4.7 Article

An elliptic curve cryptography based lightweight authentication scheme for smart grid communication

出版社

ELSEVIER SCIENCE BV
DOI: 10.1016/j.future.2017.05.002

关键词

Smart grid; Authentication; Elliptic curve cryptography; Lightweight cryptography; BAN logic; ProVerif

资金

  1. National Natural Science Foundation of China [61300220]
  2. Scientific Research Fund of Hunan Provincial Education Department [16B089]

向作者/读者索取更多资源

An evolved grid system, Smart Grid, enables appropriate adjustments in the amount of electricity generation by providing the capability to monitor the consumption behavior of customers. This advance grid system can help to promote cultural heritage because it is responsible to provide un-interruptible and reliable power supply in smart way. Smart grid is one of the key component for enabling smart cities and obviously, any city with more smart amenities will ultimately attract visitors to come and visit rich heritage. In smart grid, Supervisory Control and Data Acquisition (SCDA) system is responsible for keeping the underlying communication secure between substations and corresponding control center. While communication between customers and substations needs more enhancements as the existing protocols do not meet the comprehensive security requirements of smart grid. Due to the complex nature of smart grid and diverse security requirements, designing a suitable authentication scheme is a challenging task. For delay sensitive networks like smart grid, an ideal authentication scheme should withstand against all known security attacks, involving lightweight operations with trivial computations. ECC provides same security level with much less key sizes as compared with other security techniques such as RSA, DSA and DH. Keeping in mind the complex and delay sensitive nature of smart grid, a lightweight ECC based authentication scheme is proposed here. The proposed scheme not only provides mutual authentication with low computation and communication cost but also withstand against all known security attacks. (C) 2017 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据