an ecc-based mutual authentication scheme with one time signature (ots) in advanced metering infrastructure
نویسندگان
چکیده
advanced metering infrastructure (ami) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. this study focuses on communication between a smart meter and a server on the utility side. hence, a mutual authentication mechanism in ami is presented based on the elliptic curve cryptography (ecc) and one time signature (ots) consists of two phases: a key and signature generation phase as well as a signature verification phase. the next challenge, is securing communication messages. accordingly, a message authentication mechanism based on ecc and ots is proposed in this paper. such protocols are designed based on resource constraint problem on the consumer side and security requirement satisfaction in ami. security of the protocol with ban logic is proved and possibility of signature forgery via the mathematical principle of birthday paradox formula is represented. in the end, security of the protocol is scrutinized with informal methods and is simulated on java. simulation and analytical results show that proposed protocols are more secure and efficient than similar methods against most of the security attacks.
منابع مشابه
An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملAn efficient RFID mutual authentication scheme based on ECC
Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applications, such as medical drugs management in hospitals and missing children searching in amusement parks. The applications basically can be classified into two types: non-public key cryptosystem (PKC)-based and PKC-based. However, many of them have been found to be flawed in the aspect of privacy pro...
متن کاملEfficient and Fault-Diagnosable Authentication Scheme for Advanced Metering Infrastructure
The recently emerging Advanced Metering Infrastructure (AMI) is envisioned to be one of the most prominent features of the smart grid. Security, especially authentication, is crucial for the success of large-scale AMI deployment. Unfortunately, AMI’s natural requirements — efficiency, scalability, fault-diagnoses and reliability — cannot be fully satisfied by existing authentication schemes: pe...
متن کاملAn ECC-Based Blind Signature Scheme
Cryptography is increasingly applied to the E-commerce world, especially to the untraceable payment system and the electronic voting system. Protocols for these systems strongly require the anonymous digital signature property, and thus a blind signature strategy is the answer to it. Chaum stated that every blind signature protocol should hold two fundamental properties, blindness and intractab...
متن کاملAn Efficient and More Secure Id- Based Mutual Authentication Scheme Based on Ecc for Mobile Devices
Mobile services are spread throughout the wireless network and are one of the crucial components needed for various applications and services. However, the security of mobile communication has topped the list of concerns for mobile phone users. Confidentiality, Authentication, Integrity and Non-repudiation are required security services for mobile communication. Currently available network secu...
متن کاملAn Enhanced ECC Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices
Recently, Islam and Biswas proposed an efficient and secure ID-based remote mutual authentication with key agreement scheme. We have analyzed the security and performance of Islam and Biswas’s scheme and showed that their scheme has some pitfalls. In order to solve these problems, we have constructed an enhanced ECC remote mutual authentication with key agreement scheme and proven that the prop...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
amirkabir international journal of modeling, identification, simulation & controlناشر: amirkabir university of technology
ISSN 2008-6067
دوره 46
شماره 1 2014
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023