A Multi-User, Single-Authentication Protocol for Smart Grid Architectures

被引:8
作者
Alfakeeh, Ahmed S. [1 ]
Khan, Sarmadullah [2 ]
Al-Bayatti, Ali Hilal [2 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah 21589, Saudi Arabia
[2] De Montfort Univ, Sch Comp Sci & Informat, Leicester LE1 9BH, Leics, England
关键词
authentication; secret session key; smart grid; SECURITY; SCHEME;
D O I
10.3390/s20061581
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing from the smart grid devices to the utility servers, which may result in energy disruption or imbalance. Thus, an authentication is mandatory to efficiently authenticate the devices and the utility servers and avoid tampering attacks. To this end, a group authentication algorithm is proposed for preserving demand-response security in a smart grid. The proposed mechanism also provides a fine-grained access control feature where the utility server can only access a limited number of smart grid devices. The initial authentication between the utility server and smart grid device in a group involves a single public key operation, while the subsequent authentications with the same device or other devices in the same group do not need a public key operation. This reduces the overall computation and communication overheads and takes less time to successfully establish a secret session key, which is used to exchange sensitive information over an unsecured wireless channel. The resilience of the proposed algorithm is tested against various attacks using formal and informal security analysis.
引用
收藏
页数:18
相关论文
共 25 条
[1]   Smart Electricity Meter Data Intelligence for Future Energy Systems: A Survey [J].
Alahakoon, Damminda ;
Yu, Xinghuo .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (01) :425-436
[2]  
[Anonymous], 2014, P 2014 IEEE PES TD C
[3]  
Automated Validation of Internet Security Protocols and Applications (AVISPA), AUT VAL INT SEC PROT
[4]  
Cairns K, 2013, INT CONF SMART GRID, P492, DOI 10.1109/SmartGridComm.2013.6688006
[5]   A survey on the critical issues in smart grid technologies [J].
Colak, Ilhami ;
Sagiroglu, Seref ;
Fulli, Gianluca ;
Yesilbudak, Mehmet ;
Covrig, Catalin-Felix .
RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2016, 54 :396-405
[6]   Secure Authentication for Structured Smart Grid System [J].
Doh, Inshil ;
Lim, Jiyoung ;
Chae, Kijoon .
2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, :200-204
[7]  
Dolev D., 1981, 22nd Annual Symposium on Foundations of Computer Science, P350, DOI 10.1109/SFCS.1981.32
[8]   Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid [J].
Fan, Chun-I ;
Huang, Shi-Yuan ;
Lai, Yih-Loong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (01) :666-675
[9]   A Lightweight Message Authentication Scheme for Smart Grid Communications [J].
Fouda, Mostafa M. ;
Fadlullah, Zubair Md ;
Kato, Nei ;
Lu, Rongxing ;
Shen, Xuemin .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) :675-685
[10]   Smart Grid Technologies: Communication Technologies and Standards [J].
Gungor, Vehbi C. ;
Sahin, Dilan ;
Kocak, Taskin ;
Ergut, Salih ;
Buccella, Concettina ;
Cecati, Carlo ;
Hancke, Gerhard P. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2011, 7 (04) :529-539