Lightweight authentication protocol in edge-based smart grid environment

被引:16
作者
Chen, Chien-Ming [1 ]
Chen, Lili [1 ]
Huang, Yanyu [2 ]
Kumar, Sachin [3 ]
Wu, Jimmy Ming-Tai [1 ]
机构
[1] Shandong Univ Sci & Technol, Qingdao, Shandong, Peoples R China
[2] Harbin Inst Technol Shenzhen, Shenzhen, Peoples R China
[3] Ajay Kumar Garg Engn Coll, Ghaziabad, India
关键词
Smart grid; Edge computing; Mutual authentication; Network security; SECURE; SCHEME; TECHNOLOGIES;
D O I
10.1186/s13638-021-01930-6
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A smart grid (SG) is an advanced power grid system deployed in a cloud center and smart meters (at the consumer end) that provides higher reliability, better data protection, improved power efficiency, automatic monitoring, and effective management of power consumption. However, an SG also poses certain challenges that need to be addressed. For example, data provided by a smart meter are time-sensitive and cannot handle high latency in an SG. Moreover, a smart meter depends on memory, energy, and other factors. Besides, the security between a cloud center and a smart meter is a critical issue that needs to be resolved. Edge computing, an extension of cloud computing deployed in an edge network between a cloud center and the end devices, is an efficient solution to the aforementioned issues. Therefore, in this study, we propose a secure mutual authentication protocol based on edge computing for use in an SG.
引用
收藏
页数:18
相关论文
共 42 条
  • [1] Bonomi F., 2012, P 1 ED MCC WORKSH MO, DOI [10.1145/2342509.2342513, DOI 10.1145/2342509.2342513]
  • [2] A secure authenticated and key exchange scheme for fog computing
    Chen, Chien-Ming
    Huang, Yanyu
    Wang, King-Hang
    Kumari, Saru
    Wu, Mu-En
    [J]. ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) : 1200 - 1215
  • [3] Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps
    Chen, Chien-Ming
    Xu, Linlin
    Wang, King-Hang
    Liu, Shuai
    Wu, Tsu-Yang
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (03): : 679 - 687
  • [4] A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System
    Chen, Chien-Ming
    Li, Chun-Ta
    Liu, Shuai
    Wu, Tsu-Yang
    Pan, Jeng-Shyang
    [J]. IEEE ACCESS, 2017, 5 : 3410 - 3422
  • [5] Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
    Chien, Hung-Yu
    Chen, Che-Hao
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) : 254 - 259
  • [6] Towards Power Consumption-Delay Tradeoff by Workload Allocation in Cloud-Fog Computing
    Deng, Ruilong
    Lu, Rongxing
    Lai, Chengzhe
    Luan, Tom H.
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 3909 - 3914
  • [7] Cyber Security and Power System Communication-Essential Parts of a Smart Grid Infrastructure
    Ericsson, Goran N.
    [J]. IEEE TRANSACTIONS ON POWER DELIVERY, 2010, 25 (03) : 1501 - 1507
  • [8] Smart Grid - The New and Improved Power Grid: A Survey
    Fang, Xi
    Misra, Satyajayant
    Xue, Guoliang
    Yang, Dejun
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (04): : 944 - 980
  • [9] Security Analysis of the Access Control Solution of NDN Using BAN Logic
    Fei, Yuan
    Zhu, Huibiao
    Phan Cong Vinh
    [J]. MOBILE NETWORKS & APPLICATIONS, 2020, 25 (03) : 1162 - 1173
  • [10] A Lightweight Message Authentication Scheme for Smart Grid Communications
    Fouda, Mostafa M.
    Fadlullah, Zubair Md
    Kato, Nei
    Lu, Rongxing
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) : 675 - 685