicles verification. It works correctly if it groups the same base terms
and the aggregator. together and add the exponent terms together. This scheme also
increases the modular exponential calculations and multiplica-
C. DSA Signature tions, which largely increases the authentication time. Another
We use DSA signature [17] for the batch authentication. multiple DSA-type digital signatures authentication scheme
Some parameters are defined as in Table I. proposed in [21] is not the interactive scheme. However, this
Before sending a message , a vehicle generates a signature batch verification scheme cannot be true if it groups the same
by: base terms together and add the exponent terms together, which
1) selecting a random integer with ; means the batch verification process will never hold true in this
2) computing case.
There are also some work reported in the area of signature
aggregation that they aggregate the signatures along a tree to-
ward the root [25], or aggregate signature along a chain [26].
3) computing The topic of secure aggregation in vehicular ad hoc networks
(VANETs) in [27] presents concatenated signatures, onion sig-
natures, and hybrid signatures which are suitable for message
4) computing aggregation and group communications.
The characteristic of V2G communications is different from
the above work. In the V2G communications, the vehicles di-
rectly communicate with the aggregator without forming a tree
When computing , the string obtained from shall be or a group so as to meet the stringent requirement of real time
converted to an integer. communications. In addition, the transmitted packets may be
Thus, the signature for is . from the different vehicles, or may be from the same vehicle
After the aggregator receives the packet with signature, it can if this vehicle has more information to inform the aggregator
verify the signature by three steps: and hence packetizes the information into multiple packets. In
1) checking whether and ; If either con- other words, the senders of packets can be different or can be
dition is violated, the signature shall be rejected as invalid. the same. Therefore, we need to design the unique batch au-
If valid, go to next step. thentication protocol which is suitable for V2G communica-
2) computing tions. In our previous work [28], we proposed a secure wire-
less communication platform for EV-to-grid research in which
we used a hybrid authentication protocol to authenticate mes-
sages one-by-one. In this paper, we address the authentication
issue using the batch authentication technique with the aim to
improve the performance.
710 IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011
III. UBAPV2G PROTOCOL operation. For one-by-one authentication, the aggregator veri-
fies the signature one packet by one packet. Thus, it needs to
A. Generic Construction do times of power operation and times of multiplication
As is well known that existing digital signature algorithms operation for packets. Therefore, the UBAPV2G batch au-
are computationally expensive, the straightforward approach of thentication protocol reduces the computational time since the
verifying each packet and signing a confirmed packet individu- time consuming with power operation is bigger than that with
ally raises a serious overhead for the critical time requirement addition operation.
of V2G communications. If one packet in the batch is not valid, then the batch protocol
UBAPV2G uses a unique batch authentication protocol, will verify the signatures for half batch of packets first, then 1/4
which supports simultaneously verifying the signature of a batch, then 1/8 batch In the end, the aggregator will find out
batch of packets. In particular, when the aggregator receives the invalid packet. In our design, we assume that the invalid
packets: , , where is the data packets are very rare.
payload, is the corresponding signature, and is a positive
number. We can then put them into an algorithm C. UBAPV2G Protocol
The detail of UBAPV2G protocol is illustrated in Fig. 3 and
is elaborated below. In our scheme, all parties share a common
trust point in that they both use the same certificate authority to
If the output is , the aggregator knows that the packets have their certificates signed. In the following procedure, is
are authentic, and otherwise not. the message concatenation operation, which appends in a spe-
cial format; and are to encrypt or decrypt the
B. Batch Authentication Technique With UBAPV2G
message using the public key and the private key re-
Since the reviewed batch verification algorithms are not suit- spectively; and is cipher text.
able, we modified the DSA algorithm to make the batch verifi- 1) The aggregator forms a power command according
cation scheme suitable for V2G communication. to electricity requirement, generates a signature for
The signature of a message is computed according to the according to DSA signature, attaches its certificate
following equations: and then broadcasts it via a concatenated message:
to call the EVs within a certain distance.
2) A nearby vehicle receives the message, verifies the at-
tached certificate and then uses the aggregator’s public key
which is in the attached certificate to verify the aggre-
gator’s signature and confirm that the message is from the
In our UBAPV2G batch authentication scheme, after re- aggregator.
ceiving a batch of packets , the 3) The vehicle collects its real-time information that the
aggregator verifies their signatures with only one signature aggregator needs together with the timestamp , gen-
verification by: erates a signature according to DSA signature and at-
1) checking whether and ; If either con- taches its certificate , encrypts it using the aggregator’s
dition is violated, the signature shall be rejected as invalid. public key , and finally sends it to the aggregator
If valid, go to next step.
2) computing
From (1), we can know that the UBAPV2G batch authen- 6) When the aggregator waits for the interval time to receive
tication protocol only do times of addition operation, a batch of packets, the aggregator also verifies the signa-
time of power operation, and times of multiplication tures starting from the first packet, which means during
GUO et al.: UBAPV2G: A UNIQUE BATCH AUTHENTICATION PROTOCOL FOR VEHICLE-TO-GRID COMMUNICATIONS 711
TABLE II
PERFORMANCE COMPARISON
reduced. Thus, the UBAPV2G achieves better performance. [10] J. Motavalli, “Power to the people: Run your house on a Prius,” New
The higher the number of packets is, the bigger the batch size York Times Sep. 2, 2007 [Online]. Available: http://www.nytimes.com/
2007/09/02/automobiles/02POWER.html, retrieved Dec. 16, 2009
is, and hence the more time the UBAPV2G can reduce. [11] R. McMillan, “Power grid is found susceptible to cyberattack,” IDG
In summary, UBAPV2G can reduce the authentication delay News Service, Mar. 21, 2009.
when a large number of packets respond to the aggregator’s call. [12] L. Armstrong, What is DSRC [Online]. Available: http://www.leearm-
strong.com/DSRC/DSRCHomeset.htm, retrieved Sep. 2, 2008
[13] H. Q. Guo, “Introduction: An emerging area of vehicular networks and
VII. CONCLUSIONS data exchange,” in Automotive Informatics and Communicative Sys-
tems: Principles in Vehicular Networks and Data Exchange. Her-
In this paper, we present the UBAPV2G batch authentica- shey, NY: Information Science Reference, 2009, pp. 1–11.
tion protocol for V2G communication that takes into account the [14] D. Jiang and L. Delgrossi, “IEEE 802.11p: Towards an international
characteristics of vehicle communications. Instead of verifying standard for wireless access in vehicular environments,” in Proc.
IEEE Veh. Technol. Conf. (VTC Spring), Singapore, May 2008, pp.
each packet for each individual vehicle, the aggregator checks 2036–2040.
a batch of responses from a batch of vehicles with only one sig- [15] Family of Standards for Wireless Access in Vehicular Environments
nature verification, and then broadcasts a signed confirmation (WAVE), IEEE 1609, Sep. 25, 2009, ITS Standards Fact Sheets.
packet to inform the batch of vehicles with only one signature. [16] IEEE Trial-Use Standard for Wireless Access in Vehicular Environ-
ments—Security Services for Applications and Management Messages,
We describe the batch signature technique with UBAPV2G and IEEE Standard 1609.2-2006, Jul. 2006.
the detail design of UBAPV2G protocol. We analyze the basic [17] Digital Signature Standard (DSS), Federal Information Processing
V2G system and the batch V2G system with UBAPV2G pro- Standards Publication, FIPS PUB 186-3, National Institute of Stan-
dards and Technology, Jun. 2009.
tocol to show that UBAPV2G can reduce authentication delay, [18] D. Naccache, D. M’Raihi, D. Rapheali, and S. Vaudenay, “Can DSA be
and analysis also shows that UBAPV2G can achieve less com- improved: Complexity trade-offs with the digital signature standard,”
putational cost and less communication traffic compared with in Pre-Proc. Eurocrypt 1994, pp. 85–94.
the one-by-one authentication scheme. The security analysis [19] L. Harn, “DSA type secure interactive batch verification protocols,”
Electron. Lett., vol. 31, no. 4, pp. 257–258, 1995.
shows that UBAPV2G protocol is secure against the security at- [20] M. Bellare, J. A. Garay, and T. Rabin, “Fast batch verification for mod-
tacks. The experimental results also prove that UBAPV2G can ular exponentiation and digital signatures,” in Proc. Adv. Cryptol. (EU-
achieve less authentication delay for large number of packets. ROCRYPT), May 1998, pp. 236–250.
[21] L. Harn, “Batch verifying multiple DSA-type digital signatures,” Elec-
Thus, UBAPV2G protocol is suitable for the stringent require- tron. Lett., vol. 34, no. 9, pp. 870–871, 1998.
ment of real time V2G communications. [22] Y. Zhou and Y. Fang, “Multimedia broadcast authentication based on
batch signature,” IEEE Commun. Mag., vol. 45, no. 8, pp. 72–77, Aug.
2007.
REFERENCES [23] Y. Zhou, X. Zhu, and Y. Fang, “MABS: Multicast authentication based
[1] C. J. Cleveland and C. Morris, Dictionary of Energy. Amsterdam, on batch signature,” IEEE Trans. Mobile Comput., vol. 9, no. 7, pp.
The Netherlands: Elsevier, 2006, p. 473. 982–993, Jul. 2010.
[2] Pacific Gas & Electric, “Pacific Gas and Electric Company energizes [24] C. Boyd and C. Pavlovski, “Attacking and repairing batch verification
Silicon Valley with vehicle-to-grid technology,” Apr. 2007, retrieved schemes,” in Proc. 6th Int. Conf. Theory Appl. Cryptol. Inf. Security
Dec. 16, 2009 [Online]. Available: http://www.pge.com/about/news/ Adv. Cryptol. (ASIACRYPT ’01), Dec. 2000, pp. 58–71.
mediarelations/newsreleases/q2_2007/070409.shtml [25] L. Yang, J. Han, Y. Qi, and Y. Liu, “Identification-free batch authen-
[3] V2G Home, “What is V2G?” [Online]. Available: http://www.udel. tication for RFID tags,” in Proc. IEEE Int. Conf. Netw. Protocols
edu/V2G/, retrieved Dec. 14, 2009 (ICNP), Kyoto, Japan, Oct. 2010.
[4] “Car prototype generates electricity, and cash,” Sci. Daily Dec. [26] D. Boneh, C. Gentry, B. Lynn, and H. Shacham, “A survey of two
9, 2007 [Online]. Available: http://www.sciencedaily.com/re- signature aggregation techniques,” CryptoBytes Tech. Newslett., vol.
leases/2007/12/071203133532.htm,, retrieved Dec. 16, 2009 6, no. 2, Summer, 2003, RSA Laboratories.
[5] “Vehicle-to-grid,” [Online]. Available: http://en.wikipedia.org/wiki/ [27] M. Raya, A. Aziz, and J. Hubaux, “Efficient secure aggregation
Vehicle-to-grid, retrieved Dec. 16, 2009 in VANETs,” in Proc. 3rd ACM Int. Workshop Veh. Ad Hoc Netw.
[6] A. Cocconi, “Connected cars: Battery electrics & plug in hybrids,” pre- (VANET), Los Angeles, CA, Sep. 2006.
sented at the Seattle Electric Vehicle to Grid Forum, V2G Tech. Symp., [28] H. Q. Guo, F. Yu, W. C. Wong, V. Suhendra, and Y. D. Wu, “Secure
Seattle, WA, Jun. 6, 2005. wireless communication platform for EV-to-grid research,” in Proc.
[7] A. N. Brooks, “Final report vehicle-to-grid demonstration project: Grid 6th Int. Wirel. Commun. Mobile Comput. Conf. (IWCMC), Caen,
regulation ancillary service with a battery electric vehicle,” AC Propul- France, Jun. 28–Jul. 2 2010, pp. 21–25.
sion Rep., Dec. 2002. [29] D. Bertsekas and R. Gallager, Data Network. Englewood Cliffs, NJ:
[8] T. B. Gage, “Final report development and evaluation of a plug-in hev Prentice-Hall, 1992.
with vehicle-to-grid power flow,” AC Propulsion Rep., Dec. 2003. [30] Ubuntu 10.04 Operating Systems [Online]. Available: http://www.
[9] J. Halliwell, “Overview of some EPRI smart charging projects and ubuntu.com/
communications infrastructure related efforts,” IEEE1809 Webinar,
Feb. 18, 2010. Authors’ photographs and biographies not available at the time of publication.