LAS-SG: An Elliptic Curve-Based Lightweight Authentication Scheme for Smart Grid Environments

被引:41
作者
Chaudhry, Shehzad Ashraf [1 ,2 ]
Yahya, Khalid [3 ]
Garg, Sahil [4 ]
Kaddoum, Georges [4 ]
Hassan, Mohammad Mehedi [5 ]
Zikria, Yousaf Bin [6 ]
机构
[1] Nisantasi Univ, Fac Engn & Architecture, Dept Comp Engn, Istanbul, Turkiye
[2] Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates
[3] Istanbul Gelisim Univ, Dept Mechatron Engn, Istanbul, Turkiye
[4] Ecole Technol Super, Elect Engn Dept, Montreal, PQ H3C 1K3, Canada
[5] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh 11543, Saudi Arabia
[6] Yeungnam Univ, Dept Informat & Commun Engn, Gyongsan 38541, South Korea
关键词
Key compromise impersonation (KCI) attack; smart grid authentication; smart home; ACCESS-CONTROL; KEY-EXCHANGE;
D O I
10.1109/TII.2022.3158663
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The communication among smart meters (SMs) and neighborhood area network (NAN) gateways is a fundamental requisite for managing the energy consumption at the consumer site. The bidirectional communication among SMs and NANs over the insecure public channel is vulnerable to impersonation, SM traceability, and SM physical capturing attacks. Many existing schemes' insecurities and/or inefficiencies call for an efficient and secure authentication scheme for smart grid infrastructure. In this article, we present a privacy preserving and lightweight authentication scheme for smart grid (LAS-SG) using elliptic curve cryptography. The proposed LAS-SG is proved as secure under the standard model. Moreover, the efficiency of the LAS-SG is extracted through a real-time experiment, which attests that proposed LAS-SG completes a round of authentication in 20.331 ms by exchanging only two messages and 192 B. Due to the adequate efficiency and ample security, the proposed LAS-SG is more appropriate for SG environments.
引用
收藏
页码:1504 / 1511
页数:8
相关论文
共 30 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [2] Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
  • [3] Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems
    Challa, Sravani
    Das, Ashok Kumar
    Gope, Prosanta
    Kumar, Neeraj
    Wu, Fan
    Vasilakos, Athanasios V.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 : 1267 - 1286
  • [4] Chaudhry K. Yahya, 2020, SMART GRID IOT ENABL
  • [5] A Privacy Enhanced Authentication Scheme for Securing Smart Grid Infrastructure
    Chaudhry, Shehzad Ashraf
    Nebhan, Jamel
    Yahya, Khalid
    Al-Turjman, Fadi
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (07) : 5000 - 5006
  • [7] Securing Demand Response Management: A Certificate-Based Access Control in Smart Grid Edge Computing Infrastructure
    Chaudhry, Shehzad Ashraf
    Alhakami, Hosam
    Baz, Abdullah
    Al-Turjman, Fadi
    [J]. IEEE ACCESS, 2020, 8 (08): : 101235 - 101243
  • [8] Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems
    Chaudhry, Shehzad Ashraf
    Shon, Taeshik
    Al-Turjman, Fadi
    Alsharif, Mohammed H.
    [J]. COMPUTER COMMUNICATIONS, 2020, 153 : 527 - 537
  • [9] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [10] Privacy-Preserving Data Aggregation in Smart Metering Systems
    Erkin, Zekeriya
    Ramon Troncoso-Pastoriza, Juan
    Lagendijk, R. L.
    Perez-Gonzalez, Fernando
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 75 - 86