4.8 Article

ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 15, Issue 12, Pages 6572-6582

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2019.2922697

Keywords

Authentication; Protocols; Smart meters; Load management; Smart devices; Data analysis; Authentication; automated validation of internet security protocols and applications (AVISPA); cyber-physical-social systems (CPSS); real-or-random (RoR) model; security; smart grid (SG)

Ask authors/readers for more resources

The devices in smart grids (SG) transfer data to a utility center (UC) or to the remote control centers. Using these data, the energy balance is maintained between consumers and the grid. However, this flow of data may be tampered by the intruders, which may result in energy imbalance. Thus, a robust authentication protocol, which supports dynamic SG device validation and UC addition, both in the local and global domains, is an essential requirement. For this reason, ECCAuth: a novel elliptic curve cryptography-based authentication protocol is proposed in this paper for preserving demand response in SG. This protocol allows establishment of a secret session key between an SG device and a UC after mutual authentication. Using this key, they can securely communicate for exchanging the sensitive information. The formal security analysis, informal security analysis, and formal security verification show that ECCAuth can withstand several known attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available