HIBaSS: hierarchical identity-based signature scheme for AMI downlink transmission

被引:5
|
作者
Ye, Feng [1 ]
Qian, Yi [1 ]
Hu, Rose Qingyang [2 ]
机构
[1] Univ Nebraska, Dept Elect & Comp Engn, Lincoln, NE 68588 USA
[2] Utah State Univ, Dept Elect & Comp Engn, Logan, UT 84322 USA
基金
美国国家科学基金会;
关键词
smart grid; AMI; digital signature; downlink; ADVANCED METERING INFRASTRUCTURE; SMART; SECURITY;
D O I
10.1002/sec.1217
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advanced metering infrastructure (AMI) is the key to demand-side management system in smart grid. The communication over AMI consists of plenty important data, which have different security requirements. In this paper, we propose a hierarchical identity-based signature scheme (HIBaSS) to enhance the sender authentication for downlink transmission of AMI. The downlink in AMI mainly distributes control messages such as price and tariff information to the smart meters. Unlike the metering data in the uplink transmission that requires confidentiality, most of the control messages in downlink only require data integrity and sender authentication. Moreover, since most of the control messages are valid for a relatively long time period (e.g., an hour), more complicated but stronger cryptographic schemes can be applied in downlink AMI. In our proposed HIBaSS, each smart meter does not trust a signature from a single data aggregate point (DAP) although it includes the original signature from the authentication server (AS), because a smart meter has no way to verify a message or a DAP directly with the AS. Instead, a smart meter receives a group signature created by all the DAPs with certificates from the AS that prevents the messages from forgery, manipulation and repudiation. The performance evaluation also shows that HIBaSS is efficient enough to be applied in the AMI downlink transmission. Copyright (c) 2015John Wiley & Sons, Ltd.
引用
收藏
页码:2901 / 2908
页数:8
相关论文
共 50 条
  • [21] Identity-based signature scheme based on quadratic residues
    ZhenChuan Chai
    ZhenFu Cao
    XiaoLei Dong
    Science in China Series F: Information Sciences, 2007, 50 : 373 - 380
  • [22] Identity-based signature scheme based on quintic residues
    Dong, Xue-Dong
    Gao, Yuan
    PROCEEDINGS OF THE 2ND ANNUAL INTERNATIONAL CONFERENCE ON ELECTRONICS, ELECTRICAL ENGINEERING AND INFORMATION SCIENCE (EEEIS 2016), 2016, 117 : 836 - 841
  • [23] Identity-based signature scheme based on quadratic residues
    Chai ZhenChuan
    Cao ZhenFu
    Dong XiaoLei
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 373 - 380
  • [24] Identity-based signature scheme based on quadratic residues
    CHAI ZhenChuan
    Science in China(Series F:Information Sciences), 2007, (03) : 373 - 380
  • [25] A Secure and Effective Hierarchical Identity-Based Signature Scheme for ADS-B Systems
    Chen, Xin
    He, Debiao
    Peng, Cong
    Luo, Min
    Huang, Xinyi
    IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2024, 60 (04) : 5157 - 5168
  • [26] Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
    Weng, Jian
    Chen, Min-Rong
    Chen, Kefei
    Deng, Robert H.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 854 - 856
  • [27] Comparing Performance of Hierarchical Identity-Based Signature Schemes
    Chen, Peixin
    Wu, Yilun
    Su, Jinshu
    Wang, Xiaofeng
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (12): : 3181 - 3184
  • [28] Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme
    Behnia, Rouzbeh
    Tan, Syh-Yuan
    Heng, Swee-Huay
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 474 - 477
  • [29] An efficient identity-based signature scheme with provable security
    Yi, Peng
    Li, Jiguo
    Liu, Chengdong
    Han, Jinguang
    Wang, Huaqun
    Zhang, Yichen
    Chen, Yu
    INFORMATION SCIENCES, 2021, 576 : 790 - 799
  • [30] An identity-based proxy signature scheme from pairings
    Shim, Kyung-Ah
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 60 - 71