security feature is that the manipulated and the autho-
rized charging station the attacker uses are sufficiently
wide apart from each other exceeding the maximal ac-
cepted tolerance.
4.2 Multi-operator Authentication
A simple extension to the basis protocol of Section
3 enables a multi-operator authentication without the
necessity of sharing customer data between operators.
Each operator obtains an operator ID. Instead of just
pressing a button, the customer chooses the operator
at the CS. The CS encrypts the message m using the
respective operator’s public key pk
CSMS
i
and then in-
corporates the appropriate operator ID within the QR
code in plaintext. Basing on the operator ID, the pro-
vided smartphone application decides which operator
the authentication message is forwarded to.
Manipulating the operator ID can not harm the system
because the assigned operator is not able to decrypt
the data which is necessary to return an authentica-
tion token to the customer.
4.3 Privacy-preserving Solution
Locational privacy can be defined as ’the ability of
an individual to move in public space with the expec-
tation that under normal circumstances their location
will not be systematically and secretly recorded for
later use’ (Andrew J. Blumberg and Peter Eckersley,
2009) and has become increasingly relevant with rise
of long-term data retention – itself made facilitated by
increasingly cheap data storage.
While the solution we presented so far does not
preserve a customers location privacy – it allows
for the creation of a movement profile based on the
spatio-temporal location of each charging process –
a limited set of changes can mitigate this threat: In-
stead of sporadically connecting to the Internet to
allow for the CSMS to retrieve billing data, each
CS uses this temporary Internet link to connect to
the Tor network (Mathewson et al., 2004), such that
it is addressable as a location-hidden service. This
means, it is known to the CSMS via its .onion ad-
dress, but not via its IP address or physical loca-
tion. While this may sound far-fetched and imprac-
tical in reality, the Tor network is a highly redundant,
distributed system that can provide connectivity with
sufficient throughput and latency for the application
at hand (Frosch et al., 2013). The authenticity and
non-repudiation of messages from CS to CSMS does
not longer depend on classical signature algorithms.
Instead, messages are signed using a group signa-
ture scheme, like XSGS (Delerabl
´
ee and Pointcheval,
2006). Message m will be formed as (timestamp =
t
i
, token = T, address = onionaddress
CS
, signature =
gsig(t
i
, T, onionaddress
CS
)), while c will still be cre-
ated as enc
pk
CSMS
i
(m). Instead of signing the billing
data tuple with a conventional signature, the CS uses
the a modified eXtremely Small Group Signature as
proposed by Frosch et al. (Frosch et al., 2013).
5 DISCUSSION
In the following we discuss the potential of a com-
pletely offline solution, the advantages of using a ran-
dom binary token over a numeric Personal Identifica-
tion Number (PIN), as well as, the issue of a trustwor-
thy time source.
5.1 Offline Solution
In the unlikely case that a charging station is lo-
cated such that it can never access the Internet,
small changes can be made to the protocol leverage
the user’s communication with the CSMS to trans-
port most billing relevant data within. Including
the current energy meter value Z
t
i
in message m,
such that m = (meter = Z
t
i
, timestamp = t
i
, token =
T, signature = sig
sk
CS
(Z
t
i
, t
i
, T )). The charging pro-
cess can only be terminated by performing the authen-
tication procedure again, such that a message m
2
=
(meter = Z
t
j
, timestamp = t
j
, token = T
0
, signature =
sig
sk
CS
(Z
t
j
, t
j
, T
0
)) is transmitted to the backend.
However, as many electric vehicles come with a man-
ual unlock mechanism for the power connector, even
a honest, but curious, customer can evade the trans-
mission of m
2
and thus charge without paying. Ad-
ditionally, t
i
, t
j
are created when the customer presses
a button and not at the exact time the charging starts.
Depending on local legislation, this may not be pre-
cise enough.
5.2 Random Token vs. Random PIN
Although numeric PINs are frequently used to authen-
ticated customers, e. g., at automatic teller machines
(ATMs), the keyspace of usable-length PINs is very
limited. PIN lengths up to 6 digits can be considered
acceptable to the customer, as they are used in com-
mercial applications. However, as the character reper-
toire is limited to [0..9], the keyspace is limited to 10
l
.
The probability that an attacker guesses a valid pass-
word is thus
1
10
l
, i. e., on average an attacker needs
b
10
l
2
c guesses. As this limitation is well known, many
PIN-based authentication systems require not only the
CommunicationReducedInteractionProtocolbetweenCustomer,ChargingStation,andChargingStationManagement
System
123