4.7 Article

An Identity Based Authentication Protocol for Smart Grid Environment Using Physical Uncloneable Function

Journal

IEEE TRANSACTIONS ON SMART GRID
Volume 12, Issue 5, Pages 4426-4434

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TSG.2021.3072244

Keywords

Protocols; Sensors; Intelligent sensors; Smart grids; Security; Authentication; Surveillance; Authentication protocol; mutual authentication; smart grid

Ask authors/readers for more resources

Smart grid plays a vital role in managing demand response management in modern smart cities by utilizing Information and Communication Technologies (ICTs). Sensors are widely deployed in the smart grid environment for surveillance, but they are vulnerable to cyber and physical attacks. This article proposes an identity-based authentication protocol using physical uncloneable function for power supply-line surveillance in the smart grid environment, which shows resilience to various attacks and offers enhanced security features.
Smart grid plays an important role in managing demand response management in modern smart city using Information and Communication Technologies (ICTs). In smart grid environment, sensors are widely used for surveillance. These are deployed on the high tension power supply lines which help to share the information to control center about line breakage or any other flaw. Besides the cyber-attacks, sensors may also experience physical attacks as they are deployed on high-tension power lines in an open environment. Moreover, an attacker can also impersonate the information exchanged between sensors, gateways and control centers. Therefore, the most indispensable requirement is to prevent these cyber-attacks and physical attacks so that a secure and efficient surveillance system can be maintained for smart grid environment. Motivated from these, in this article, we propose an identity based authentication protocol for power supply-line surveillance in smart grid environment using physical uncloneable function. The performance analysis shows that our proposed protocol is resilient to various cyber-attacks alongwith the physical attacks on sensors. The proposed protocol is efficient as it has less computation cost as compared to various related protocols. Although, the communication cost of devised protocol is slightly higher than some protocols but it also offers three added security features as compared to other related protocols.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available