4.7 Article

An Identity Based Authentication Protocol for Smart Grid Environment Using Physical Uncloneable Function

期刊

IEEE TRANSACTIONS ON SMART GRID
卷 12, 期 5, 页码 4426-4434

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TSG.2021.3072244

关键词

Protocols; Sensors; Intelligent sensors; Smart grids; Security; Authentication; Surveillance; Authentication protocol; mutual authentication; smart grid

向作者/读者索取更多资源

Smart grid plays a vital role in managing demand response management in modern smart cities by utilizing Information and Communication Technologies (ICTs). Sensors are widely deployed in the smart grid environment for surveillance, but they are vulnerable to cyber and physical attacks. This article proposes an identity-based authentication protocol using physical uncloneable function for power supply-line surveillance in the smart grid environment, which shows resilience to various attacks and offers enhanced security features.
Smart grid plays an important role in managing demand response management in modern smart city using Information and Communication Technologies (ICTs). In smart grid environment, sensors are widely used for surveillance. These are deployed on the high tension power supply lines which help to share the information to control center about line breakage or any other flaw. Besides the cyber-attacks, sensors may also experience physical attacks as they are deployed on high-tension power lines in an open environment. Moreover, an attacker can also impersonate the information exchanged between sensors, gateways and control centers. Therefore, the most indispensable requirement is to prevent these cyber-attacks and physical attacks so that a secure and efficient surveillance system can be maintained for smart grid environment. Motivated from these, in this article, we propose an identity based authentication protocol for power supply-line surveillance in smart grid environment using physical uncloneable function. The performance analysis shows that our proposed protocol is resilient to various cyber-attacks alongwith the physical attacks on sensors. The proposed protocol is efficient as it has less computation cost as compared to various related protocols. Although, the communication cost of devised protocol is slightly higher than some protocols but it also offers three added security features as compared to other related protocols.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据