Extremely Lightweight PUF-based Batch Authentication Protocol for End-Edge-Cloud Hierarchical Smart Grid

نویسندگان

چکیده

Smart grid is gradually replacing traditional with two-way communication and improved management. Besides the efficiency reliability it brings, smart inevitably fraught rampant physical cyber-attack. Although several unclonable function (PUF)-based schemes have been proposed, they are unsuited to end-edge-cloud hierarchical grid. This paper proposes a PUF-based batch authentication key agreement protocol, which protects both meters gateways provides end-to-end between server. By offloading heavy operations from field devices server, computation overhead reduced substantially. Moreover, we innovatively devolve access control gateway, additionally decreases downlink signaling cost, superior most recent schemes. Our protocol proved by Tamarin under extended Dolev–Yao adversary Real-or-Random model evaluated be secure against various attacks. Using extremely lightweight operations, our implemented on MSP430FR5969 microcontroller.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Authentication Protocol in Smart Grid

Smart grids allow automated meter readings and facilitate two-way communications between the smart meters and utility control centers. As the smart grid becomes more intelligent, it becomes increasingly vulnerable to cyberattacks. Smart grid security mainly focuses on mutual authentication and key management techniques. An impeding factor in grid security is the memory and processing constraint...

متن کامل

Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol

We enroll more and more personal pervasive devices because these simplify our everyday lives. In order to verify the identity of these devices we use authentication protocols. Although simple authentication often suffices, users would like to remain anonymous during these authentications. Many privacy-preserving authentication protocols have been proposed that claim security and privacy. Howeve...

متن کامل

PUMAP: A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol

Radio Frequency Identification (RFID) is a technology used for automatic identification of objects, people, and virtually anything one can think of. Applications of RFID technology are expanding and its usage is being adopted worldwide. As such, major efforts have been made to secure the communications in RFID systems and to protect them from various attacks. This paper surveys RFID systems, ci...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2022

ISSN: ['1939-0122', '1939-0114']

DOI: https://doi.org/10.1155/2022/9774853