An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid

被引:163
作者
Li, Hongwei [1 ]
Lu, Rongxing [2 ]
Zhou, Liang [3 ]
Yang, Bo [1 ]
Shen, Xuemin [4 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[3] Univ Elect Sci & Technol China, Natl Key Lab Sci & Technol Commun, Chengdu 611731, Peoples R China
[4] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
来源
IEEE SYSTEMS JOURNAL | 2014年 / 8卷 / 02期
基金
中国国家自然科学基金; 加拿大自然科学与工程研究理事会;
关键词
Authentication; Merkle hash tree; smart grid; BROADCAST;
D O I
10.1109/JSYST.2013.2271537
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart grid has emerged as the next generation of power grid, due to its reliability, flexibility, and efficiency. However, smart grid faces some critical security challenges such as the message injection attack and the replay attack. If these challenges cannot be properly addressed, an adversary can maliciously launch the injected or replayed message attacks to degrade the performance of smart grid. To cope with these challenging issues, in this paper, we propose an efficient authentication scheme that employs the Merkle hash tree technique to secure smart gird communication. Specifically, the proposed authentication scheme considers the smart meters with computation-constrained resources and puts the minimum computation overhead on them. Detailed security analysis indicates its security strength, namely, resilience to the replay attack, the message injection attack, the message analysis attack, and the message modification attack. In addition, extensive performance evaluation demonstrates its efficiency in terms of computation complexity and communication overhead.
引用
收藏
页码:655 / 663
页数:9
相关论文
共 31 条
  • [1] [Anonymous], INTRO NISTIR 7628 GU
  • [2] Ayday E., 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC 2011), P1161, DOI 10.1109/CCNC.2011.5766359
  • [3] Blackout, 2003, INDEPENDENT ELECT SY
  • [4] Cavoukian A., 2009, Privacy by design
  • [5] Chan Haowen., 2006, Proc. of the 13th ACM Conference on Computer and Communications Security, P278
  • [6] Dai W., CRYPTO 5 6 2 BENCHM
  • [7] Sensing-Performance Tradeoff in Cognitive Radio Enabled Smart Grid
    Deng, Ruilong
    Chen, Jiming
    Cao, Xianghui
    Zhang, Yan
    Maharjan, Sabita
    Gjessing, Stein
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2013, 4 (01) : 302 - 310
  • [8] Toward Secure Targeted Broadcast in Smart Grid
    Fadlullah, Zubair Md
    Kato, Nei
    Lu, Rongxing
    Shen, Xuemin Sherman
    Nozaki, Yousuke
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (05) : 150 - 156
  • [9] Ferguson N., 2001, Selected Areas in Cryptography, P103
  • [10] A Lightweight Message Authentication Scheme for Smart Grid Communications
    Fouda, Mostafa M.
    Fadlullah, Zubair Md
    Kato, Nei
    Lu, Rongxing
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) : 675 - 685