Lightweight authentication protocol in edge-based smart grid environment

被引:0
作者
Chien-Ming Chen
Lili Chen
Yanyu Huang
Sachin Kumar
Jimmy Ming-Tai Wu
机构
[1] Shandong University of Science and Technology,
[2] Harbin Institute of Technology (Shenzhen),undefined
[3] Ajay Kumar Garg Engineering College,undefined
来源
EURASIP Journal on Wireless Communications and Networking | / 2021卷
关键词
Smart grid; Edge computing; Mutual authentication; Network security;
D O I
暂无
中图分类号
学科分类号
摘要
A smart grid (SG) is an advanced power grid system deployed in a cloud center and smart meters (at the consumer end) that provides higher reliability, better data protection, improved power efficiency, automatic monitoring, and effective management of power consumption. However, an SG also poses certain challenges that need to be addressed. For example, data provided by a smart meter are time-sensitive and cannot handle high latency in an SG. Moreover, a smart meter depends on memory, energy, and other factors. Besides, the security between a cloud center and a smart meter is a critical issue that needs to be resolved. Edge computing, an extension of cloud computing deployed in an edge network between a cloud center and the end devices, is an efficient solution to the aforementioned issues. Therefore, in this study, we propose a secure mutual authentication protocol based on edge computing for use in an SG.
引用
收藏
相关论文
共 141 条
[1]  
Wu TY(2021)An enhanced pairing-based authentication scheme for smart grid communications J. Ambient Intell. Hum. Comput. 2021 1-13
[2]  
Lee YQ(2011)Smart grid technologies: communication technologies and standards IEEE Trans. Ind. Inf. 7 529-539
[3]  
Chen CM(2011)Smart grid: the new and improved power grid: a survey IEEE Commun. Surv. Tutor. 14 944-980
[4]  
Tian Y(2005)Toward a smart grid: power delivery for the 21st century IEEE Power Energ. Mag. 3 34-41
[5]  
Al-Nabhan NA(2009)Grid of the future IEEE Power Energ. Mag. 7 52-62
[6]  
Gungor VC(2010)Smart-grid security issues IEEE Secur. Privacy 8 81-85
[7]  
Sahin D(2017)A countermeasure to SQL injection attack for cloud environment Wirel. Pers. Commun. 96 5279-5293
[8]  
Kocak T(2019)Flexible, efficient, and secure access delegation in cloud computing ACM Trans. Manag. Inf. Syst. (TMIS) 10 1-20
[9]  
Ergut S(2020)Csef: cloud-based secure and efficient framework for smart medical system using ECC IEEE Access 8 107838-107852
[10]  
Buccella C(2017)Survey on fog computing: architecture, key technologies, applications and open issues J. Netw. Comput. Appl. 98 27-42