4.5 Article

Secure and efficient mutual authentication protocol for smart grid under blockchain

期刊

PEER-TO-PEER NETWORKING AND APPLICATIONS
卷 14, 期 5, 页码 2681-2693

出版社

SPRINGER
DOI: 10.1007/s12083-020-01020-2

关键词

Smart grid; Authentication; Blockchain; Elliptic Curve Cryptography (ECC); Security; Privacy

资金

  1. JSPS Kiban(B) [18H03240]
  2. JSPS Kiban(C) [18K11298]
  3. Natural Science Foundation of Heilongjiang Province of China [LC2016024]
  4. Natural Science Foundation of the Jiangsu Higher Education Institutions [17KJB520044]
  5. Six Talent Peaks Project in Jiangsu Province [XYDXX-108]
  6. National Natural Science Foundation of China [62001126]

向作者/读者索取更多资源

Smart grid is recognized as the next-generation intelligent network that optimizes energy efficiency through bidirectional communication. However, security issues arise with its widespread deployment, especially regarding identity authentication. In this study, an authentication protocol combining blockchain, ECC, dynamic Join-and-Exit mechanism, and batch verification is proposed to address these issues, with assured security through computational hard problem assumptions.
Smart grid has been acknowledged as the next-generation intelligent network that optimizes energy efficiency. Primarily through a bidirectional communication channel, suppliers and users can dynamically adjust power transmission in real time. Nonetheless, many security issues occur with the widespread deployment of smart grid, e.g., centralized register authority and potential Distributed-Denial-of-Service (DDoS) attack. These existing problems threaten the availability of smart grid. In this paper, we mainly focus on solving some identity authentication issues remained in the smart grid. Combined with blockchain, Elliptic Curve Cryptography (ECC), dynamic Join-and-Exit mechanism and batch verification, a reliable and efficient authentication protocol is proposed for smart meters and utility centers. Simultaneously, the provable security of this protocol is assured by the computational hard problem assumptions. Experiment results show that our protocol has achieved security and performance improvement compared with the other ECC related schemes.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据