A Secure Unicast/Multicast Authentication and Key Distribution Protocols for Smart Grid

نویسندگان

چکیده

This study discusses the problem of key distribution protocol in IoT systems especially smart grids for two modes communication: Unicast and multicast. In present paper, we suggested protocols both unicast multicast communication. The proposed schemes are based on symmetric encryption with cryptographic primitives: Hashes nonces. addition, is a logical hierarchy to reduce communication computation overheads case any member change. solutions compared other overheads, ability resist well-known attacks. comparison shows that have lowest while resisting known To ensure correctness security protocol, it analyzed using tool (BAN logic). analysis illustrates free from bugs or redundancies.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A key management architecture and protocols for secure smart grid communications

Providing encrypted communications among power grid components is expected to be a basic requirement of smart grid systems in the future. Here, we propose a key management architecture and associated protocols tailored to support encrypted smart grid communications. The architecture consists of two levels structured around the grid control system hierarchy. At the top level, which consist of co...

متن کامل

Secure Key Distribution Protocol with Smart Meter

Authentication is crucial for large and distributed systems, such as cyber-physical infrastructures. The focus of this paper is on the secure key distribution must be secure enough to any attempts to compromise the system. we first overview the key management scheme how probabilistic argumentation is applicable to modern public-key cryptography as an relevant gadget to evaluate webs of trust. W...

متن کامل

Secure Key Management Scheme for Ami in Smart Grid

The smart grid has been introduced as the next generation power grid. Advanced Metering Infrastructure (AMI) is one of the key components in this grid. It provides bidirectional communication between consumers and management entities in the utility side. This bidirectional nature communication flow has made AMI vulnerable to various cyber attacks. So, cyber security has become an important conc...

متن کامل

Secure and minimal protocols for authenticated key distribution

The problem of secure key distribution has been the subject of much attention in the recent years. This paper describes a novel method for authenticated key distribution in the distributed systems environment. In particular, a braiding technique for key distribution is introduced. The underlying protocols are extremely compact in both the number of messages and message sizes which facilitates t...

متن کامل

Secure Multiround Authentication Protocols

Gemmell and Naor proposed a new protocol for unconditionally secure authentication of long messages. However Gehrmann showed that the proof of the security of the protocol was incorrect. Here we generalize the multiround protocol model. We prove the security of a 3-round protocol and give for this case a new easy implementable construction which has a key size close to the fundamental lower bou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: American Journal of Engineering and Applied Sciences

سال: 2022

ISSN: ['1941-7020', '1941-7039']

DOI: https://doi.org/10.3844/ajeassp.2022.331.343