LIKA: Lightweight Identity Based Key Agreement Protocol for Secure Data Transmission in Advanced Metering Infrastructure of Smart Grid

被引:3
作者
Hasan, Md Mehedi [1 ]
Mohd Ariffin, Noor Afiza [1 ]
Mohd Sani, Nor Fazlida [1 ]
机构
[1] Univ Putra Malaysia, Fac Comp Sci & Informat Technol, Seri Kembangan 43400, Malaysia
关键词
mutual authentication; trusted authority; cyber-security; Diffie-Hellman; advanced metering infrastructure; smart grid; AUTHENTICATION; SCHEME; COMMUNICATION; MANAGEMENT;
D O I
10.3390/en15218106
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Integration of information communication technology via the Internet of Things devices and sensors can enable an efficient power service for utility providers to consumers in advanced metering infrastructure. Authentication and cryptographic mechanisms protect identity, data security and privacy from unauthorised interception for smart meters to servers. In the last couple of years, many key agreement protocols have been prescribed and deployed to fix those issues. Unfortunately, the deployed protocols did not work inside the same protocols, specifically parameter detection and recognition for session key generation, as they entail high computation time and communication bits overheads. Furthermore, the absence of forward secrecy and user anonymity affects the authentication. Therefore, we have proposed a lightweight identity-based key agreement (LIKA) utilising the Diffie-Hellman cryptography with a trusted authority. It seeks to cover both the security and performance criteria with equal weight. The protocol is evaluated by the Canetti and Krawczyk adversarial model, Avispa and cryptographic analysis released the session keys that were not considered as an adversary during mutual authentication. Moreover, as compared to related work, the proposed protocol took the least amount of time (5.319 ms and 1056 bits) for the entire process of session key generation. Furthermore, comparative analysis has shown that the LIKA adequately encompasses computation, communication, and security assessments. Consequently, it is more convenient for practical implementation for a smart grid.
引用
收藏
页数:27
相关论文
共 44 条
[1]   An Anonymous ECC-Based Self-Certified Key Distribution Scheme for the Smart Grid [J].
Abbasinezhad-Mood, Dariush ;
Nikooghadam, Morteza .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2018, 65 (10) :7996-8004
[2]   A Cloud of Things (CoT) based Security for Home Area Network (HAN) in the Smart Grid [J].
Alohali, Bashar ;
Merabti, Madjid ;
Kifayat, Kashif .
2014 EIGHTH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPS, SERVICES AND TECHNOLOGIES (NGMAST), 2014, :326-330
[3]  
Anzalchi A, 2015, IEEE SOUTHEASTCON
[4]  
Ariffin N.A.M, 2020, TELKOMNIKA TELECOMMU, V18, P1998, DOI DOI 10.12928/TELKOMNIKA.V18I4.14898
[5]   An Authenticated Key Agreement Scheme for Secure Communication in Smart Grid [J].
Baruah, Barnana ;
Dhal, Subhasish .
2021 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2021, :447-455
[6]   Authentication for Smart Grid AMI systems: Threat models, Solutions, and Challenges [J].
Benmalek, Mourad ;
Challal, Yacine ;
Derhab, Abdelouahid .
2019 IEEE 28TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2019, :208-213
[7]  
Blanchet B., 2016, PROVERIF 1 91 AUTOMA
[8]   Efficient and Provably Secure Key Agreement for Modern Smart Metering Communications [J].
Braeken, An ;
Kumar, Pardeep ;
Martin, Andrew .
ENERGIES, 2018, 11 (10)
[9]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453