Privacy-Preserving EV Charging Authorization and Billing via Blockchain and Homomorphic Encryption
Abstract
1. Introduction
- A novel blockchain–FHE architecture enhancing EV charging transaction security and privacy.
- A robust authorization mechanism leveraging encrypted credentials and blockchain-based smart contracts.
- A secure billing protocol employing homomorphic encryption to preserve confidentiality during energy consumption computations.
- Detailed performance evaluation and security analyses demonstrating the practical feasibility and efficacy of the proposed solution.
2. Related Work
2.1. Blockchain-Based EV Charging
2.2. Integration with Machine Learning, V2G Authentication, and Access Control
2.3. Privacy-Preserving Schemes and Energy-Efficient Data Collection
2.4. Gaps and Research Motivation
2.5. Shortcomings of Prior Approaches
3. Proposed System Architecture
3.1. Overview of Key Components
- EV User: Users securely generate encrypted authorization and billing requests using their public keys generated by an FHE scheme, ensuring sensitive user data remains confidential.
- Charging station: Acts as the intermediary for service delivery, routing encrypted requests to blockchain nodes, and securely managing encrypted energy consumption data.
- Blockchain network: Utilizes distributed ledger technology to record immutable encrypted transactions, performing authorization and billing verification through consensus algorithms, thus decentralizing trust.
- FHE computation layer: Conducts secure computations directly on encrypted data without exposing plaintext, supporting authorization validation and billing calculations.
- Smart contracts: Automated, secure scripts on the blockchain performing verification and billing computations on encrypted data, ensuring transparency and auditability.
3.2. Interaction Between Blockchain and FHE
3.3. Key Management and Security
3.4. Scalability and Deployment Considerations
4. Privacy-Preserving Authorization
4.1. Secure User Identification
4.2. Smart Contract-Based Authorization
4.3. Smart Contract Authorization Algorithm
Algorithm 1 Privacy-Preserving Smart Contract Authorization |
Require: Encrypted Credential , Stored Token Ensure: Authorization Decision (Grant/Deny)
|
4.4. Benefits and Discussion
- Complete data confidentiality: No plaintext user identification details are exposed, significantly minimizing data leakage risks.
- Secure and verifiable authorization: Robust cryptographic verifications ensure reliable authorization decisions without compromising user privacy.
- Reduced insider risk: Role-based access restrictions prevent comprehensive data access, safeguarding against insider threats.
5. Secure Billing Protocol
5.1. Encrypted Energy Metering and Cost Calculation
5.2. Billing Algorithm and Zero-Knowledge Proof
5.3. Payment Settlement
5.4. Comparative Analysis
Algorithm 2 Homomorphic Billing with ZKP |
Require: Encrypted Consumption , Encrypted Rate Ensure: Encrypted Total Cost
|
6. System Security Analysis
6.1. Threat Model
- Communication eavesdropping: Adversaries attempt to intercept sensitive information during transmission between EV users, charging stations, and blockchain nodes.
- Ledger manipulation: Malicious entities may try to alter stored transaction records to affect billing integrity or authorization outcomes.
- Unauthorized data access: Attackers aim to exploit vulnerabilities to access sensitive user information, including identity and energy usage data.
- Insider threats and collusion: Potential risk of malicious insiders or compromised blockchain nodes accessing unauthorized data or corrupting operations.
6.2. Mitigation Techniques
- End-to-end encryption: All data communications employ fully homomorphic encryption, ensuring data remain encrypted at all times and preventing eavesdropping:
- Distributed ledger integrity: Blockchain’s decentralized nature inherently protects against ledger manipulation, offering tamper-resistant transaction storage validated by distributed consensus algorithms:
- Role-based access control (RBAC): Strict RBAC policies restrict node permissions, significantly limiting unauthorized access and insider threats:
- Zero-knowledge proofs (ZKPs): ZKPs ensure verifiable correctness of transactions and computations without disclosing sensitive data:
6.3. Security Feature Comparison
7. Performance Evaluation
7.1. Experimental Setup
7.2. Performance Metrics Comparison
7.3. Throughput vs. Concurrent Users
7.4. Energy Efficiency Comparison
7.5. Sensitivity Analysis
7.6. Evaluation Metrics
- Computational overhead: Measures the time and resources required to perform homomorphic encryption and computations.
- Latency: Total duration from authorization initiation to the finalization of billing transactions.
- Throughput: Number of transactions processed per unit of time, reflecting the scalability potential of the system.
- Energy efficiency: Additional energy consumption due to cryptographic operations compared to conventional billing systems.
7.7. Experimental Results
7.8. Scalability and Computational Overhead
7.9. Energy Efficiency Analysis
8. Case Study and Practical Application
8.1. Regional EV Charging Network Simulation
8.2. Implementation Details
- FHE library: Utilized state-of-the-art cryptographic libraries optimized specifically for homomorphic arithmetic operations, minimizing computation latency.
- Blockchain platform: Deployed Hyperledger Fabric configured with Proof-of-Authority consensus, selected for its efficiency and ability to support enterprise-level smart contracts securely.
- Authorization workflow: Each EV user securely maintained encrypted identification tokens, verified through homomorphic equality checks executed by blockchain smart contracts.
- Billing mechanism: Real-time energy consumption data encrypted at charging stations was processed homomorphically to calculate billing statements, preserving user confidentiality entirely.
8.3. Operational Observations
- Performance and scalability: Despite computational overhead due to homomorphic encryption, the distributed computational capabilities of blockchain nodes effectively maintained high throughput and low latency.
- Privacy assurance: Users’ sensitive information remained confidential throughout the entire process, significantly enhancing user trust and compliance with privacy regulations.
- Stakeholder collaboration: The consortium blockchain structure facilitated transparent collaboration among diverse stakeholders, enhancing system reliability and trust.
8.4. Summary of Practical Feasibility
8.5. Discussion
8.6. Future Directions
- Cryptographic optimization. Advancing FHE libraries, investigating approximate or leveled homomorphic schemes, and exploring specialized hardware (e.g., FPGAs) may reduce latency and resource consumption.
- Encrypted analytics. Integrating machine-learning models that operate directly on encrypted data could support demand forecasting, dynamic pricing and anomaly detection without compromising user privacy.
- Broader IoT applications. The architecture can be adapted to other privacy-sensitive Internet-of-Things domains such as smart homes, supply chain logistics, or healthcare, where secure computation and immutable ledgers are valuable.
- Compliance and auditing frameworks. Developing regulatory frameworks and automated compliance checks—particularly for regimes such as the GDPR—would facilitate adoption in diverse jurisdictions.
- Large-scale pilot deployments. Collaboration with utilities, vehicle manufacturers, and regulatory bodies to conduct pilot studies will yield real-world insights into user adoption, scalability, and cost–benefit trade-offs.
9. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Saha, R.; Kumar, G.; Geetha, G.; Tai-Hoon-Kim; Alazab, M.; Thomas, R.; Rai, M.K.; Rodrigues, J.J.P.C. The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface. IEEE Trans. Veh. Technol. 2021, 70, 7495–7508. [Google Scholar] [CrossRef]
- Sahu, B.L.; Chandrakar, P.; Kumari, S.; Chen, C.-M.; Amoon, M. Blockchain and Machine Learning Integrated Secure Driver Behavior Centric Electric Vehicle Insurance Model. IEEE Trans. Intell. Transp. Syst. 2024, 25, 19073–19087. [Google Scholar] [CrossRef]
- Sharma, G.; Joshi, A.M.; Mohanty, S.P. sTrade: Blockchain based secure energy trading using vehicle-to-grid mutual authentication in smart transportation. Sustain. Energy Technol. Assess. 2023, 57, 103296. [Google Scholar] [CrossRef]
- Liu, H.; Lv, Z.; Song, Z.; Zhou, S.; Liu, W.; Fang, M. Application of Blockchain Technology in Electric Vehicle Charging Piles Based on Electricity Internet of Things. Wirel. Commun. Mob. Comput. 2022, 3, 1–10. [Google Scholar] [CrossRef]
- Zhang, F.; Shen, H.; Wang, D.; Xiang, J. The Wireless Charging Pavement System of Electric Vehicles Based on Block Chain. In Proceedings of the ICBCT ’20: Proceedings of the 2020 2nd International Conference on Blockchain Technology, Hilo, HI, USA, 12–14 March 2020; pp. 125–129. [Google Scholar] [CrossRef]
- Aldweesh, A. Blockchain-Based Secure Firmware Updates for Electric Vehicle Charging Stations in Web of Things Environments. World Electr. Veh. J. 2025, 16, 226. [Google Scholar] [CrossRef]
- Aldweesh, A. A Blockchain-Based Data Authentication Algorithm for Secure Information Sharing in Internet of Vehicles. World Electr. Veh. J. 2023, 14, 223. [Google Scholar] [CrossRef]
- Ren, W.; Sun, Y.; Luo, H.; Guizani, M. SILedger: A Blockchain and ABE-based Access Control for Applications in SDN-IoT Networks. IEEE Trans. Netw. Serv. Manag. 2021, 18, 4406–4419. [Google Scholar] [CrossRef]
- Subramanian, V.; Rajendra, Y.; Sahai, S.; Shukla, S.K. Decentralized Device Authentication Model using the Trust Score and Blockchain Technology for Dynamic Networks. In Proceedings of the 2020 IEEE International Conference on Blockchain (Blockchain), Rhodes, Greece, 2–6 November 2020. [Google Scholar] [CrossRef]
- Li, H.; Han, D.; Tang, M. A Privacy-Preserving Charging Scheme for Electric Vehicles Using Blockchain and Fog Computing. IEEE Syst. J. 2021, 15, 3189–3200. [Google Scholar] [CrossRef]
- Li, S.; Luo, D.; Liu, X.; Luo, R. Research on General Blockchain Security Architecture Based On Cloud Consortium Blockchain. In Proceedings of the 2023 IEEE International Conference on Paradigm Shift in Information Technologies with Innovative Applications in Global Scenario (ICPSITIAGS), Indore, India, 28–29 December 2023. [Google Scholar] [CrossRef]
- Jiang, Y.; Du, S.; Xu, W.; Dong, Y. V2G Charging and Discharging Information Authentication Based on Blockchain Technology. In Proceedings of the 2024 IEEE 4th International Conference on Digital Twins and Parallel Intelligence (DTPI), Wuhan, China, 18–20 October 2024. [Google Scholar] [CrossRef]
- Zhai, D.; Liu, J.; Zhang, T.; Wang, J.; Du, H.; Liu, T.; Wang, T.; Zhang, C.; Kang, J.; Niyato, D. EPDB: An Efficient and Privacy-Preserving Electric Charging Scheme in Internet of Robotic Things. IEEE Internet Things J. 2024, 11, 32464–32477. [Google Scholar] [CrossRef]
- Xu, X.; Zhao, H.; Yao, H.; Wang, S. A Blockchain-Enabled Energy-Efficient Data Collection System for UAV-Assisted IoT. IEEE Internet Things J. 2021, 8, 2431–2443. [Google Scholar] [CrossRef]
- Maitra, S.; Yanambaka, V.P.; Abdelgawad, A.; Yelamarthi, K. Securing a Vehicle Fleet Management Through Blockchain and Internet of Things. In Proceedings of the 2020 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS), Chennai, India, 14–16 December 2020. [Google Scholar] [CrossRef]
- Chen, C.-M.; Miao, Q.; Kumari, S.; Khan, M.K.; Rodrigues, J.J.P.C. A Privacy-Preserving Authentication Protocol for Electric Vehicle Battery Swapping Based on Intelligent Blockchain. IEEE Internet Things J. 2024, 11, 17538–17551. [Google Scholar] [CrossRef]
- Sahu, B.L.; Chandrakar, P. Blockchain-Based Framework for Electric Vehicle Charging Port Scheduling. In Proceedings of the 2022 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Gandhinagar, India, 18–21 December 2022. [Google Scholar] [CrossRef]
Reference | Approach | Results (Performance/Privacy) | Advantages | Limitations | Privacy Level | BC + FHE |
---|---|---|---|---|---|---|
Zhang et al. [5] | Blockchain | Transaction latency < 200 ms; consumption privacy exposed | Transparent ledger | No encryption; vulnerable to profiling | Moderate | No |
Liu et al. [4] | Blockchain | Latency ≈ 220 ms; medium throughput | Enhanced reliability | Plaintext billing; centralization | Moderate | No |
Sahu et al. [2] | BC + ML | Accuracy improvements; latency ≈ 250 ms | Driver analytics; anomaly detection | Data exposure; limited scalability | Moderate | No |
Sharma et al. [3] | BC + V2G | Secure mutual authentication; latency ≈ 280 ms | Energy trading support | No privacy guarantees; no billing protocol | High | No |
Proposed | BC + FHE | Authorization latency 610 ms; throughput 102 Tx min; energy overhead 0.14 kWh day | Full data confidentiality; decentralized trust; verifiable billing | Higher computational overhead; requires key management | Very high | Yes |
Feature | Traditional Billing | Blockchain-Only Billing | FHE-Based Billing (Proposed) |
---|---|---|---|
Data exposure | Plaintext data | Encryption at rest; computations in plaintext | Fully encrypted data during storage and computation |
Privacy level | Low–moderate | Moderate | Very high |
Security | Vulnerable to insiders | Decentralized ledger | End-to-end confidentiality with RBAC and ZKP |
Scalability | Limited by central server | Good | Highly scalable due to off-chain computation |
Computational cost | Low | Moderate | Moderate–high; mitigated by hardware acceleration |
Threat | Traditional Systems | Proposed Blockchain–FHE System |
---|---|---|
Eavesdropping | Vulnerable | Secure (end-to-end encryption) |
Ledger manipulation | High risk | Secure (blockchain consensus) |
Unauthorized access | Moderate risk | Highly Secure (encrypted data and RBAC) |
Insider threats | Moderate to high risk | Significantly Reduced (RBAC, ZKP) |
Method | Authorization Latency (ms) | Billing Latency (ms) | Throughput (Tx min−1) | Energy Overhead (kWh Day−1) |
---|---|---|---|---|
Blockchain-only (Sahu et al.) [17] | 430 | 220 | 98 | 0.09 |
V2G-auth (Sharma et al.) [3] | 480 | — | 95 | 0.08 |
Proposed FHE-based | 610 | 310 | 102 | 0.14 |
Metric | Minimum | Maximum | Average | Std. Dev |
---|---|---|---|---|
Authorization latency (ms) | 420 | 860 | 610 | 100 |
Billing computation (ms) | 190 | 580 | 310 | 75 |
Transaction throughput (Tx/min) | 88 | 112 | 102 | 7 |
Energy overhead (kWh/day) | 0.10 | 0.18 | 0.14 | 0.02 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Published by MDPI on behalf of the World Electric Vehicle Association. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Aldweesh, A.; Alangari, S. Privacy-Preserving EV Charging Authorization and Billing via Blockchain and Homomorphic Encryption. World Electr. Veh. J. 2025, 16, 468. https://doi.org/10.3390/wevj16080468
Aldweesh A, Alangari S. Privacy-Preserving EV Charging Authorization and Billing via Blockchain and Homomorphic Encryption. World Electric Vehicle Journal. 2025; 16(8):468. https://doi.org/10.3390/wevj16080468
Chicago/Turabian StyleAldweesh, Amjad, and Someah Alangari. 2025. "Privacy-Preserving EV Charging Authorization and Billing via Blockchain and Homomorphic Encryption" World Electric Vehicle Journal 16, no. 8: 468. https://doi.org/10.3390/wevj16080468
APA StyleAldweesh, A., & Alangari, S. (2025). Privacy-Preserving EV Charging Authorization and Billing via Blockchain and Homomorphic Encryption. World Electric Vehicle Journal, 16(8), 468. https://doi.org/10.3390/wevj16080468