Proposal and Evaluation of Authentication and Authorization Protocols for CWD-WPT Charging Stations
não foram informadas palavras-chave.
Wireless charging for electric vehicles (EV) while the vehicle is in motion has gained special attention as a new service for such vehicles. It is supported by wireless power transfer (WPT) technologies that charge the battery of a vehicle being driven (CWD) through magnetic induction from coils installed on the ground. The service has also led to new challenges to be met, including system security. The CWD-WPT loading system must guarantee the privacy, anonymity, integrity, and availability of data stored or in transit through the system, which thus requires the implementation of an access control through user authentication towards ensuring data security and privacy. The user authentication process is fundamental for the CWD-WPT loading system, and the protocols used for this task must guarantee the access of valid users to the system and resist attacks such as impersonation, replay, denial of service - DoS, Man-in-the-Middle - MitM, among others. This thesis presents 3 authentication and authorization protocols for controlling an EV's access to a cloud-based CWD-WPT charging station. The 1 st and 2nd proposed protocols were designed on the basis of a charging station with centralized control, while the 3rd. protocol is devoted to a decentralized control. The 1 st protocol was built primarily with the use of encryption schemes based on bilinear pairing and hash chaining and the 2 nd is a variant of the first, whose main difference is the use of a new cryptographic scheme based on chaotic maps and a binary tree for access control in the system. The performance of such cryptographic schemes is higher than that of other protocols, regarding metrics such as computational and communication costs, and ensures mutual authentication among EVs and all entities in the system. On the other hand, the 3 rd . protocol was designed on a centrally controlled charging station architecture and the cryptographic schemes used are chaotic maps and hash chain. Moreover, blockchain was employed for the creation and management of groups and authentication and access control of the EV in the CWDWPT charging station. According to the results, the blockchain-based protocol achieved better computational performance, energy and security features compared to other protocols. The use of chaotic maps has been advantageous in terms of execution performance and has promoted a fast creation of session keys and digital signatures at low computational costs. On the other hand, the blockchain provides VANET networks with transparency in their functioning, providing resistance to attacks and a quick and efficient validation of the user's credentials in the authentication process for authorizing or denying their access to the system. It also guarantees a high availability of the service due to its decentralized design.