Journal
PEER-TO-PEER NETWORKING AND APPLICATIONS
Volume 14, Issue 5, Pages 2681-2693Publisher
SPRINGER
DOI: 10.1007/s12083-020-01020-2
Keywords
Smart grid; Authentication; Blockchain; Elliptic Curve Cryptography (ECC); Security; Privacy
Funding
- JSPS Kiban(B) [18H03240]
- JSPS Kiban(C) [18K11298]
- Natural Science Foundation of Heilongjiang Province of China [LC2016024]
- Natural Science Foundation of the Jiangsu Higher Education Institutions [17KJB520044]
- Six Talent Peaks Project in Jiangsu Province [XYDXX-108]
- National Natural Science Foundation of China [62001126]
Ask authors/readers for more resources
Smart grid is recognized as the next-generation intelligent network that optimizes energy efficiency through bidirectional communication. However, security issues arise with its widespread deployment, especially regarding identity authentication. In this study, an authentication protocol combining blockchain, ECC, dynamic Join-and-Exit mechanism, and batch verification is proposed to address these issues, with assured security through computational hard problem assumptions.
Smart grid has been acknowledged as the next-generation intelligent network that optimizes energy efficiency. Primarily through a bidirectional communication channel, suppliers and users can dynamically adjust power transmission in real time. Nonetheless, many security issues occur with the widespread deployment of smart grid, e.g., centralized register authority and potential Distributed-Denial-of-Service (DDoS) attack. These existing problems threaten the availability of smart grid. In this paper, we mainly focus on solving some identity authentication issues remained in the smart grid. Combined with blockchain, Elliptic Curve Cryptography (ECC), dynamic Join-and-Exit mechanism and batch verification, a reliable and efficient authentication protocol is proposed for smart meters and utility centers. Simultaneously, the provable security of this protocol is assured by the computational hard problem assumptions. Experiment results show that our protocol has achieved security and performance improvement compared with the other ECC related schemes.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available