scispace - formally typeset
Journal ArticleDOI

Multilayer Consensus ECC-Based Password Authenticated Key-Exchange (MCEPAK) Protocol for Smart Grid System

Reads0
Chats0
TLDR
This paper aims at providing a key agreement protocol for smart grid to cope with access control of appliances/ devices located inside a Home Area Network by a set of controllers outside the HAN with an Elliptic Curve Cryptography approach.
Abstract
This paper aims at providing a key agreement protocol for smart grid to cope with access control of appliances/devices located inside a Home Area Network (HAN) by a set of controllers outside the HAN. The commands/packets initiated by the controllers in crisis cases should be delivered fast and immune from any interruption. The HAN controller, which acts as a gateway, should not cause any delay by decrypting and re-encrypting the packets, nor should it has any chance to modify them. Considering the required level of security and quality of service, we design our protocol with an Elliptic Curve Cryptography (ECC) approach. We improve and implement the Password Authenticated Key Exchange (PAKE) protocol in two steps. First, we propose an auxiliary mechanism that is an ECC version of PAKE, and then extend it to a multilayer consensus model. We reduce the number of hash functions to one, and utilize a primitive password shared between an appliance and HAN controller to construct four valid individual consensus and authenticated symmetric keys between the appliance and upstream controllers by exchanging only 12 packets. Security analysis presents that our protocol is resilient to various attacks. Furthermore, performance analysis shows that the delay caused by the security process is reduced by more than one half.

read more

Citations
More filters

A Survey on Smart Grid CommunicationInfrastructures: Motivations, Requirements andChallenges

TL;DR: From the experience of several industrial trials on smart grid with communication infrastructures, it is expected that the traditional carbon fuel based power plants can cooperate with emerging distributed renewable energy such as wind, solar, etc, to reduce the carbon fuel consumption and consequent green house gas such as carbon dioxide emission.
Journal ArticleDOI

An elliptic curve cryptography based lightweight authentication scheme for smart grid communication

TL;DR: A lightweight ECC based authentication scheme for smart grid communication that not only provides mutual authentication with low computation and communication cost but also withstand against all known security attacks.
Journal ArticleDOI

A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid

TL;DR: A novel identity-based key establishment protocol which employs elliptic curves at its core and has the lowest computational overhead among current secure protocols, especially at the meter side is proposed.
Journal ArticleDOI

An improved and provably secure privacy preserving authentication protocol for SIP

TL;DR: A privacy preserving improved authentication scheme based on ECC is proposed that provides mutual authentication as well as resists all known attacks as mentioned by Tu et al. and Farash.
Journal ArticleDOI

An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication

TL;DR: This paper proposes an efficient privacy-preserving authentication scheme for EI-based vehicle-to-grid communication using lightweight cryptographic primitives such as one-way non-collision hash functions.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Journal ArticleDOI

On the security of public key protocols

TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Proceedings ArticleDOI

Encrypted key exchange: password-based protocols secure against dictionary attacks

TL;DR: A combination of asymmetric (public-key) and symmetric (secret- key) cryptography that allow two parties sharing a common password to exchange confidential and authenticated information over an insecure network is introduced.
Journal ArticleDOI

Security and Privacy Challenges in the Smart Grid

TL;DR: The smart grid is the modernization of the existing electrical system that enhances customers' and utilities' ability to monitor, control, and predict energy use.
Related Papers (5)