Cargando…

A Multi-User, Single-Authentication Protocol for Smart Grid Architectures

In a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing...

Descripción completa

Detalles Bibliográficos
Autores principales: Alfakeeh, Ahmed S., Khan, Sarmadullah, Al-Bayatti, Ali Hilal
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7146565/
https://www.ncbi.nlm.nih.gov/pubmed/32178299
http://dx.doi.org/10.3390/s20061581
_version_ 1783520230526418944
author Alfakeeh, Ahmed S.
Khan, Sarmadullah
Al-Bayatti, Ali Hilal
author_facet Alfakeeh, Ahmed S.
Khan, Sarmadullah
Al-Bayatti, Ali Hilal
author_sort Alfakeeh, Ahmed S.
collection PubMed
description In a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing from the smart grid devices to the utility servers, which may result in energy disruption or imbalance. Thus, an authentication is mandatory to efficiently authenticate the devices and the utility servers and avoid tampering attacks. To this end, a group authentication algorithm is proposed for preserving demand–response security in a smart grid. The proposed mechanism also provides a fine-grained access control feature where the utility server can only access a limited number of smart grid devices. The initial authentication between the utility server and smart grid device in a group involves a single public key operation, while the subsequent authentications with the same device or other devices in the same group do not need a public key operation. This reduces the overall computation and communication overheads and takes less time to successfully establish a secret session key, which is used to exchange sensitive information over an unsecured wireless channel. The resilience of the proposed algorithm is tested against various attacks using formal and informal security analysis.
format Online
Article
Text
id pubmed-7146565
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-71465652020-04-20 A Multi-User, Single-Authentication Protocol for Smart Grid Architectures Alfakeeh, Ahmed S. Khan, Sarmadullah Al-Bayatti, Ali Hilal Sensors (Basel) Article In a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing from the smart grid devices to the utility servers, which may result in energy disruption or imbalance. Thus, an authentication is mandatory to efficiently authenticate the devices and the utility servers and avoid tampering attacks. To this end, a group authentication algorithm is proposed for preserving demand–response security in a smart grid. The proposed mechanism also provides a fine-grained access control feature where the utility server can only access a limited number of smart grid devices. The initial authentication between the utility server and smart grid device in a group involves a single public key operation, while the subsequent authentications with the same device or other devices in the same group do not need a public key operation. This reduces the overall computation and communication overheads and takes less time to successfully establish a secret session key, which is used to exchange sensitive information over an unsecured wireless channel. The resilience of the proposed algorithm is tested against various attacks using formal and informal security analysis. MDPI 2020-03-12 /pmc/articles/PMC7146565/ /pubmed/32178299 http://dx.doi.org/10.3390/s20061581 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Alfakeeh, Ahmed S.
Khan, Sarmadullah
Al-Bayatti, Ali Hilal
A Multi-User, Single-Authentication Protocol for Smart Grid Architectures
title A Multi-User, Single-Authentication Protocol for Smart Grid Architectures
title_full A Multi-User, Single-Authentication Protocol for Smart Grid Architectures
title_fullStr A Multi-User, Single-Authentication Protocol for Smart Grid Architectures
title_full_unstemmed A Multi-User, Single-Authentication Protocol for Smart Grid Architectures
title_short A Multi-User, Single-Authentication Protocol for Smart Grid Architectures
title_sort multi-user, single-authentication protocol for smart grid architectures
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7146565/
https://www.ncbi.nlm.nih.gov/pubmed/32178299
http://dx.doi.org/10.3390/s20061581
work_keys_str_mv AT alfakeehahmeds amultiusersingleauthenticationprotocolforsmartgridarchitectures
AT khansarmadullah amultiusersingleauthenticationprotocolforsmartgridarchitectures
AT albayattialihilal amultiusersingleauthenticationprotocolforsmartgridarchitectures
AT alfakeehahmeds multiusersingleauthenticationprotocolforsmartgridarchitectures
AT khansarmadullah multiusersingleauthenticationprotocolforsmartgridarchitectures
AT albayattialihilal multiusersingleauthenticationprotocolforsmartgridarchitectures