A Novel Efficient and Secure Privacy-Preserving Scheme for Smart Grid Based on HECC

被引:0
作者
Habib, Umair [1 ]
Bano, Mahwish [1 ]
Iqbal, Jawaid [2 ]
Ullah, Syed Sajid [3 ]
机构
[1] Air Univ, Dept Math, Islamabad 44000, Pakistan
[2] Riphah Int Univ, Fac Comp, Islamabad 46000, Pakistan
[3] Univ Agder UiA, Dept Informat & Commun Technol, N-4898 Grimstad, Norway
关键词
Security; Elliptic curve cryptography; Encryption; Smart grids; Reliability; Quality of service; Privacy; Information and communication technology; Electricity; Protocols; Smart grid; security; privacy; HECC; signcryption; AVISPA; KEY EXCHANGE PROTOCOL; PROXY RE-ENCRYPTION; PROVABLY SECURE; AUTHENTICATION SCHEME; LIGHTWEIGHT; SIGNCRYPTION; DESIGN;
D O I
10.1109/ACCESS.2025.3549050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart Grid (SG) is an electricity distribution network that monitors energy flow from the point of generation to its final location. The SG can save electricity usage and improve service quality at the same time. However, there are several security issues associated with communication between SG nodes. For example, information breakout is a frequent security problem that arises during communication between two Smart Meters (SMs). Existing studies resolve the issue of information breakout by using numerous cryptographic techniques such as Elliptic Curve Cryptography, Advanced Encryption Standard, RSA, and Bilinear Pairing. Moreover, these techniques suffer due to their greater communication overhead and computational costs because of the enormous size of the parameters and key space. In this study, we proposed a novel, efficient, and privacy-preserving approach for secure data transferring between entities in the SG network to protect against adversaries' attacks by using minimal resources. Our proposed system uses the standard key size of Hyper Elliptic Curve Cryptography (HECC) along with the Signcryption technique for secure communication among the SM, aggregator nodes, and distribution substation to protect sensitive information. The proposed technique ensures safe communication between SG entities while also reducing communication and computational expenses by using shorter key sizes along with other parameters of HECC. Furthermore, we employ the popular simulation program Automated Validation of Internet Security Protocols and Applications (AVISPA) to verify the security aspects of our suggested approach. Moreover, our proposed technique fulfills essential security characteristics like confidentiality, integrity, authenticity, authorization, non-repudiation, and unforgeability.
引用
收藏
页码:49290 / 49308
页数:19
相关论文
共 50 条
[1]   Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications [J].
Abbasinezhad-Mood, Dariush ;
Nikooghadam, Morteza .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :47-57
[2]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[3]  
Abdallah AR, 2014, IEEE GLOB COMM CONF, P668, DOI 10.1109/GLOCOM.2014.7036884
[4]   Efficient Signcryption With Proxy Re-Encryption and Its Application in Smart Grid [J].
Ahene, Emmanuel ;
Qin, Zhangchi ;
Adusei, Akua Konadu ;
Li, Fagen .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) :9722-9737
[5]   A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid [J].
Ahene, Emmanuel ;
Dai, Junfeng ;
Feng, Hao ;
Li, Fagen .
TELECOMMUNICATION SYSTEMS, 2019, 70 (04) :491-510
[6]   SATMC: A SAT-based model checker for security protocols [J].
Armando, A ;
Compagna, L .
LOGICS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 3229 :730-733
[7]   Lightweight Authenticated Key Agreement for Smart Metering in Smart Grid [J].
Baghestani, Seyed Hamid ;
Moazami, Farokhlagha ;
Tahavori, Mahdi .
IEEE SYSTEMS JOURNAL, 2022, 16 (03) :4983-4991
[8]  
Boichut Y., 2004, PROC INT WORKSHOP AU, P1
[9]   Efficient and Provably Secure Key Agreement for Modern Smart Metering Communications [J].
Braeken, An ;
Kumar, Pardeep ;
Martin, Andrew .
ENERGIES, 2018, 11 (10)
[10]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]