Font Size: a A A

Research On V2G Network Security Mechanism Based On Fog Computing

Posted on:2020-12-24Degree:MasterType:Thesis
Country:ChinaCandidate:Z W FangFull Text:PDF
GTID:2518306311982939Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
As one of the key technologies in the future development of smart grid,Vehicle-to-Grid(V2G)can effectively improve the efficiency of power grid and alleviate the fluctuation caused by renewable energy entering the power grid.In the case of large-scale electric vehicles(EV)connected to the power grid,in order to meet the energy needs of users,such as desired levels of charging and waiting time,V2G network needs to introduce an open communication environment.The information exchanged between entities in the network must be protected through a secure network environment.Therefore,the security of V2G network is a very challenging and important problem.Fog computing,as a new distributed computing mode to supplement cloud computing,is highly consistent with the future development trend of autonomous V2G network with the same distributed characteristics.Therefore,it is of great significance to study the security mechanism of V2G network based on fog computing.This paper mainly studies the security mechanism of V2G network from two aspects:identity authentication and access control.The main work of this paper is as follows:To solve the problem of identifying malicious users who may launch network attacks in V2G networks,we propose a charging identity authentication scheme based on fog computing in this paper.In our proposed scheme,when each EV user finished his registration,all related servers(including fog server)must authenticate his identity;then,when the user needs to start charging,the corresponding fog server must save relevant electricity information after charging;finally,electricity server(ES)can periodically audit the electricity consumption in batches Based on fog computing,the communication efficiency of the whole V2G network is improved by reducing the number of interactions between EV users and cloud servers.Also,we analyze the security of our proposed scheme,where our proposed scheme uses group signatures to protect the privacy of EV users.The experimental results show that our proposed scheme is effective and efficient.After completing identity authentication in V 2G network,hierarchical access control needs to be carried out according to user level.To solve this problem,this paper proposes a hierarchical access control strategy based on reputation mechanism in V2G nework.Firstly,EV users are effectively queried by fog computing,and then malicious users are identified and eliminated by using the reputation values of each EV user,thus hierarchical access control for EV users is realized.Finally,the original reputation value is updated according to the user’s behavior in the charging process.This paper verifies the effectiveness of the proposed access control strategy through experiments.While improving the security of the entire V2G network,it also achieves finer-grained monitoring and management for users.
Keywords/Search Tags:Vehicle-to-Grid, fog computing, identity authentication, privacy-preserving, reputation mechanism, access control
PDF Full Text Request
Related items