A RFID-Based Security Authentication System Model for Electric Vehicle Charging Station

Article Preview

Abstract:

Improving the efficiency of RFID data storage and ensuring communication security is an effective way to improve the efficiency and safety of the identifying and authenticating process between charging stations and electric vehicles. Considering structure of electric vehicle charging station (EVCS) and the components of RFID system, this paper presents a charging station security authentication system model based on lightweight RFID security protocol using hybrid encryption technology. This protocol participates in the computation and storage through a reader-writer, so that it can store more data than other protocols using the same storage, meanwhile keeping lightweight. To enhance security, a hybrid encryption for RFID is proposed, which is based on public key signature encryption algorithm, hash function and symmetric key algorithm. Analysis demonstrates that this system has great calculating storage performance and security. In addition, it has the ability to resist several typical attacks. Moreover, gate circuits needed to achieve such encryption algorithm is far less than the one used in conventional SHA-256 algorithm.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

623-628

Citation:

Online since:

March 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Yan Xiaoyan. On Applications Of RFID Pre-payment System in the Charging Station [J]. Electric power information, 2010 (7): 97-99.

Google Scholar

[2] Li Jianpo, Jiang Xue, Sui jisheng. The RFID Intelligent Information Management System of Electric Car Charging Station [J]. Automation instrumentation, 2013, 34(11): 62-65.

Google Scholar

[3] Zhang Boyang, Song Jie, Tian Yuan, etc. The Analysis Of ETC System Security Certification Technology [J]. Information network security, 2012 (7): 46-48.

Google Scholar

[4] Yan Hui, Li Gengying, Zhao Lei, etc. The design and implementation of electric vehicle charging station monitoring system [J]. Grid technology, 2009, 33(12): 17-22.

Google Scholar

[5] Rhee K, Kwak J, Kim S, and others. Inquiry Based on RFID Authentication Protocol under Distributed Database Environment-Response [M]/ Security in Pervasive Computing. Springer of University of Heidelberg in Berlin, 2005: 70-84.

DOI: 10.1007/978-3-540-32004-3_9

Google Scholar

[6] XiongChunru. The Research and Design Based on the RFID Intelligent Data Acquisition Terminal(1). Electric automatization, 2008, 30(5):54-56, 65.

Google Scholar

[7] Zhou Yongbin, Feng Dengguo. The Design and Analysis Of RFID Security Protocol [J]. Computer Academic Journal, 2006, 29(4): 581-589.

Google Scholar

[8] Li Zhimin, Wang Zhiwei, Li Cunhua. On RFID Lightweight Security Communication Protocol Of Hybrid Encryption [J]. HUST Academic Newspaper (Natural science edition), 2012, 1.

Google Scholar