Scheduled System Maintenance:
Some services will be unavailable Sunday, March 29th through Monday, March 30th. We apologize for the inconvenience.
By Topic

On the security of a unique batch authentication protocol for vehicle-to-grid communications

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
1 Author(s)
Huei-Ru Tseng ; Inf. & Commun. Res. Labs., Ind. Technol. Res. Inst., Hsinchu, Taiwan

The concept of vehicle-to-grid (V2G) is that electric vehicles (EVs) communicate with the smart grid to sell demand response services by delivering electricity into the grid. By letting EVs discharge during peak hours and charge during off-peak hours, V2G networks could bring numerous social and technical benefits to the smart grid. Due to the scale of the network, the speed of the vehicles, their geographic positions, and the very sporadic connectivity between them, V2G communications have the crucial requirements of fast authentication. In 2011, Guo et al. proposed a unique batch authentication protocol for V2G communications. They claimed their protocol is strong enough to defend against security attacks. In this paper, we investigate the security of Guo et al.'s protocol. More precisely, we show that either the vehicle or aggregator can easily generate a collection of bogus signatures that satisfies the batch verification criterion, i.e., forgery attacks. Any attackers can easily forge signatures satisfying the batch verification criterion without the knowledge of the signer's private key. Consequently, Guo et al.'s protocol is not secure at all.

Published in:

ITS Telecommunications (ITST), 2012 12th International Conference on

Date of Conference:

5-8 Nov. 2012