Smart Grid Communication Under Elliptic Curve Cryptography
نویسندگان
چکیده
Smart Grids (SGs) are introduced as a solution for standard power distribution. The significant capabilities of smart grids help to monitor consumer behaviors and systems. However, the delay-sensitive network faces numerous challenges in which security privacy gain more attention. Threats transmitted messages, control over grid information user major concerns security. Providing secure communication between service provider is only possible these issues. So, this research work presents an efficient mutual authentication key agreement protocol using elliptic curve cryptography robust against threats. A trust authority module model apart from authentication. proposed approach performance verified based on different features, costs, computation costs. comparative analysis experimental results demonstrates that attains better than existing state art techniques.
منابع مشابه
Secure Transmission of Data in Smart Grid with the Aid of Elliptic Curve Cryptography Method
A smart grid represents a straightforward improvement of a power grid, which effectively hands over electricity from suppliers to clients. It generally uses a two-way digital communication with an eye on managing the devices at client households. They are also competent to conserve energy, scale down overhead costs and to enhance consistency and lucidity. It is home to smart meters, which pave ...
متن کاملElliptic Curve Cryptography on Smart Cards without Coprocessors
This contribution describes how an elliptic curve cryptosystem can be implemented on very low cost microprocessors with reasonable performance. We focus in this paper on the Intel 8051 family of microcontrollers popular in smart cards and other cost-sensitive devices. The implementation is based on the use of the finite fieldGF ((2− 17)) which is particularly suited for low end 8-bit processors...
متن کاملImplementing Elliptic Curve Cryptography on Pc and Smart Card
Elliptic Curve Cryptography (ECC) is a relatively new branch of public key cryptography. Its main advantage is that it can provide the same level of security as RSA with significantly shorter keys, which is beneficial for a smart card based implementation. It is also important as a possible alternative of RSA. This paper presents the authors’ research concerning ECC and smart cards. The authors...
متن کاملSoftware Elliptic Curve Cryptography
In this thesis, we study the software implementation of the NIST-recommended elliptic curves over prime fields. Our implementation goals are to achieve a fast, small, and portable cryptographic library, which supports elliptic curve digital signature generation and verification. The implementation results are presented on a Pentium I1 448.81 MHz. We also consider the sliding window algorithm (S...
متن کاملElliptic Curve Cryptography
There is a re-emerging demand for low-end devices such as 8-bit processors, driven by needs for pervasive applications like sensor networks and RF-ID tags. Security in pervasive applications, however, has been a major concern for their widespread acceptance. Public-key cryptosystems (PKC) like RSA and DSA generally involve computation-intensive arithmetic operations with operand sizes of 1024 −...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Intelligent Automation and Soft Computing
سال: 2023
ISSN: ['2326-005X', '1079-8587']
DOI: https://doi.org/10.32604/iasc.2023.029725