A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Authors
Abstract:
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of smart grid systems, and utilizing different new technologies, there are many opportunities for adversaries to attack the smart grid system that can result fatal problems for the customers. A privacy preserving authentication scheme is a critical element for secure development of smart grid. Recently, Mahmood et al. [1] proposed a lightweight message authentication scheme for smart grid communications and claimed that it satisfies the security requirements. Unfortunately, we found that Mahmood et al.'s scheme has some security vulnerabilities and it has not adequate security features to be utilized in smart grid. To address these drawbacks, we propose an efficient and secure lightweight privacy-preserving authentication scheme for a smart grid. Security of our scheme are evaluated, and the formal security analysis and verification are introduced via the broadly-accepted Burrows-Abadi-Needham (BAN) logic and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Finally, the security and efficiency comparisons are provided, which indicate the security and efficiency of the proposed scheme as compared to other existing related schemes.
similar resources
A Lightweight Message Authentication Scheme for Smart Grid Communications
Smart Grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric power transmission systems. However, communication trust and security issues still present practical concerns to the deployment of SG. In this paper, to cope with these challenging concerns, we propose a lightweight message authentication scheme features as a basic yet c...
full textA Survey on Privacy-preserving Schemes for Smart Grid Communications
In this paper, we present a comprehensive survey of privacy-preserving schemes for Smart Grid communications. Specifically, we select and in-detail examine thirty privacy preserving schemes developed for or applied in the context of Smart Grids. Based on the communication and system models, we classify these schemes that are published between 2013 and 2016, in five categories, including, 1) Sma...
full textA Novel Multi-factor Authenticated Key Exchange Scheme With Privacy Preserving
In this paper, a new multi-factor authenticated key exchange scheme, which combines with biometrics, password and the smart card, is proposed. Compared with the previous schemes, this scheme has higher security in remote authentication and preserves privacy of biometrics , and most of the previous schemes rely on the smart card to verify biometrics. The advantage of these approaches is that the...
full textA Lightweight Generic Compiler for Authenticated Key Exchange from Non-interactive Key Exchange with Auxiliary Input
We introduce a new lightweight generic compiler that is able to transform any passively forward secure twomessage key exchange (KE) protocols into authenticated key exchange (AKE) protocols with security in the presence of active adversaries who can reveal critical session specific information such as long-term or ephemeral secrets and can establish malicious parties. The compiler is built base...
full textPrivacy Preservation Scheme for Multicast Communications in Smart Buildings of the Smart Grid
Privacy preservation is a crucial issue for smart buildings where all kinds of messages, e.g., power usage data, control commands, events, alarms, etc. are transmitted to accomplish the management of power. Without appropriate privacy protection schemes, electricity customers are faced with various privacy risks. Meanwhile, the natures of smart grids and smart buildings—such as having limited c...
full textAn Efficient Authenticated Asymmetric Key Exchange Scheme
In this paper, an efficient authenticated asymmetric key exchange scheme has been designed based on the features of the Threshold Cryptography [11]. The method provides authentication and key establishment (like RSA, ) over an insecure channel using shares of two prime numbers and is secure against even off-line dictionary attack. In the proposed scheme, , and are all secret and each of the two...
full textMy Resources
Journal title
volume 11 issue 2
pages 113- 128
publication date 2019-07-01
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023