Location Authentication, Tracking, and Emergency Signaling through Power Line Communication: Designs and Protocols for New Out-of-Band Strategies
نویسندگان
چکیده
We propose using Power Line Communication (PLC) as a second channel for data origin authentication, and we present a system architecture and protocol for doing so taking advantage of existing infrastructure for communicating over power lines. Our system connects a user’s computer to a secure electric meter in his building via a secure Human Authorization Detector (HAD). The meter, which has a unique secret identifier and encryption key, communicates securely with the trusted Power Grid Server (PG) through PLC. Upon request from an Internet Application Server (AS), the user sends a location certificate to the AS, obtained via PLC from the PG and signed by the PG. Because PLC requires physical access to the meter permanently attached to the building, our system offers fine-grain location authentication. The user authorizes certificate requests by reading the HAD’s display including transaction details and pushing a button, thus mitigating the threat of malware on the user’s computer maliciously requesting or forwarding location certificates unauthorized by the user. Our system provides strong location authentication useful to many on-line applications, including banking and SCADA systems. We present our architecture and protocols in sufficient detail to permit further implementation and analysis. We also outline applications for anti-theft and emergency signaling.
منابع مشابه
APPROVAL SHEET Title of Thesis: Location Authentication through Power Line Communication: Design, Protocol, and Analysis of a New Out-of-Band Strategy Name of Candidate:
Title of Document: Location Authentication through Power Line Communication: Design, Protocol, and Analysis of a New Out-of-Band Strategy Vivek G. Relan, Masters, 2010 Directed By: Dr. Dhananjay Phatak, Associate Professor, CSEE Dept. Dr. Alan T. Sherman, Associate Professor, CSEE Dept. We propose using Power Line Communication (PLC) as a second channel for data origin authentication, and we pr...
متن کاملارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا
The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases, the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملExtending Formal Analysis of Mobile Device Authentication
Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications must rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. Much of the focus in development of new applications in this area seeks to reduce or eliminate the impact of this additional ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Cryptologia
دوره 36 شماره
صفحات -
تاریخ انتشار 2012