Anonymous Authentication for Smart Grid Communications

Article Preview

Abstract:

The smart grid is a network of computers and power infrastructures that monitor and manage energy usage and uses intelligent transmission and distribution networks to deliver electricity for improving the electric system’s reliability and efficiency. With grid controls, energy transmission management could be enhanced and resilience to control-system failures would be increased. Processing chips and storage units have been embedded into traditional electricity meters, so that they are capable of performing smart functions, called smart meters. Then, smart meters communicate with electrical appliances at home as well as the generation and management facilities at the power companies. Although deploying the smart grid has numerous social and technical benefits, several security and privacy concerns arise. Attackers might compromise smart meters, eavesdrop the communication, or hack into the power company’s database, to access power consumption data of the victim, from which they learn about the victim’s daily activities. Recently, various security and privacy vulnerabilities and threats have been studied in the research literature, however, most of the problems remain yet to be addressed. Therefore, it is crucial to design secure smart grid communication protocols that could prevent all possible security vulnerabilities. In this paper, we propose an anonymous authentication protocol for securing communication among various smart meters of the smart grid. The proposed protocol can achieve key agreement between smart meters and fully protect user privacy with low computation overhead. In addition, the analysis shows that the proposed protocol can satisfy the desirable security requirements and resist several notorious attacks.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

364-368

Citation:

Online since:

December 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] U.S. Energy Information Administration, Annual Energy Outlook 2010 (2010), pp.65-69.

Google Scholar

[2] P. McDaniel and S. McLaughlin, IEEE Security & Privacy. 7, 75 (2009).

Google Scholar

[3] H. Khurana, M. Hadley, N. Lu, and D. A. Frincke, IEEE Security & Privacy. 8, 81 (2010).

Google Scholar

[4] A. R. Metke and R. L. Ekl, IEEE Transactions on Smart Grid. 1, 99 (2010).

Google Scholar

[5] H. K. H. So, S. H. M. Kwok, E. Y. Lam, and K. S. Lui, Zero-configuration identity-based signcryption scheme for smart grid, The 1st IEEE International Conference on Smart Grid Communications, Maryland, U.S.A., IEEE Press (2010), pp.321-326.

DOI: 10.1109/smartgrid.2010.5622061

Google Scholar

[6] F. Li, B. Luo, and P. Liu, Secure information aggregation for smart grids using homomorphic encryption, The 1st IEEE International Conference on Smart Grid Communications, Maryland, U.S.A., IEEE Press (2010), pp.327-332.

DOI: 10.1109/smartgrid.2010.5622064

Google Scholar

[7] Z. Yang, S. Yu, W. Lou, and C. Liu, IEEE Transactions on Smart Grid. DOI: 10. 1109/TSG. 2011. 2140343 (2011).

Google Scholar

[8] M. M. Fouda, Z. Md. Fadlullah, N. Kato, R. Lu, and X. Shen, Towards a light-weight message authentication mechanism tailored for smart grid communications, The 1st IEEE International Workshop on Security in Computers, Networking and Communications, Shanghai, China, IEEE Press (2011).

DOI: 10.1109/infcomw.2011.5928776

Google Scholar

[9] M. M. Fouda, Z. Md. Fadlullah, N. Kato, R. Lu, and X. Shen, IEEE Transactions on Smart Grid. In Press (2011).

Google Scholar

[10] A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology, Lecture Notes in Computer Science (1984), pp.47-53.

DOI: 10.1007/3-540-39568-7_5

Google Scholar

[11] S. S. Al-Riyami and K. G. Paterson, Certificateless public key cryptography, Advances in Cryptology: Asiacrypt, Lecture Notes in Computer Science (2003), pp.452-473.

DOI: 10.1007/978-3-540-40061-5_29

Google Scholar

[12] D. Fiore, R. Gennaro, and N. P. Smart, Constructing certificateless encryption and ID-based encryption from ID-based key agreement, The 4th International Conference on Pairing-based Cryptography, Ishikawa, Japan (2010).

DOI: 10.1007/978-3-642-17455-1_11

Google Scholar

[13] G. Yang and C. H. Tan, Theoretical Computer Science. 12, 662 (2011).

Google Scholar

[14] D. R. Stinson, Cryptography: Theory and Practice, Boca Raton, FL, Chapman & Hall/CRC (2006).

Google Scholar