ORIGINAL RESEARCH article
Front. Phys.
Sec. Social Physics
Volume 13 - 2025 | doi: 10.3389/fphy.2025.1589195
An anonymous authentication protocol for Vehicle to Grid based on elliptic curve cryptography
Provisionally accepted- 1Ningxia Communications Technical College, Yinchuan, China
- 2Central China Normal University, Wuhan, China
Select one of your emails
You have multiple emails registered with Frontiers:
Notify me on publication
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
As an important component of the smart grid, Vehicle-to-Grid (V2G) can achieve bidirectional exchange of data and power flow between electric vehicles and smart grid, and is an effective promoter for grid storage and decarbonization. However, when electric vehicles are connected to the grid, the V2G network involves a large amount of privacy data exchange and sensitive charging and discharging transactions. Once these data are leaked, the privacy and security of users will be threatened. The existing authentication protocols in V2G network lack sufficient protection for vehicle user identity privacy and cannot provide user identity anonymity. Therefore, this article analyzes security threats in V2G environments, including unauthorized access and user privacy breaches, as well as potential attacks during public communication processes. In response to these security challenges, this article proposes an anonymous and privacy preserving authentication protocol based on elliptic curve cryptography and physical unclonable function (PUF). This protocol achieves mutual authentication, ensuring the security of session keys and protecting the anonymity of participants by sending temporary identity values. The security and efficiency of the protocol are verified through Scyther simulation and heuristic analysis. Compared with other protocols, the protocol proposed in this article not only meets the security requirements in smart grid environment, but also reduces costs, demonstrating significant security and overhead advantages.
Keywords: Vehicle to grid, Elliptic Curve Cryptography, Anonymous, security, Scyther
Received: 07 Mar 2025; Accepted: 31 Jul 2025.
Copyright: © 2025 Sun and Wang. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence: Yan Wang, Central China Normal University, Wuhan, China
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.