Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 3/2023

08.05.2023

HAP-SG: Heterogeneous authentication protocol for smart grid

verfasst von: Nkurunziza Egide, Fagen Li

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 3/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Authentication and key agreement (AKA) methods are designed to ensure that only authorized entities are communicating and to ensure that their communications are secure. In contrast, the majority of designed protocols are homogeneous, meaning that communicating entities share the same cryptographic setting. A smart grid (SG) is nonetheless a complex system with a diverse network. Thus, SG interconnects a large number of end devices, intermediary devices, and systems that are part of distinct cryptographic environments. We therefore suggested a heterogeneous authentication protocol for smart grids (HAP-SG). In the proposed protocol, the smart meter (SM) belongs to a certificateless public key cryptography (CL-PKC) environment, whereas the service provider (SP) belongs to a public key infrastructure environment (PKI). HAP-SG ensures that only authorized SM and SP communicate and that their communications are kept secret, despite the fact that they belong to separate cryptographic environments. Security of HAP-SG depends on the difficulty of the elliptic curve discrete logarithm (ECDL) problem. On the other hand, for security analysis, the random oracle model (ROM) is utilized. Experiments show that our protocol is more efficient in terms of computation costs and communication costs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Simoes MG, Roche R, Kyriakides E, Suryanarayanan S, Blunier B, McBee KD, Nguyen PH, Ribeiro PF, Miraoui à (2012) A comparison of smart grid technologies and progresses in europe and the us. IEEE Trans Ind Appl 48(4):1154–1162CrossRef Simoes MG, Roche R, Kyriakides E, Suryanarayanan S, Blunier B, McBee KD, Nguyen PH, Ribeiro PF, Miraoui à (2012) A comparison of smart grid technologies and progresses in europe and the us. IEEE Trans Ind Appl 48(4):1154–1162CrossRef
2.
Zurück zum Zitat Amin SM, Wollenberg BF (2005) Toward a smart grid: power delivery for the 21st century. IEEE Power Energ Mag 3(5):34–41CrossRef Amin SM, Wollenberg BF (2005) Toward a smart grid: power delivery for the 21st century. IEEE Power Energ Mag 3(5):34–41CrossRef
3.
Zurück zum Zitat Amin M (2004) Balancing market priorities with security issues. IEEE Power Energ Mag 2(4):30–38CrossRef Amin M (2004) Balancing market priorities with security issues. IEEE Power Energ Mag 2(4):30–38CrossRef
4.
Zurück zum Zitat Pillitteri VY, Brewer TL (2014) Guidelines for smart grid cybersecurity. NIST Pubs Pillitteri VY, Brewer TL (2014) Guidelines for smart grid cybersecurity. NIST Pubs
5.
Zurück zum Zitat Li X, Liang X, Lu R, Shen X, Lin X, Zhu H (2012) Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Commun Mag 50(8):38–45CrossRef Li X, Liang X, Lu R, Shen X, Lin X, Zhu H (2012) Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Commun Mag 50(8):38–45CrossRef
6.
Zurück zum Zitat Marmol FG, Sorge C, Ugus O, Perez GM (2012) Do not snoop my habits: preserving privacy in the smart grid. IEEE Commun Magazine 50(5):166–172 Marmol FG, Sorge C, Ugus O, Perez GM (2012) Do not snoop my habits: preserving privacy in the smart grid. IEEE Commun Magazine 50(5):166–172
7.
Zurück zum Zitat Kim T, Hyun M, Kim J, Kim J, Kim J, Lee D (2015) The pki-based device authentication system for ami. In: 23rd International Conference on Electricity Distribution Kim T, Hyun M, Kim J, Kim J, Kim J, Lee D (2015) The pki-based device authentication system for ami. In: 23rd International Conference on Electricity Distribution
8.
Zurück zum Zitat Shamir A (1984) Identity-based cryptosystems and signature schemes, in: Workshop on the theory and application of cryptographic techniques. Springer, pp 47–53 Shamir A (1984) Identity-based cryptosystems and signature schemes, in: Workshop on the theory and application of cryptographic techniques. Springer, pp 47–53
9.
Zurück zum Zitat Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography, in: International conference on the theory and application of cryptology and information security. Springer, pp 452–473 Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography, in: International conference on the theory and application of cryptology and information security. Springer, pp 452–473
10.
Zurück zum Zitat Wu D, Zhou C (2011) Fault-tolerant and scalable key management for smart grid. IEEE Transactions on Smart Grid 2(2):375–381CrossRef Wu D, Zhou C (2011) Fault-tolerant and scalable key management for smart grid. IEEE Transactions on Smart Grid 2(2):375–381CrossRef
11.
Zurück zum Zitat Xia J, Wang Y (2012) Secure key distribution for the smart grid. IEEE Transactions on Smart Grid 3(3):1437–1443CrossRef Xia J, Wang Y (2012) Secure key distribution for the smart grid. IEEE Transactions on Smart Grid 3(3):1437–1443CrossRef
12.
Zurück zum Zitat Park JH, Kim M, Kwon D (2013) Security weakness in the smart grid key distribution scheme proposed by xia and wang. IEEE Transactions on Smart Grid 4(3):1613–1614CrossRef Park JH, Kim M, Kwon D (2013) Security weakness in the smart grid key distribution scheme proposed by xia and wang. IEEE Transactions on Smart Grid 4(3):1613–1614CrossRef
13.
Zurück zum Zitat Li X, Liu S, Kumari S, Chen CM (2023) Psap-wsn: A provably secure authentication protocol for 5g-based wireless sensor networks. CMES-Computer Modeling in Engineering & Sciences 135(1):711–732CrossRef Li X, Liu S, Kumari S, Chen CM (2023) Psap-wsn: A provably secure authentication protocol for 5g-based wireless sensor networks. CMES-Computer Modeling in Engineering & Sciences 135(1):711–732CrossRef
14.
Zurück zum Zitat Li X, Wu F, Kumari S, Xu L, Sangaiah AK, Choo K-KR (2019) A provably secure and anonymous message authentication scheme for smart grids. Journal of Parallel and Distributed Computing 132:242–249CrossRef Li X, Wu F, Kumari S, Xu L, Sangaiah AK, Choo K-KR (2019) A provably secure and anonymous message authentication scheme for smart grids. Journal of Parallel and Distributed Computing 132:242–249CrossRef
15.
Zurück zum Zitat Wu L, Wang J, Zeadally S, He D (2019) Anonymous and efficient message authentication scheme for smart grid. Security and Communication Networks, Article ID 4836016 Wu L, Wang J, Zeadally S, He D (2019) Anonymous and efficient message authentication scheme for smart grid. Security and Communication Networks, Article ID 4836016
16.
Zurück zum Zitat Mahmood K, Chaudhry SA, Naqvi H, Kumari S, Li X, Sangaiah AK (2018) An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Futur Gener Comput Syst 81:557–565CrossRef Mahmood K, Chaudhry SA, Naqvi H, Kumari S, Li X, Sangaiah AK (2018) An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Futur Gener Comput Syst 81:557–565CrossRef
17.
Zurück zum Zitat Abbasinezhad-Mood D, Nikooghadam M (2018) Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications. Futur Gener Comput Syst 84:47–57CrossRef Abbasinezhad-Mood D, Nikooghadam M (2018) Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications. Futur Gener Comput Syst 84:47–57CrossRef
18.
Zurück zum Zitat Chen Y, Martinez J.-F, Castillejo P, Lopez L (2019) A bilinear map pairing based authentication scheme for smart grid communications: Pauth. IEEE Access 7:22633–22643 Chen Y, Martinez J.-F, Castillejo P, Lopez L (2019) A bilinear map pairing based authentication scheme for smart grid communications: Pauth. IEEE Access 7:22633–22643
19.
Zurück zum Zitat Wu TY, Lee YQ, Chen CM, Tian Y, Al-Nabhan NA (2021) An enhanced pairing-based authentication scheme for smart grid communications. J Ambient Intell Human Comput 1–13 Wu TY, Lee YQ, Chen CM, Tian Y, Al-Nabhan NA (2021) An enhanced pairing-based authentication scheme for smart grid communications. J Ambient Intell Human Comput 1–13
20.
Zurück zum Zitat Nkurunziza E, Mwitende G, Tandoh L, Li F (2021) Certificateless authentication and consensus for the blockchain based smart grid, in: International Conference on Frontiers in Cyber Security. Springer, pp 134–151 Nkurunziza E, Mwitende G, Tandoh L, Li F (2021) Certificateless authentication and consensus for the blockchain based smart grid, in: International Conference on Frontiers in Cyber Security. Springer, pp 134–151
21.
Zurück zum Zitat Nkurunziza E, Tandoh L, Elfadul I, Li F (2023) Ecaap-sg: Efficient certificateless anonymous authentication protocol for sg. Secur Priv 6(1):e273 Nkurunziza E, Tandoh L, Elfadul I, Li F (2023) Ecaap-sg: Efficient certificateless anonymous authentication protocol for sg. Secur Priv 6(1):e273
22.
Zurück zum Zitat Miller VS (1985) Use of elliptic curves in cryptography, in: Conference on the theory and application of cryptographic techniques. Springer, pp 417–426 Miller VS (1985) Use of elliptic curves in cryptography, in: Conference on the theory and application of cryptographic techniques. Springer, pp 417–426
24.
Zurück zum Zitat Hankerson D, Menezes AJ, Vanstone S (2006) Guide to elliptic curve cryptography. Springer Science and Business Media Hankerson D, Menezes AJ, Vanstone S (2006) Guide to elliptic curve cryptography. Springer Science and Business Media
25.
Zurück zum Zitat Mwitende G, Ye Y, Ali I, Li F (2020) Certificateless authenticated key agreement for blockchain-based wbans. J Syst Archit 110:101777CrossRef Mwitende G, Ye Y, Ali I, Li F (2020) Certificateless authenticated key agreement for blockchain-based wbans. J Syst Archit 110:101777CrossRef
26.
Zurück zum Zitat Huang X, Mu Y, Susilo W, Wong DS, Wu W (2007) Certificateless signature revisited, in: Australasian Conference on Information Security and Privacy. Springer, pp 308–322 Huang X, Mu Y, Susilo W, Wong DS, Wu W (2007) Certificateless signature revisited, in: Australasian Conference on Information Security and Privacy. Springer, pp 308–322
27.
Zurück zum Zitat Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ecdsa). Int J Inf Secur 1(1):36–63CrossRef Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ecdsa). Int J Inf Secur 1(1):36–63CrossRef
28.
Zurück zum Zitat Bellare M, Rogaway P (1993) Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM Conference on Computer and Communications Security, pp 62–73 Bellare M, Rogaway P (1993) Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM Conference on Computer and Communications Security, pp 62–73
29.
Zurück zum Zitat Wu T-Y, Tseng Y-M (2010) An efficient user authentication and key exchange protocol for mobile client-server environment. Comput Netw 54(9):1520–1530CrossRefMATH Wu T-Y, Tseng Y-M (2010) An efficient user authentication and key exchange protocol for mobile client-server environment. Comput Netw 54(9):1520–1530CrossRefMATH
30.
Zurück zum Zitat Choon JC, Cheon JH (2003) An identity-based signature from gap Diffie-Hellman groups, in: International workshop on public key cryptography. Springer, pp 18–30 Choon JC, Cheon JH (2003) An identity-based signature from gap Diffie-Hellman groups, in: International workshop on public key cryptography. Springer, pp 18–30
31.
Zurück zum Zitat Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13(3):361–396CrossRefMATH Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13(3):361–396CrossRefMATH
32.
Zurück zum Zitat Blake-Wilson S, Johnson D, Menezes A (1997) Key agreement protocols and their security analysis. In: IMA International Conference on Cryptography and Coding. Springer, pp 30–45 Blake-Wilson S, Johnson D, Menezes A (1997) Key agreement protocols and their security analysis. In: IMA International Conference on Cryptography and Coding. Springer, pp 30–45
33.
Zurück zum Zitat Lo N-W, Tsai J-L (2015) An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Trans Intell Transp Syst 17(5):1319–1328CrossRef Lo N-W, Tsai J-L (2015) An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Trans Intell Transp Syst 17(5):1319–1328CrossRef
34.
Zurück zum Zitat Liu J, Zhang L, Sun R (2016) 1-raap: An efficient 1-round anonymous authentication protocol for wireless body area networks. Sensors 16(5):728CrossRef Liu J, Zhang L, Sun R (2016) 1-raap: An efficient 1-round anonymous authentication protocol for wireless body area networks. Sensors 16(5):728CrossRef
35.
Zurück zum Zitat Wazid M, Das AK, Kumar N, Conti M, Vasilakos AV (2017) A novel authentication and key agreement scheme for implantable medical devices deployment. IEEE J Biomed Health Inform 22(4):1299–1309CrossRef Wazid M, Das AK, Kumar N, Conti M, Vasilakos AV (2017) A novel authentication and key agreement scheme for implantable medical devices deployment. IEEE J Biomed Health Inform 22(4):1299–1309CrossRef
Metadaten
Titel
HAP-SG: Heterogeneous authentication protocol for smart grid
verfasst von
Nkurunziza Egide
Fagen Li
Publikationsdatum
08.05.2023
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 3/2023
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01485-x

Weitere Artikel der Ausgabe 3/2023

Peer-to-Peer Networking and Applications 3/2023 Zur Ausgabe

Premium Partner