Movatterモバイル変換


[0]ホーム

URL:


Skip to main content
Springer Nature Link
Log in

Blockchain-based secure transaction mechanism for electric vehicles with multiple temporary identities

  • Application of soft computing
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Vehicle-to-vehicle charging and discharging energy exchange among electric vehicles (EVs) achieve economical and low-loss energy transactions. However, due to the openness of the border, EV power trading faces security issues. When an EV user communicates with a local aggregator, attackers may eavesdrop on the communication links to perform traffic analysis attacks. Moreover, unregistered illegal users may parade themselves as legitimate users and submit a bill query request to the local aggregator. In this paper, we develop a decentralized EV charging service architecture to defend against traffic analysis attacks and prevent users from tampering with transaction bills. Based on the architecture, we propose a blockchain-based secure transaction mechanism for electronic vehicles with multiple temporary identities. Specifically, we first propose a power transaction encryption protocol that utilizes multiple temporary identities to publish information streams, thereby preventing eavesdropping attacks and making the assignment between suppliers and demanders. We then propose a secure query transaction scheme that adds the accumulator value of the user’s temporary identity into the Merkle tree, which identifies the query issued by legitimate users and verifies the query results. Extensive experimental results show that the proposed secure transaction mechanism promotes the user satisfaction and user utility by 5% and 10%, respectively, and promotes the security level by three times.

This is a preview of subscription content,log in via an institution to check access.

Access this article

Log in via an institution

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

Enquiries about data availability should be directed to the authors.

References

Download references

Funding

This work was supported by National Natural Science Foundation of China (Grant Nos. 52177067 and 61902040), Natural Science Foundation of Hunan Province (Grant Nos. 2019JJ40314, 2021JJ30741, and 2023JJ30052), and in part by the National Natural Science Key Foundation of China under Grant U1966207.

Author information

Author notes
  1. Guanghui Wang, Bo Yin and Hongrui Li contributed equally to this work.

Authors and Affiliations

  1. School of Computer and Communication Engineering, ChangSha University Of Science and Technology, Wanjiali Road, Changsha, 410114, Hunan, China

    ZhuoQun Xia, Guanghui Wang, Bo Yin & Hongrui Li

Authors
  1. ZhuoQun Xia

    You can also search for this author inPubMed Google Scholar

  2. Guanghui Wang

    You can also search for this author inPubMed Google Scholar

  3. Bo Yin

    You can also search for this author inPubMed Google Scholar

  4. Hongrui Li

    You can also search for this author inPubMed Google Scholar

Contributions

All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by Zhuoqun Xia, Guanghui Wang and Bo Yin. The first draft of the manuscript was written by Guanghui Wang and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence toBo Yin.

Ethics declarations

Conflict of interest

The authors have no relevant financial or non-financial interests to disclose.

Ethics approval

Our paper does not deal with any ethical problems.

Informed consent

We declare that all authors have informed consent.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xia, Z., Wang, G., Yin, B.et al. Blockchain-based secure transaction mechanism for electric vehicles with multiple temporary identities.Soft Comput28, 4933–4950 (2024). https://doi.org/10.1007/s00500-023-09200-x

Download citation

Keywords

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Advertisement


[8]ページ先頭

©2009-2025 Movatter.jp