| In recent years,in order to solve the problems in the sustainable development of cities,the construction of smart cities has attracted widespread attention.Smart Grid(SG)and Intelligent Transport System(ITS)are important components of smart cities,as the link between SG and ITS,Electric Vehicles(EV)have the dual characteristics of controllable load and mobile energy storage,they can smooth out fluctuations of the grid,but EV have the uncertainty of charging position and charging or discharging status,if they are allowed to connect to the grid in disorder,they will have a serious impact on the operating status of the grid and the smart construction of the city.This paper focuses on the intelligent charging system for solving the disorderly charging of electric vehicles and the safety issues of the intelligent charging system.The technology of Vehicle to Grid(V2G)can realize the energy and information exchange between EV and the grid,ITS provides communication environment for EV participating in V2G while driving,incentives are used by grid to guide users to make reasonable decisions,EV can obey the scheduling of the grid while meeting their needs,thereby achieving smart charging management.At the same time,electric vehicles participating in V2G while driving face serious safety issues,it may threaten the privacy of users or the safe and stable operation of the grid,so a reliable security mechanism must be proposed to prevent it.Firstly,this paper proposes a smart charging system model of EV based on a distributed implementation of V2G and supported by a cloud computing environment and internet of vehicles,and analyze its security issues.Secondly,in view of its security problems possibly,a certificateless aggregate signature mechanism based on certificateless signature technology is proposed,this mechanism has considered the scenario where a large number of EV are connected to the grid,and introduce an aggregate signature method to reduce authentication delay between EV and control centers of grid while ensuring the security of the system.Finally,the security,flexibility and efficiency of the scheme are proved through security analysis,simulation verification and performance analysis. |