Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication

被引:122
作者
Gope, Prosanta [1 ]
Sikdar, Biplab [2 ]
机构
[1] Natl Univ Singapore, Dept Comp Sci, Singapore 119077, Singapore
[2] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 119077, Singapore
基金
新加坡国家研究基金会;
关键词
Privacy-aware; mutual authentication; physically uncloneable functions; fuzzy extractor; smart grids; PHYSICAL UNCLONABLE FUNCTIONS; GENERATE STRONG KEYS; FUZZY EXTRACTORS; BIOMETRICS; MANAGEMENT;
D O I
10.1109/TSG.2018.2844403
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Information and communication technologies (ICT) are one of the underpinning platforms of smart grids, facilitating efficient grid management and operation, optimization of resource utilization, as well as enabling new products, features, and services. However, this interconnection of grid technology with ICT leads to various security challenges in the power grid. One such concern is the tampering of usage data from smart meters which may result not only in incorrect billing, but also in incorrect decisions related to demand and supply management. In addition to network based cyber attacks, smart meters are also susceptible to physical attacks since they are installed in customer premises without hardware protection mechanisms. In this paper, we propose a novel privacy-aware authenticated key agreement scheme which can not only ensure secure communication between smart meters and the service providers, but also the physical security of smart meters. In this regard, we utilize the lightweight cryptographic primitives such as physically uncloneable functions and one-way hash function, etc. Hence, the proposed scheme is even suitable for the resource constrained smart meters.
引用
收藏
页码:3953 / 3962
页数:10
相关论文
共 25 条
  • [1] [Anonymous], 2017, IEO2017 US DEP EN EN
  • [2] [Anonymous], P 11 ACM C COMP COMM
  • [3] [Anonymous], 2001, THESIS
  • [4] [Anonymous], 2004, TOR 2 GENERATION ONI
  • [5] [Anonymous], JAV CRYPT ARCH JCA
  • [6] Towards a Unified Security Model for Physically Unclonable Functions
    Armknecht, Frederik
    Moriyama, Daisuke
    Sadeghi, Ahmad-Reza
    Yung, Moti
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 271 - 287
  • [7] Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications
    Delvaux, Jeroen
    Gu, Dawu
    Verbauwhede, Ingrid
    Hiller, Matthias
    Yu, Meng-Day
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 : 412 - 431
  • [8] Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
  • [9] Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    Dodis, Yevgeniy
    Ostrovsky, Rafail
    Reyzin, Leonid
    Smith, Adam
    [J]. SIAM JOURNAL ON COMPUTING, 2008, 38 (01) : 97 - 139
  • [10] Dodis Y, 2006, LECT NOTES COMPUT SC, V4117, P232