Cargando…
A Multi-User, Single-Authentication Protocol for Smart Grid Architectures
In a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7146565/ https://www.ncbi.nlm.nih.gov/pubmed/32178299 http://dx.doi.org/10.3390/s20061581 |
_version_ | 1783520230526418944 |
---|---|
author | Alfakeeh, Ahmed S. Khan, Sarmadullah Al-Bayatti, Ali Hilal |
author_facet | Alfakeeh, Ahmed S. Khan, Sarmadullah Al-Bayatti, Ali Hilal |
author_sort | Alfakeeh, Ahmed S. |
collection | PubMed |
description | In a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing from the smart grid devices to the utility servers, which may result in energy disruption or imbalance. Thus, an authentication is mandatory to efficiently authenticate the devices and the utility servers and avoid tampering attacks. To this end, a group authentication algorithm is proposed for preserving demand–response security in a smart grid. The proposed mechanism also provides a fine-grained access control feature where the utility server can only access a limited number of smart grid devices. The initial authentication between the utility server and smart grid device in a group involves a single public key operation, while the subsequent authentications with the same device or other devices in the same group do not need a public key operation. This reduces the overall computation and communication overheads and takes less time to successfully establish a secret session key, which is used to exchange sensitive information over an unsecured wireless channel. The resilience of the proposed algorithm is tested against various attacks using formal and informal security analysis. |
format | Online Article Text |
id | pubmed-7146565 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-71465652020-04-20 A Multi-User, Single-Authentication Protocol for Smart Grid Architectures Alfakeeh, Ahmed S. Khan, Sarmadullah Al-Bayatti, Ali Hilal Sensors (Basel) Article In a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing from the smart grid devices to the utility servers, which may result in energy disruption or imbalance. Thus, an authentication is mandatory to efficiently authenticate the devices and the utility servers and avoid tampering attacks. To this end, a group authentication algorithm is proposed for preserving demand–response security in a smart grid. The proposed mechanism also provides a fine-grained access control feature where the utility server can only access a limited number of smart grid devices. The initial authentication between the utility server and smart grid device in a group involves a single public key operation, while the subsequent authentications with the same device or other devices in the same group do not need a public key operation. This reduces the overall computation and communication overheads and takes less time to successfully establish a secret session key, which is used to exchange sensitive information over an unsecured wireless channel. The resilience of the proposed algorithm is tested against various attacks using formal and informal security analysis. MDPI 2020-03-12 /pmc/articles/PMC7146565/ /pubmed/32178299 http://dx.doi.org/10.3390/s20061581 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Alfakeeh, Ahmed S. Khan, Sarmadullah Al-Bayatti, Ali Hilal A Multi-User, Single-Authentication Protocol for Smart Grid Architectures |
title | A Multi-User, Single-Authentication Protocol for Smart Grid Architectures |
title_full | A Multi-User, Single-Authentication Protocol for Smart Grid Architectures |
title_fullStr | A Multi-User, Single-Authentication Protocol for Smart Grid Architectures |
title_full_unstemmed | A Multi-User, Single-Authentication Protocol for Smart Grid Architectures |
title_short | A Multi-User, Single-Authentication Protocol for Smart Grid Architectures |
title_sort | multi-user, single-authentication protocol for smart grid architectures |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7146565/ https://www.ncbi.nlm.nih.gov/pubmed/32178299 http://dx.doi.org/10.3390/s20061581 |
work_keys_str_mv | AT alfakeehahmeds amultiusersingleauthenticationprotocolforsmartgridarchitectures AT khansarmadullah amultiusersingleauthenticationprotocolforsmartgridarchitectures AT albayattialihilal amultiusersingleauthenticationprotocolforsmartgridarchitectures AT alfakeehahmeds multiusersingleauthenticationprotocolforsmartgridarchitectures AT khansarmadullah multiusersingleauthenticationprotocolforsmartgridarchitectures AT albayattialihilal multiusersingleauthenticationprotocolforsmartgridarchitectures |