A Secure Unicast/Multicast Authentication and Key Distribution Protocols for Smart Grid
نویسندگان
چکیده
This study discusses the problem of key distribution protocol in IoT systems especially smart grids for two modes communication: Unicast and multicast. In present paper, we suggested protocols both unicast multicast communication. The proposed schemes are based on symmetric encryption with cryptographic primitives: Hashes nonces. addition, is a logical hierarchy to reduce communication computation overheads case any member change. solutions compared other overheads, ability resist well-known attacks. comparison shows that have lowest while resisting known To ensure correctness security protocol, it analyzed using tool (BAN logic). analysis illustrates free from bugs or redundancies.
منابع مشابه
A key management architecture and protocols for secure smart grid communications
Providing encrypted communications among power grid components is expected to be a basic requirement of smart grid systems in the future. Here, we propose a key management architecture and associated protocols tailored to support encrypted smart grid communications. The architecture consists of two levels structured around the grid control system hierarchy. At the top level, which consist of co...
متن کاملSecure Key Distribution Protocol with Smart Meter
Authentication is crucial for large and distributed systems, such as cyber-physical infrastructures. The focus of this paper is on the secure key distribution must be secure enough to any attempts to compromise the system. we first overview the key management scheme how probabilistic argumentation is applicable to modern public-key cryptography as an relevant gadget to evaluate webs of trust. W...
متن کاملSecure Key Management Scheme for Ami in Smart Grid
The smart grid has been introduced as the next generation power grid. Advanced Metering Infrastructure (AMI) is one of the key components in this grid. It provides bidirectional communication between consumers and management entities in the utility side. This bidirectional nature communication flow has made AMI vulnerable to various cyber attacks. So, cyber security has become an important conc...
متن کاملSecure and minimal protocols for authenticated key distribution
The problem of secure key distribution has been the subject of much attention in the recent years. This paper describes a novel method for authenticated key distribution in the distributed systems environment. In particular, a braiding technique for key distribution is introduced. The underlying protocols are extremely compact in both the number of messages and message sizes which facilitates t...
متن کاملSecure Multiround Authentication Protocols
Gemmell and Naor proposed a new protocol for unconditionally secure authentication of long messages. However Gehrmann showed that the proof of the security of the protocol was incorrect. Here we generalize the multiround protocol model. We prove the security of a 3-round protocol and give for this case a new easy implementable construction which has a key size close to the fundamental lower bou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: American Journal of Engineering and Applied Sciences
سال: 2022
ISSN: ['1941-7020', '1941-7039']
DOI: https://doi.org/10.3844/ajeassp.2022.331.343