HIBaSS: hierarchical identity-based signature scheme for AMI downlink transmission

被引:5
|
作者
Ye, Feng [1 ]
Qian, Yi [1 ]
Hu, Rose Qingyang [2 ]
机构
[1] Univ Nebraska, Dept Elect & Comp Engn, Lincoln, NE 68588 USA
[2] Utah State Univ, Dept Elect & Comp Engn, Logan, UT 84322 USA
基金
美国国家科学基金会;
关键词
smart grid; AMI; digital signature; downlink; ADVANCED METERING INFRASTRUCTURE; SMART; SECURITY;
D O I
10.1002/sec.1217
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advanced metering infrastructure (AMI) is the key to demand-side management system in smart grid. The communication over AMI consists of plenty important data, which have different security requirements. In this paper, we propose a hierarchical identity-based signature scheme (HIBaSS) to enhance the sender authentication for downlink transmission of AMI. The downlink in AMI mainly distributes control messages such as price and tariff information to the smart meters. Unlike the metering data in the uplink transmission that requires confidentiality, most of the control messages in downlink only require data integrity and sender authentication. Moreover, since most of the control messages are valid for a relatively long time period (e.g., an hour), more complicated but stronger cryptographic schemes can be applied in downlink AMI. In our proposed HIBaSS, each smart meter does not trust a signature from a single data aggregate point (DAP) although it includes the original signature from the authentication server (AS), because a smart meter has no way to verify a message or a DAP directly with the AS. Instead, a smart meter receives a group signature created by all the DAPs with certificates from the AS that prevents the messages from forgery, manipulation and repudiation. The performance evaluation also shows that HIBaSS is efficient enough to be applied in the AMI downlink transmission. Copyright (c) 2015John Wiley & Sons, Ltd.
引用
收藏
页码:2901 / 2908
页数:8
相关论文
共 50 条
  • [1] Scalable Hierarchical Identity-based Signature Scheme from Lattices
    Noh, Geontae
    Jeong, Ik Rae
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (12): : 3261 - 3273
  • [2] Identity-based puncturable signature scheme
    Yang D.
    Chen Y.
    Wei J.
    Hu X.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (12): : 17 - 26
  • [3] A Practical Identity-Based Signature Scheme
    LI Chenghua1
    2. Department of Mechanical and Aerospace Engineering
    WuhanUniversityJournalofNaturalSciences, 2008, (06) : 692 - 696
  • [4] Biometric identity-based signature scheme
    Hou, Hongxia
    Wang, Shangping
    Ma, Xiaojing
    Dai, Rendong
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (15): : 149 - 151
  • [5] Identity-Based Secret Signature Scheme
    Lee, Byoungcheon
    Li, Jin
    Kim, Kwangjo
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1080 - +
  • [6] On the security of an identity-based signature scheme
    Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37):
  • [7] A new hierarchical identity-based signature scheme from lattices in the standard model
    Tian, Miaomiao
    Huang, Liusheng
    Yang, Wei
    International Journal of Network Security, 2012, 14 (06) : 310 - 315
  • [8] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [9] New Efficient Hierarchical Identity-based Signature
    Wu, Qing
    Zhang, Leyou
    JOURNAL OF COMPUTERS, 2013, 8 (03) : 803 - 810
  • [10] Hierarchical Identity-Based Signature in Polynomial Rings
    Yang, Zhichao
    Duong, Dung H.
    Susilo, Willy
    Yang, Guomin
    Li, Chao
    Chen, Rongmao
    COMPUTER JOURNAL, 2020, 63 (10): : 1490 - 1499