Q-Secure-P2-SMA: Quantum-Secure Privacy- Preserving Smart Meter Authentication for Unbreakable Security in Smart Grid

被引:5
作者
Prateek, Kumar [1 ]
Das, Meghashrita [2 ]
Surve, Sairaaj [3 ]
Maity, Soumyadev [4 ]
Amin, Ruhul [5 ]
机构
[1] Dr B R Ambedkar Natl Inst Technol, Dept Informat Technol, Jalandhar 144011, India
[2] Indian Inst Technol Kharagpur, Agr & Food Engn, Kharagpur 721302, India
[3] Dwarkadas J Sanghvi Coll Engn, Dept Informat Technol, Mumbai 400056, Maharashtra, India
[4] Indian Inst Informat Technol Allahabad, Dept Informat Technol, Prayagraj 211051, India
[5] Indian Inst Informat Technol Naya Raipur, Dept Comp Sci & Engn, Raipur 892002, India
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2024年 / 21卷 / 05期
关键词
Security; Smart grids; Quantum mechanics; Logic gates; Protocols; Authentication; Quantum computing; privacy; smart meter; smart grid; semi-quantum key distribution; security threats; quantum threats; DATA AGGREGATION SCHEME; EFFICIENT; NETWORKS;
D O I
10.1109/TNSM.2024.3357103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart grids, steering an energy revolution through smart metering infrastructure, face cybersecurity threats and unauthorized access risks. Within these systems, classical authentication protocols validate identities, fostering trust and enabling access to authorized resources, while preventing unauthorized access. However, classical authentication protocols are predominantly dependent on public-key cryptography, rooted in computational hard problems such as integer factorization and discrete logs to uphold security. Nevertheless, these computational hard problems can be easily compromised by quantum adversaries. Furthermore, quantum-resistant smart meter authentication protocols are either deemed impractical or reliant on quantum hard problems, potentially lacking future-proof security. Moreover, maintaining SG entity privacy holds equal significance. Consequently, this article introduces the Quantum-Secure Privacy-Preserving Smart Meter Authentication (Q-Secure-P-2-SMA) protocol. It utilizes semi-quantum key distribution and a hash function to facilitate quantum-resistant metering data communication, with a focus on privacy and practicality. The security analysis and performance evaluation conducted for Q-Secure-P-2-SMA confirm its resilience against well-known security threats, showcasing improved efficiency compared to existing state-of-art-protocols across computation, communication, and energy overhead. Notably, the Q-Secure-P-2-SMA doesn't necessitate quantum capability among all SG entities, making it more practical and relevant in real-world scenarios.
引用
收藏
页码:5149 / 5163
页数:15
相关论文
共 35 条
[1]   A Lightweight Lattice-Based Homomorphic Privacy-Preserving Data Aggregation Scheme for Smart Grid [J].
Abdallah, Asmaa ;
Shen, Xuemin .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (01) :396-405
[2]   Authentication of smart grid communications using quantum key distribution [J].
Alshowkan, Muneer ;
Evans, Philip G. ;
Starke, Michael ;
Earl, Duncan ;
Peters, Nicholas A. .
SCIENTIFIC REPORTS, 2022, 12 (01)
[3]   Semiquantum key distribution [J].
Boyer, Michel ;
Gelles, Ran ;
Kenigsberg, Dan ;
Mor, Tal .
PHYSICAL REVIEW A, 2009, 79 (03)
[4]  
Bush Stephen P., 2013, Insecta Mundi, V298, P1
[5]  
Cervesato I., 2001, P 16 ANN S LOG COMP, V1, P1
[6]   A Privacy Enhanced Authentication Scheme for Securing Smart Grid Infrastructure [J].
Chaudhry, Shehzad Ashraf ;
Nebhan, Jamel ;
Yahya, Khalid ;
Al-Turjman, Fadi .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (07) :5000-5006
[7]   Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era [J].
Cheng, Chi ;
Qin, Yue ;
Lu, Rongxing ;
Jiang, Tao ;
Takagi, Tsuyoshi .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (06) :6386-6395
[8]  
Christandl M, 2004, Arxiv, DOI arXiv:quant-ph/0402131
[9]   LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid [J].
Darzi, Saleh ;
Akhbari, Bahareh ;
Khodaiemehr, Hassan .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01) :263-278
[10]  
Deng FG, 2005, Arxiv, DOI arXiv:quant-ph/0508168