Lightweight authentication protocol in edge-based smart grid environment

被引:22
作者
Chen, Chien-Ming [1 ]
Chen, Lili [1 ]
Huang, Yanyu [2 ]
Kumar, Sachin [3 ]
Wu, Jimmy Ming-Tai [1 ]
机构
[1] Shandong Univ Sci & Technol, Qingdao, Shandong, Peoples R China
[2] Harbin Inst Technol Shenzhen, Shenzhen, Peoples R China
[3] Ajay Kumar Garg Engn Coll, Ghaziabad, India
关键词
Smart grid; Edge computing; Mutual authentication; Network security; SECURE; SCHEME; TECHNOLOGIES;
D O I
10.1186/s13638-021-01930-6
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A smart grid (SG) is an advanced power grid system deployed in a cloud center and smart meters (at the consumer end) that provides higher reliability, better data protection, improved power efficiency, automatic monitoring, and effective management of power consumption. However, an SG also poses certain challenges that need to be addressed. For example, data provided by a smart meter are time-sensitive and cannot handle high latency in an SG. Moreover, a smart meter depends on memory, energy, and other factors. Besides, the security between a cloud center and a smart meter is a critical issue that needs to be resolved. Edge computing, an extension of cloud computing deployed in an edge network between a cloud center and the end devices, is an efficient solution to the aforementioned issues. Therefore, in this study, we propose a secure mutual authentication protocol based on edge computing for use in an SG.
引用
收藏
页数:18
相关论文
共 42 条
[1]  
Bonomi F., 2012, P MCC WORKSH MOB CLO, P13, DOI [10.1145/2342509.2342513, DOI 10.1145/2342509.2342513]
[2]   A secure authenticated and key exchange scheme for fog computing [J].
Chen, Chien-Ming ;
Huang, Yanyu ;
Wang, King-Hang ;
Kumari, Saru ;
Wu, Mu-En .
ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) :1200-1215
[3]   Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps [J].
Chen, Chien-Ming ;
Xu, Linlin ;
Wang, King-Hang ;
Liu, Shuai ;
Wu, Tsu-Yang .
JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (03) :679-687
[4]   A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System [J].
Chen, Chien-Ming ;
Li, Chun-Ta ;
Liu, Shuai ;
Wu, Tsu-Yang ;
Pan, Jeng-Shyang .
IEEE ACCESS, 2017, 5 :3410-3422
[5]   Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards [J].
Chien, Hung-Yu ;
Chen, Che-Hao .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) :254-259
[6]   Towards Power Consumption-Delay Tradeoff by Workload Allocation in Cloud-Fog Computing [J].
Deng, Ruilong ;
Lu, Rongxing ;
Lai, Chengzhe ;
Luan, Tom H. .
2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, :3909-3914
[7]   Cyber Security and Power System Communication-Essential Parts of a Smart Grid Infrastructure [J].
Ericsson, Goran N. .
IEEE TRANSACTIONS ON POWER DELIVERY, 2010, 25 (03) :1501-1507
[8]   Smart Grid - The New and Improved Power Grid: A Survey [J].
Fang, Xi ;
Misra, Satyajayant ;
Xue, Guoliang ;
Yang, Dejun .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (04) :944-980
[9]   Security Analysis of the Access Control Solution of NDN Using BAN Logic [J].
Fei, Yuan ;
Zhu, Huibiao ;
Phan Cong Vinh .
MOBILE NETWORKS & APPLICATIONS, 2020, 25 (03) :1162-1173
[10]   A Lightweight Message Authentication Scheme for Smart Grid Communications [J].
Fouda, Mostafa M. ;
Fadlullah, Zubair Md ;
Kato, Nei ;
Lu, Rongxing ;
Shen, Xuemin .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) :675-685