Online citations, reference lists, and bibliographies.
Please confirm you are human
(Sign Up for free to never see this)
← Back to Search

Elliptic Curve Cryptography-Based Authentication With Identity Protection For Smart Grids

L. Zhang, S. Tang, He Luo
Published 2016 · Computer Science, Medicine

Save to my Library
Download PDF
Analyze on Scholarcy
Share
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham- Yahalom logic.
This paper references
10.1145/74850.74852
A logic of authentication
M. Burrows (1989)
10.1109/GreenCom-iThings-CPSCom.2013.392
Robust and Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Smart Grids
Liping Zhang (2013)
10.1145/382258.382789
A critique of the Burrows, Abadi and Needham logic
D. Nessett (1990)
10.1016/j.ins.2015.02.010
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D. He (2015)
10.1007/S11276-015-0983-3
Privacy-preserving data aggregation scheme against internal attackers in smart grids
D. He (2016)
A Light-weight Message Authentication Scheme for Smart Grid Communications
M Mostafa (2011)
10.1371/journal.pone.0149173
Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme
Chengqi Wang (2016)
10.1002/sec.726
Password-authenticated cluster-based group key agreement for smart grid communication
H. Nicanfar (2014)
Mutual Authentication and Key establishment mechanism using DCU certificate in Smart Grid
S. Oh (2012)
10.1109/SmartGridComm.2011.6102316
PASS: Privacy-preserving authentication scheme for smart grid network
T. Chim (2011)
10.1002/SEC.1006
Efficient and fault-diagnosable authentication architecture for AMI in smart grid
Depeng Li (2015)
SCADA Systems for Smart Grid, Available: http://www.arcweb.com/Research/ Studies/Pages/SCADA-Power.aspx
Arc Advisory
10.1109/MCOM.2015.7010518
Authentication protocol for an ambient assisted living system
D. He (2015)
VCM. Multilayer Consensus ECC-Based Password Authenticated Key-Exchange (MCEPAK) Protocol for Smart Grid System
H Nicanfar (2013)
10.1016/j.compind.2012.10.009
Electricity agents in smart grid markets
S. Al-Agtash (2013)
An efficient and privacy-preserving data aggregation scheme for the smart grid against internal attackers. Wireless Networks
D He (2016)
An efficient and privacy-preserving data aggregation scheme for the smart grid against internal attackers
D He (2016)
ACM SIGOPS Operating Systems Review
Dm A Nessett (1990)
10.1109/TSG.2012.2224387
Battery Status-aware Authentication Scheme for V2G Networks in Smart Grid
H. Liu (2013)
10.1109/RISP.1990.63854
Reasoning about belief in cryptographic protocols
Li Gong (1990)
10.1109/SURV.2013.091513.00050
A Survey of SIP Authentication and Key Agreement Schemes
H. H. Kilinc (2014)
10.1371/journal.pone.0116709
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
Junghyun Nam (2015)
10.1109/TIFS.2009.2031942
Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics
C. Fan (2009)
Communication costs and storage overhead comparison between our protocol and others
10.1371/journal.pone.0155737
Prescribing of Antidiabetic Medicines before, during and after Pregnancy: A Study in Seven European Regions
R. Charlton (2016)
10.1007/b97644
Guide to Elliptic Curve Cryptography
D. Hankerson (2004)
10.1109/MNET.2013.6423185
Authentication and authorization mechanisms for substation automation in smart grid network
B. Vaidya (2013)
10.1109/TSG.2011.2160661
A Lightweight Message Authentication Scheme for Smart Grid Communications
Mostafa Fouda (2011)
10.1109/IESC.2012.6217197
Biometric authentication in Smart Grid
Qinghai Gao (2012)
10.1109/TSG.2011.2138172
Multicast Authentication in the Smart Grid With One-Time Signature
Qinghua Li (2011)
10.1201/9781315221465
Control and automation of electrical power distribution systems
J. Northcote-Green (2006)
10.1109/TSG.2012.2226252
Multilayer Consensus ECC-Based Password Authenticated Key-Exchange (MCEPAK) Protocol for Smart Grid System
H. Nicanfar (2013)
Authentication and Authorization Mechanisms for Substation Automation in Smart Grid Networks
B Vaidya (2013)
10.1371/journal.pone.0139981
Circulating microRNAs in Sera Correlate with Soluble Biomarkers of Immune Activation but Do Not Predict Mortality in ART Treated Individuals with HIV-1 Infection: A Case Control Study
Daniel D. Murray (2015)



This paper is referenced by
10.1007/s10586-017-1573-1
Improved elliptical curve cryptography and Abelian group theory to resolve linear system problem in sensor-cloud cluster computing
N. Thangarasu (2018)
Smart Cloud based Healthcare Application having Data Authentication Control using Time Constraint
Khushboo Hedau (2019)
10.1007/978-3-319-78816-6_9
A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV)
Md Samsul Haque (2017)
10.1109/ICETIETR.2018.8529100
A Secure Cloud Computing Authentication Using Cryptography
Moumita Chakraborty (2018)
10.1371/journal.pone.0176214
Parallel point-multiplication architecture using combined group operations for high-speed cryptographic applications
Md Selim Hossain (2017)
10.1109/ic-ETITE47903.2020.308
User Authentication using Secret Key Sharing
Aparna Bannore (2020)
10.1002/spy2.135
A secure and collaborative data aggregation scheme for fine‐grained data distribution and management in Internet of Things
O. O. Olakanmi (2020)
10.1016/j.future.2017.05.002
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
Khalid Mahmood (2018)
Preventing Cyber Attacks Against Smart Grids Using UTM Devices With A Mutual Efficient Authentication Protocol
Fattaneh Pasand (2017)
10.1109/RAIT.2018.8389040
Cryptanalysis of an elliptic curve cryptography based lightweight authentication scheme for smart grid communication
Dipanwita Sadhukhan (2018)
10.1007/978-981-33-4214-9_16
Privacy-Preserving Scheme Based on Group Signature in Smart Grid
Yalian Wu (2020)
Design and Implementation of an SM 2-Based Security Authentication Scheme with the Key Agreement for Smart Grid Communications
Wei Li (2018)
10.1109/ACCESS.2018.2875681
Design and Implementation of an SM2-Based Security Authentication Scheme With the Key Agreement for Smart Grid Communications
W. Li (2018)
10.1109/CAST.2016.7915004
R-LWE based lightweight privacy preserving scheme for Smart Grid
A. Agarkar (2016)
10.1109/ACCESS.2018.2841972
Anonymous Authentication Scheme for Smart Cloud Based Healthcare Applications
A. Mehmood (2018)
Lightweight Security and Privacy Scheme for Wireless Body Area Network in E-Health System
O. O. Olakanmi (2017)
10.1109/ACCESS.2020.3001152
CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC
Adesh Kumari (2020)
10.1007/s11277-020-07628-0
A Novel Application of Elliptic Curves in the Dynamical Components of Block Ciphers
Shabieh Farwa (2020)
10.3390/EN11112972
A Privacy-Preserving Noise Addition Data Aggregation Scheme for Smart Grid
Yuwen Chen (2018)
10.1016/j.epsr.2019.106024
A lightweight key management protocol for secure communication in smart grids
Mostafa Farhadi Moghadam (2020)
Anonymous Authentication Scheme for Cloud Based Healthcare Applications
Pasme Rutuja Subhash (2018)
10.1007/978-981-33-4214-9
Wireless Sensor Networks: 14th China Conference, CWSN 2020, Dunhuang, China, September 18–21, 2020, Revised Selected Papers
J. Filipe (2020)
10.1109/TENCON.2019.8929367
A Novel Smart Meter Authentication Scheme for Secure Smart Grid Communication
Pranali Bhanse (2019)
10.1109/COMST.2019.2899354
Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues
P. Kumar (2019)
Semantic Scholar Logo Some data provided by SemanticScholar