4.6 Article

An efficient authenticated key agreement scheme supporting privacy-preservation for smart grid communication

Journal

ELECTRIC POWER SYSTEMS RESEARCH
Volume 203, Issue -, Pages -

Publisher

ELSEVIER SCIENCE SA
DOI: 10.1016/j.epsr.2021.107630

Keywords

Authentication; Key agreement; Smart grid; Privacy-preservation

Funding

  1. Natural Science Basic Research Plan in Shaanxi Province of China [2019JM261]
  2. Foundation of China (Xi'an) Institute for Silk Road Research [2016SY19]
  3. Support Research Foundation of Xi'an University of Finance and Economics [18FCZD01]
  4. National Natural Science Foundation of China [61772404, U1836203]
  5. Key Research and Development Program of Shaanxi [2020ZDLGY08-08]

Ask authors/readers for more resources

Smart grid integrates information and communication technology with traditional grid architecture to enhance efficiency and reliability of power systems. A secure authentication method is essential to prevent data tampering in smart grid communications. The proposed AKA scheme in this paper supports privacy preservation and enables secure communication between SG devices and service providers.
As a branch of the next generation grid, smart grid(SG) combines information and communication technology with traditional grid architecture, which can greatly improve the efficiency and reliability of traditional power systems. However, the tampering of power data in smart grid communications may lead to unclear decisions related to power demand management. So, a secure authentication method which achieves SG device validation in different regions is a basic requirement. In the paper, we put forth a secure authentication key agreement (AKA) scheme supporting privacy-preservation in SG communications. This scheme allows SG devices and service provider(SP) to establish secret session key through mutual authentication. With the session key, the sensitive information can be exchanged securely. Through rigorous security and performance analysis, our proposed solution has stronger security functions and higher computational efficiency than related solutions in the smart grid.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available