4.5 Article

Secure and efficient mutual authentication protocol for smart grid under blockchain

Journal

PEER-TO-PEER NETWORKING AND APPLICATIONS
Volume 14, Issue 5, Pages 2681-2693

Publisher

SPRINGER
DOI: 10.1007/s12083-020-01020-2

Keywords

Smart grid; Authentication; Blockchain; Elliptic Curve Cryptography (ECC); Security; Privacy

Funding

  1. JSPS Kiban(B) [18H03240]
  2. JSPS Kiban(C) [18K11298]
  3. Natural Science Foundation of Heilongjiang Province of China [LC2016024]
  4. Natural Science Foundation of the Jiangsu Higher Education Institutions [17KJB520044]
  5. Six Talent Peaks Project in Jiangsu Province [XYDXX-108]
  6. National Natural Science Foundation of China [62001126]

Ask authors/readers for more resources

Smart grid is recognized as the next-generation intelligent network that optimizes energy efficiency through bidirectional communication. However, security issues arise with its widespread deployment, especially regarding identity authentication. In this study, an authentication protocol combining blockchain, ECC, dynamic Join-and-Exit mechanism, and batch verification is proposed to address these issues, with assured security through computational hard problem assumptions.
Smart grid has been acknowledged as the next-generation intelligent network that optimizes energy efficiency. Primarily through a bidirectional communication channel, suppliers and users can dynamically adjust power transmission in real time. Nonetheless, many security issues occur with the widespread deployment of smart grid, e.g., centralized register authority and potential Distributed-Denial-of-Service (DDoS) attack. These existing problems threaten the availability of smart grid. In this paper, we mainly focus on solving some identity authentication issues remained in the smart grid. Combined with blockchain, Elliptic Curve Cryptography (ECC), dynamic Join-and-Exit mechanism and batch verification, a reliable and efficient authentication protocol is proposed for smart meters and utility centers. Simultaneously, the provable security of this protocol is assured by the computational hard problem assumptions. Experiment results show that our protocol has achieved security and performance improvement compared with the other ECC related schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available