考虑身份认证和敏感信息加密的电动汽车即插即充方案

A Plug-and-charge Scheme for Electric Vehicles Considering Identity Authentication and Sensitive Information Encryption

  • 摘要: 电动汽车目前已成为挖掘交通减碳潜力、提升交通电气化水平的重要手段,也是兑现“双碳”目标承诺的重要途径。然而,电动汽车在充电过程中存在充电过程繁琐、隐私信息易泄露等问题。为简化身份认证流程以及确保充电过程中隐私信息不发生泄露和篡改,该文基于国内充电通信协议GB/T 27930,借鉴国际即插即充充电标准与方案ISO 15118,提出包含身份认证和隐私信息加密的轻量化即插即充方案。鉴于车/桩与对应的运营商之间是无保密通信,构建基于多种国密方法加密的轻量化车–桩–云三方安全身份认证方案。为确保车桩间控制器局域网总线(controller area network,CAN)协议通信安全,建立预计算优化后的迪菲–赫尔曼(Diffie Hellman,DH)加密通道。针对车与桩在进行充电握手阶段过程中身份信息易被窃取篡改的问题,运用国密算法SM4建立敏感信息加密过程。仿真结果表明,该方案具有高安全性、低时延、低通信开销和低计算开销,并能满足无感充电与即插即充的需求。

     

    Abstract: Electric vehicles have currently emerged as a crucial means to tap the carbon reduction potential in transportation and enhance the transportation electrification level. They also represent an important way to achieve the " Double Carbon" goals. However, at present, the charging process of electric vehicles faces certain challenges, including a complicated charging process and easy disclosure of privacy information. To simplify the identity authentication process and ensure that privacy information remains secure from leakage or tampering during charging, we propose a lightweight plug-and-charge scheme. This scheme includes identity authentication and privacy information encryption based on the domestic charging communication protocol GB/T 27930 and the international plug-and-charge standard ISO 15118. Since there is no confidential communication between the vehicle/pile and the corresponding operator, a lightweight vehicle-pile-cloud tripartite security identity authentication scheme is constructed based on multiple national secret encryption algorithms. To ensure the security of CAN protocol communication between piles, a Diffie Hellman (DH) encryption channel with optimized precomputation is established. To address the issue of identity information being susceptible to theft and tampering during the charging handshake stage between vehicles and piles, the national secret algorithm SM4 is employed to establish the encryption process of sensitive information. Through simulation analysis, it is evident that the proposed scheme exhibits high security, low time delay, reduced communication and computing costs, and can meet the requirements for non-inductive charging as well as plug-and-charge functionality.

     

/

返回文章
返回