Lightweight and dynamic authenticated key agreement and management protocol for smart grid

被引:0
|
作者
Zhai, Feng [1 ,2 ]
Yang, Ting [1 ]
Sun, Wei [3 ]
Fang, Xu [4 ]
机构
[1] Tianjin Univ, Sch Elect Engn & Automat, Tianjin, Peoples R China
[2] State Grid, China Elect Power Res Inst, Beijing, Peoples R China
[3] State Grid Corp China, Beijing, Peoples R China
[4] Henan Xj Metering Co Ltd, Xuchang, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
key management; identity-based cryptosystem; mutual authentication; elliptic curve; key update; ADVANCED METERING INFRASTRUCTURE; DATA AGGREGATION; SCHEME; PRIVACY; INTERNET;
D O I
10.3389/fenrg.2022.1000828
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
With the development of IoT and 5G, the smart grid, as one of the key component for the smart city, can provide the uninterrupted and reliable electricity service by properly adjusting the electricity supply according to the consumption of users. The advanced metering infrastructure (AMI), as an important part of smart grid system, is a complete network and system for measuring, collecting, storing and analyzing the electricity consumption information of users. The security of AMI plays a vital role in the smooth operation of smart grid. In this paper, we study how to establish the secure communication between two entities in AMI, namely the smart meter and the electricity service provider. Although, there are many authentication and key management protocols for AMI, the high complexity and computation overhead of these protocols hinder their application in the smart grid environment. Based on identity cryptosystem and elliptic curve cryptography (ECC), we put forward a lightweight and dynamic authenticated key agreement and management protocol, which can significantly reduce the computation overhead of the resource-constrained smart meters. In addition, we utilize a one-way key tree technique to efficiently generate and update the group key in the multicast communication. We give a systematic proof to show that our designed protocol not only guarantees the confidentiality and integrity of transmitted messages, but also resists various attacks from an adversary. Finally, we carry out some simulated experiments to demonstrate the high efficiency of our designed protocol.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] A secure authenticated key agreement protocol
    Popescu, C
    MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 783 - 786
  • [32] A Deniable Authenticated Key Agreement Protocol
    TIAN Haibo1
    2. Guangdong Key Laboratory of Information Security Technology
    Wuhan University Journal of Natural Sciences, 2008, (06) : 645 - 650
  • [33] A new authenticated key agreement protocol
    Kim, KW
    Ryu, EK
    Lee, HM
    Yoo, KY
    COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2003, : 91 - 94
  • [34] AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL
    Wang Changji Yang Bo Wu Jianping Network Research Center Tsinghua University Beijing China
    Journal of Electronics, 2005, (05) : 485 - 489
  • [35] A new authenticated key agreement protocol
    Abi-Char, Pierre E.
    Mhamed, Abdallah
    El-Hassan, Bachar
    NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 629 - 629
  • [36] Authenticated commutator key agreement protocol
    Ushakov A.
    Groups, Complexity, Cryptology, 2016, 8 (02) : 127 - 133
  • [37] An Efficient Protocol for Authenticated Key Agreement
    Laurie Law
    Alfred Menezes
    Minghua Qu
    Jerry Solinas
    Scott Vanstone
    Designs, Codes and Cryptography, 2003, 28 : 119 - 134
  • [38] A robust authenticated key agreement protocol
    Lee, HM
    Ryu, EK
    Kim, KW
    Lee, JM
    Yoo, KY
    COMPUTERS AND THEIR APPLICATIONS, 2003, : 76 - 79
  • [39] An efficient protocol for authenticated key agreement
    Law, L
    Menezes, A
    Qu, MH
    Solinas, J
    Vanstone, S
    DESIGNS CODES AND CRYPTOGRAPHY, 2003, 28 (02) : 119 - 134
  • [40] AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL
    Wang Changji Yang Bo Wu Jianping (Network Research Center
    Journal of Electronics(China), 2005, (05) : 485 - 489