[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2517968.2517971acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

POPCORN: privacy-preserving charging for emobility

Published: 04 November 2013 Publication History

Abstract

Upcoming years will see a massive deployment of electric vehicles and, combined with this, of charging infrastructure. This will require protocols and standards that will control authentication, authorization, and billing of electric-vehicle charging. The ISO/IEC 15118 protocol that addresses the communication between the charging station and the vehicle is going to play an important role, at least in Europe. While it foresees security protection, there are no significant mechanisms for privacy protection in place. In this paper, we investigate the privacy protection of ISO/IEC 15118 and the surrounding charging and payment infrastructure by means of a Privacy Impact Assessment (PIA). Based on this we propose modular extensions of the protocol applying state-of-the-art Privacy Enhancing Technologies like anonymous credentials to come to a system with maximum privacy protection. We conducted a second PIA to show the benefits to privacy protection that our POPCORN protocol provides compared to the original ISO/IEC 15118. We also describe a proof-of-concept implementation of our system based on a model of electric vehicle and charging station that shows the feasibility of our approach and allows a first preliminary analysis of performance and other issues.

References

[1]
D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In Advances in Cryptology--CRYPTO 2004, volume 3152 of Lecture Notes in Computer Science, pages 41--55. Berlin: Springer-Verlag, 2004.
[2]
J. Camenisch and E. Van Herreweghen. Design and implementation of the idemix anonymous credential system. In Proceedings of the 9th ACM conference on Computer and communications security, CCS'02, pages 21--30, New York, NY, USA, 2002. ACM.
[3]
N. Desmoulins, S. Canard, and J. Traoré (Orange Labs R&D, France). 3rd International Conference on Trust and Trustworthy Computing: Java Implementation of Group and Blind Signatures. http://www.trust2010.org/slides/Desmoulins.pdf (slides), Jun 2010.
[4]
Deutsches Institut für Normung. DIN SPEC 91286:2011--11: Electric mobility -- Schemes of identifiers for E-Roaming -- Contract ID and EVSE ID. http://www.beuth.de/en/technical-rule/din-spec-91286/145915787, Nov 2011.
[5]
R. Housley, W. Polk, W. Ford, and D. Solo. RFC 3280 - Internet X.509 Public Key Infrastructure Certificate. Technical report, IETF, 2002.
[6]
IBM Research Zurich, PrimeLife, and PRIME. Identity Mixer -- Download. https://prime.inf.tu-dresden.de/idemix/, 2012.
[7]
ISO. Road vehicles -- Vehicle-to-Grid Communication Interface -- Part 1: General information and use-case definition (Draft). 2012.
[8]
ISO. Road vehicles -- Vehicle-to-Grid Communication Interface -- Part 2: Technical protocol description and Open Systems Interconnections (OSI) layer requirements (Draft). 2012.
[9]
Oracle Corporation. OpenJDK. http://openjdk.java.net/, 2012.
[10]
Organisation for Economic Co-operation and Development (OECD). OECD Privacy Principles. http://oecdprivacy.org, 2010.
[11]
PrimeLife Project. PrimeLife - bringing sustainable privacy and identity management to future networks and services. http://primelife.ercim.eu/, Oct 2011.
[12]
Raspberry Pi Foundation. Raspberry Pi - An ARM GNU/Linux box. http://www.raspberrypi.org/, 2012.
[13]
Tor Project. Anonymity online. https://www.torproject.org/, 2012.
[14]
I. T. Union. ITU-T Recommendation X.509 | ISO/IEC 9594--8: "Information Technology - Open Systems Interconnection - The Directory: Public-Key and Attribute Certificate Frameworks". Technical report.
[15]
United States Government Department of Homeland Security. Privacy office - privacy impact assessments (PIA). http://www.dhs.gov/privacy-office-privacy-impact-assessments-pia (Accessed Aug. 2012), 2012.
[16]
Università degli Studi di Brescia. PP2db: A Privacy-Preserving, P2P-based Scalable Storage System for Mobile Networks. http://www.ing.unibs.it/ntw/tools/pp2db/, 2011.

Cited By

View all
  • (2024)Cybersecurity of Electric Vehicle Smart Charging Management SystemsSolving Fundamental Challenges of Electric Vehicles10.4018/979-8-3693-4314-2.ch004(84-98)Online publication date: 26-Jul-2024
  • (2024)Supply Chain Transport Management, Use of Electric Vehicles, Review of Security and Privacy for Cyber-Physical Transportation Ecosystem and Related SolutionsProcedia Computer Science10.1016/j.procs.2024.06.008238(135-142)Online publication date: 2024
  • (2024)Self-sovereign Identity for Electric Vehicle ChargingApplied Cryptography and Network Security10.1007/978-3-031-54776-8_6(137-162)Online publication date: 29-Feb-2024
  • Show More Cited By

Index Terms

  1. POPCORN: privacy-preserving charging for emobility

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CyCAR '13: Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles
    November 2013
    72 pages
    ISBN:9781450324878
    DOI:10.1145/2517968
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 November 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. electric vehicle charging
    2. iso/iec 15118
    3. privacy
    4. privacy enhancing technologies
    5. security

    Qualifiers

    • Research-article

    Conference

    CCS'13
    Sponsor:

    Acceptance Rates

    CyCAR '13 Paper Acceptance Rate 6 of 11 submissions, 55%;
    Overall Acceptance Rate 6 of 11 submissions, 55%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)36
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 11 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Cybersecurity of Electric Vehicle Smart Charging Management SystemsSolving Fundamental Challenges of Electric Vehicles10.4018/979-8-3693-4314-2.ch004(84-98)Online publication date: 26-Jul-2024
    • (2024)Supply Chain Transport Management, Use of Electric Vehicles, Review of Security and Privacy for Cyber-Physical Transportation Ecosystem and Related SolutionsProcedia Computer Science10.1016/j.procs.2024.06.008238(135-142)Online publication date: 2024
    • (2024)Self-sovereign Identity for Electric Vehicle ChargingApplied Cryptography and Network Security10.1007/978-3-031-54776-8_6(137-162)Online publication date: 29-Feb-2024
    • (2023)Injection Attacks and Detection Strategy in Front-End Vehicle-to-Grid Communication2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)10.1109/SmartGridComm57358.2023.10333927(1-6)Online publication date: 31-Oct-2023
    • (2023)A zero trust and blockchain-based defense model for smart electric vehicle chargersJournal of Network and Computer Applications10.1016/j.jnca.2023.103599213:COnline publication date: 1-Apr-2023
    • (2022)Review of Electric Vehicle Charger Cybersecurity Vulnerabilities, Potential Impacts, and DefensesEnergies10.3390/en1511393115:11(3931)Online publication date: 26-May-2022
    • (2022)Security Threats in Electric Vehicle Charging2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)10.1109/SmartGridComm52983.2022.9961027(399-404)Online publication date: 25-Oct-2022
    • (2022)EVExchange: A Relay Attack on Electric Vehicle Charging SystemComputer Security – ESORICS 202210.1007/978-3-031-17140-6_24(488-508)Online publication date: 25-Sep-2022
    • (2021)P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-GoSensors10.3390/s2108268621:8(2686)Online publication date: 11-Apr-2021
    • (2021)A process algebraic mutation framework with application to a vehicle charging protocolVehicular Communications10.1016/j.vehcom.2021.10035230(100352)Online publication date: Aug-2021
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media