1. AccessAuth: Capacity-aware security access authentication in federated-IoT-enabled V2G networks
- Author
-
Kaoru Ota, Mianxiong Dong, Ming Tao, and Zhuzhong Qian
- Subjects
Challenge-Handshake Authentication Protocol ,Information privacy ,Computer access control ,Computer Networks and Communications ,Computer science ,computer.internet_protocol ,Email authentication ,Access control ,02 engineering and technology ,Computer security ,computer.software_genre ,NTLMSSP ,Theoretical Computer Science ,Distributed System Security Architecture ,Artificial Intelligence ,Forward secrecy ,Generic Bootstrapping Architecture ,Lightweight Extensible Authentication Protocol ,0202 electrical engineering, electronic engineering, information engineering ,Data Authentication Algorithm ,Authentication ,Revocation ,business.industry ,020206 networking & telecommunications ,Mutual authentication ,Multi-factor authentication ,Chip Authentication Program ,Hardware and Architecture ,Network Admission Control ,IPsec ,Network Access Control ,Authentication protocol ,Protected Extensible Authentication Protocol ,020201 artificial intelligence & image processing ,Lightweight protocol ,Challenge–response authentication ,business ,computer ,Software ,Computer network - Abstract
Vehicle-to-Grid (V2G) systems promoted by the federated Internet of Things (IoT) technology will be ubiquitous in the future; therefore, it is crucial to provide trusted, flexible and efficient operations for V2G services using high-quality measures for security and privacy. These can be achieved by access and authority authentication. This paper presents a lightweight protocol for capacity-based security access authentication named A c c e s s A u t h . Considering the overload probability and system capacity constraints of the V2G network domain, as well as the mobility of electric vehicles, the ideal number of admissible access requests is first calculated adaptively for each V2G network domain to actively achieve capacity-based access admission control. Subsequently, to provide mutual authentication and maintain the data privacy of admitted sessions, by considering whether there is prior knowledge of the trust relationship between the relevant V2G network domains, a high-level authentication model with specific authentication procedures is presented to enforce strict access authentication such that the sessions are conducted only by authorized requesters. Additionally, efficient session revocation with forward security and session recovery with no extra authentication delay are also discussed. Finally, analytical and evaluation results are presented to demonstrate the performance of A c c e s s A u t h .
- Published
- 2018
- Full Text
- View/download PDF