An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Authors

  • F. Naji Mohades M.Sc. Student, Department of Computer Engineering, Imam Reza International University, Mashhad, Iran
  • M. H. Yaghmaee Moghadam Professor, Department of Computer Engineering and Center of Excellence on Soft Computing and Intelligent Information Processing, Ferdowsi University of Mashhad, Mashhad, Iran
Abstract:

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists of two phases: a key and signature generation phase as well as a signature verification phase. The next challenge, is securing communication messages. Accordingly, a message authentication mechanism based on ECC and OTS is proposed in this paper. Such protocols are designed based on resource constraint problem on the consumer side and security requirement satisfaction in AMI. Security of the protocol with BAN logic is proved and possibility of signature forgery via the mathematical principle of birthday paradox formula is represented. In the end, security of the protocol is scrutinized with informal methods and is simulated on Java. Simulation and analytical results show that proposed protocols are more secure and efficient than similar methods against most of the security attacks.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

an ecc-based mutual authentication scheme with one time signature (ots) in advanced metering infrastructure

advanced metering infrastructure (ami) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  this study focuses on communication between a smart meter and a server on the utility side. hence, a mutual authentication mechanism in ami is presented based on the elliptic curve cryptography (ecc) and one time signature (ots) consists o...

full text

An efficient RFID mutual authentication scheme based on ECC

Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applications, such as medical drugs management in hospitals and missing children searching in amusement parks. The applications basically can be classified into two types: non-public key cryptosystem (PKC)-based and PKC-based. However, many of them have been found to be flawed in the aspect of privacy pro...

full text

Efficient and Fault-Diagnosable Authentication Scheme for Advanced Metering Infrastructure

The recently emerging Advanced Metering Infrastructure (AMI) is envisioned to be one of the most prominent features of the smart grid. Security, especially authentication, is crucial for the success of large-scale AMI deployment. Unfortunately, AMI’s natural requirements — efficiency, scalability, fault-diagnoses and reliability — cannot be fully satisfied by existing authentication schemes: pe...

full text

An ECC-Based Blind Signature Scheme

Cryptography is increasingly applied to the E-commerce world, especially to the untraceable payment system and the electronic voting system. Protocols for these systems strongly require the anonymous digital signature property, and thus a blind signature strategy is the answer to it. Chaum stated that every blind signature protocol should hold two fundamental properties, blindness and intractab...

full text

An Efficient and More Secure Id- Based Mutual Authentication Scheme Based on Ecc for Mobile Devices

Mobile services are spread throughout the wireless network and are one of the crucial components needed for various applications and services. However, the security of mobile communication has topped the list of concerns for mobile phone users. Confidentiality, Authentication, Integrity and Non-repudiation are required security services for mobile communication. Currently available network secu...

full text

An Enhanced ECC Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices

Recently, Islam and Biswas proposed an efficient and secure ID-based remote mutual authentication with key agreement scheme. We have analyzed the security and performance of Islam and Biswas’s scheme and showed that their scheme has some pitfalls. In order to solve these problems, we have constructed an enhanced ECC remote mutual authentication with key agreement scheme and proven that the prop...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 46  issue 1

pages  31- 44

publication date 2014-05-22

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023