AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-Based Smart Grid Environment

被引:1
作者
Nkurunziza, Egide [1 ]
Lawrence, Tandoh [2 ]
Issameldeen, Elfadul [1 ]
Mwitende, Gervais [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Univ Dev Studies, Tamale, Ghana
[3] Pivot Access Ltd, Kigali, Rwanda
来源
FRONTIERS IN CYBER SECURITY, FCS 2022 | 2022年 / 1726卷
关键词
Heterogeneous; Authentication; Key agreement; Blockchain; Smart grid; KEY EXCHANGE PROTOCOL; USER AUTHENTICATION; SECURITY; SCHEME; SIGNATURE; IOT;
D O I
10.1007/978-981-19-8445-7_12
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the past, more research has been undertaken on the security of the smart grid (SG), with the aim of securing the SG in a manner that takes into account devices with limited resources, e.g., smart meters (SM). Consequently, several protocols for authenticating communicating participants in the SG and safeguarding the transfer of their keys have been devised over the years. However, most existing protocols work in a homogeneous context, which means that different entities operate in the same cryptographic settings. In addition, the majority of them are subject to a single point of failure, meaning that if a central device fails, all connected devices fail as well. To mitigate the previously mentioned issues and maintain the security of the SG network, an authentication protocol for heterogeneous blockchain-based smart grid environment (AP-HBSG) is designed. In the first part, an anonymous and heterogeneous certificateless authentication protocol is designed to secure and execute the session key agreement process. In addition, one participant belongs to a certificateless public cryptography (CL-PKC) whereas the other participant belongs to a public key infrastructure (PKI). In the second part, a blind signature is used to add authentication security within the blockchain nodes. Besides, a random oracle model (ROM) is used for the security analysis of the proposed protocol and we prove that it is secure under discrete logarithm (DL) problem and computational Diffie-Hellman (CDH) problem. The performance analysis shows that our proposed protocol has a lower computational and communication cost than other recently proposed protocols.
引用
收藏
页码:183 / 197
页数:15
相关论文
共 37 条
[1]   Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications [J].
Abbasinezhad-Mood, Dariush ;
Nikooghadam, Morteza .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :47-57
[2]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[4]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[5]  
Case D. U., 2016, ELECTRICITY INFORM S, V388, P1
[6]  
Cha JC, 2003, LECT NOTES COMPUT SC, V2567, P18
[7]   A Bilinear Map Pairing Based Authentication Scheme for Smart Grid Communications: PAuth [J].
Chen, Yuwen ;
Martinez, Jose-Fernan ;
Castillejo, Pedro ;
Lopez, Lourdes .
IEEE ACCESS, 2019, 7 :22633-22643
[8]  
Crosby M., 2016, Applied Innovation Review, V2, P71
[9]   A new provably secure certificateless signature scheme for Internet of Things [J].
Du, Hongzhen ;
Wen, Qiaoyan ;
Zhang, Shanshan ;
Gao, Mingchu .
AD HOC NETWORKS, 2020, 100
[10]   Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid [J].
Fan, Chun-I ;
Huang, Shi-Yuan ;
Lai, Yih-Loong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (01) :666-675