Online citations, reference lists, and bibliographies.
Please confirm you are human
(Sign Up for free to never see this)
← Back to Search

Elliptic Curve Cryptography-Based Authentication With Identity Protection For Smart Grids

L. Zhang, S. Tang, He Luo
Published 2016 · Computer Science, Medicine

Save to my Library
Download PDF
Analyze on Scholarcy
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham- Yahalom logic.
This paper references
A logic of authentication
M. Burrows (1989)
Robust and Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Smart Grids
Liping Zhang (2013)
A critique of the Burrows, Abadi and Needham logic
D. Nessett (1990)
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D. He (2015)
Privacy-preserving data aggregation scheme against internal attackers in smart grids
D. He (2016)
A Light-weight Message Authentication Scheme for Smart Grid Communications
M Mostafa (2011)
Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme
Chengqi Wang (2016)
Password-authenticated cluster-based group key agreement for smart grid communication
H. Nicanfar (2014)
Mutual Authentication and Key establishment mechanism using DCU certificate in Smart Grid
S. Oh (2012)
PASS: Privacy-preserving authentication scheme for smart grid network
T. Chim (2011)
Efficient and fault-diagnosable authentication architecture for AMI in smart grid
Depeng Li (2015)
SCADA Systems for Smart Grid, Available: Studies/Pages/SCADA-Power.aspx
Arc Advisory
Authentication protocol for an ambient assisted living system
D. He (2015)
VCM. Multilayer Consensus ECC-Based Password Authenticated Key-Exchange (MCEPAK) Protocol for Smart Grid System
H Nicanfar (2013)
Electricity agents in smart grid markets
S. Al-Agtash (2013)
An efficient and privacy-preserving data aggregation scheme for the smart grid against internal attackers. Wireless Networks
D He (2016)
An efficient and privacy-preserving data aggregation scheme for the smart grid against internal attackers
D He (2016)
ACM SIGOPS Operating Systems Review
Dm A Nessett (1990)
Battery Status-aware Authentication Scheme for V2G Networks in Smart Grid
H. Liu (2013)
Reasoning about belief in cryptographic protocols
Li Gong (1990)
A Survey of SIP Authentication and Key Agreement Schemes
H. H. Kilinc (2014)
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
Junghyun Nam (2015)
Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics
C. Fan (2009)
Communication costs and storage overhead comparison between our protocol and others
Prescribing of Antidiabetic Medicines before, during and after Pregnancy: A Study in Seven European Regions
R. Charlton (2016)
Guide to Elliptic Curve Cryptography
D. Hankerson (2004)
Authentication and authorization mechanisms for substation automation in smart grid network
B. Vaidya (2013)
A Lightweight Message Authentication Scheme for Smart Grid Communications
Mostafa Fouda (2011)
Biometric authentication in Smart Grid
Qinghai Gao (2012)
Multicast Authentication in the Smart Grid With One-Time Signature
Qinghua Li (2011)
Control and automation of electrical power distribution systems
J. Northcote-Green (2006)
Multilayer Consensus ECC-Based Password Authenticated Key-Exchange (MCEPAK) Protocol for Smart Grid System
H. Nicanfar (2013)
Authentication and Authorization Mechanisms for Substation Automation in Smart Grid Networks
B Vaidya (2013)
Circulating microRNAs in Sera Correlate with Soluble Biomarkers of Immune Activation but Do Not Predict Mortality in ART Treated Individuals with HIV-1 Infection: A Case Control Study
Daniel D. Murray (2015)

This paper is referenced by
Improved elliptical curve cryptography and Abelian group theory to resolve linear system problem in sensor-cloud cluster computing
N. Thangarasu (2018)
Smart Cloud based Healthcare Application having Data Authentication Control using Time Constraint
Khushboo Hedau (2019)
A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV)
Md Samsul Haque (2017)
A Secure Cloud Computing Authentication Using Cryptography
Moumita Chakraborty (2018)
Parallel point-multiplication architecture using combined group operations for high-speed cryptographic applications
Md Selim Hossain (2017)
User Authentication using Secret Key Sharing
Aparna Bannore (2020)
A secure and collaborative data aggregation scheme for fine‐grained data distribution and management in Internet of Things
O. O. Olakanmi (2020)
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
Khalid Mahmood (2018)
Preventing Cyber Attacks Against Smart Grids Using UTM Devices With A Mutual Efficient Authentication Protocol
Fattaneh Pasand (2017)
Cryptanalysis of an elliptic curve cryptography based lightweight authentication scheme for smart grid communication
Dipanwita Sadhukhan (2018)
Privacy-Preserving Scheme Based on Group Signature in Smart Grid
Yalian Wu (2020)
Design and Implementation of an SM 2-Based Security Authentication Scheme with the Key Agreement for Smart Grid Communications
Wei Li (2018)
Design and Implementation of an SM2-Based Security Authentication Scheme With the Key Agreement for Smart Grid Communications
W. Li (2018)
R-LWE based lightweight privacy preserving scheme for Smart Grid
A. Agarkar (2016)
Anonymous Authentication Scheme for Smart Cloud Based Healthcare Applications
A. Mehmood (2018)
Lightweight Security and Privacy Scheme for Wireless Body Area Network in E-Health System
O. O. Olakanmi (2017)
CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC
Adesh Kumari (2020)
A Novel Application of Elliptic Curves in the Dynamical Components of Block Ciphers
Shabieh Farwa (2020)
A Privacy-Preserving Noise Addition Data Aggregation Scheme for Smart Grid
Yuwen Chen (2018)
A lightweight key management protocol for secure communication in smart grids
Mostafa Farhadi Moghadam (2020)
Anonymous Authentication Scheme for Cloud Based Healthcare Applications
Pasme Rutuja Subhash (2018)
Wireless Sensor Networks: 14th China Conference, CWSN 2020, Dunhuang, China, September 18–21, 2020, Revised Selected Papers
J. Filipe (2020)
A Novel Smart Meter Authentication Scheme for Secure Smart Grid Communication
Pranali Bhanse (2019)
Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues
P. Kumar (2019)
Semantic Scholar Logo Some data provided by SemanticScholar