Ultra-Lightweight Authentication Protocol Based on Distribution Terminal Fingerprint

Article Preview

Abstract:

With the development of information technology in power industry, information security of the distribution automation system is facing increasing challenge. To meet the device authentication demand and the limited resources in power distribution terminal, the concept of distribution terminal fingerprint is presented according to the physical and behavioral features in terminal. And then, an ultra-lightweight mutual authentication protocol based on the message authentication code algorithm is proposed. The message authentication code of the messages sent by both communication parties is calculated with the distribution terminal fingerprint as the key to achieve mutual authentication of the terminal and the master station without any cryptosystems. Finally, security and performance analysis is given. The results show that the proposed protocol can provide mutual authentication of the communicating parties, resist several attacks with small amount of calculation and simple protocol. Therefore, it can meet the resource requirements of the distribution terminal.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 616-618)

Pages:

2142-2148

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Jun Zhang, Shiqi Gao, Yang Hu, et al. Study on Mixed Communication Networking in Power Distribution Access Network .Telecommunications for Electric Power System, Vol.32(2011), pp.36-40. In Chinsese.

Google Scholar

[2] Lee Deok Gyu, Han Jong-Wook, Park Doo Soon and Lee Im Yeong. Intelligent pervasive network authentication: S/Key based device authentication. Proceedings of 6th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, United states, 10-13 January, pp.1-5(2009).

DOI: 10.1109/ccnc.2009.4784994

Google Scholar

[3] Yinxiang Li, Xiaoping Li, Lizhi Zhong, Yuhuan Jing. Research on the S / KEY one-time password authentication system and its application in banking and financial systems. Proceedings of 6th International Conference on Networked Computing and Advanced Information Management, Seoul, Korea, 16-18 August, pp.172-175(2010).

Google Scholar

[4] Junwei Zhang, Chao Yang, Jianfeng Ma. Protocol derivation system for the Needham-Schroeder family. Proceedings of the 6th International ICST Conference on Communications and Networking, Harbin, China, 17-19 August, pp.836-840 (2011).

DOI: 10.1109/chinacom.2011.6158270

Google Scholar

[5] Juan Wang, Mancheng Cao, Yuankang Fang. An improved kerberos intra-domain authentication protocol based-on certificateless public-key cryptography. Advances in Intelligent and Soft Computing, Vol. 129(2011), pp.489-496.

DOI: 10.1007/978-3-642-25986-9_77

Google Scholar

[6] Yun Liu, Ziyao Cheng, Chinchen Chang and Zhenjiang Zhang. A secure dynamic identity based remote user authentication scheme using secret sharing. Journal of Internet Technology, Vol. 13(2012), pp.463-469.

Google Scholar

[7] Xiong Li, Yongping Xiong, Jian Ma and Wendong Wang. An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications, Vol. 35(2012), pp.763-769.

DOI: 10.1016/j.jnca.2011.11.009

Google Scholar

[8] Li Wang, Yong Zhang, Yue Ma, et al. A novel universal authentication protocol based on combined public key in heterogeneous networks. Journal of China Universities of Posts and Telecommunications, Vol. 17(2010), n SUPPL, pp.1-5.

DOI: 10.1016/s1005-8885(09)60616-6

Google Scholar

[9] Ahmad Nazrul M, Yaacob, Asrul H., Khorram, Alireza, et al. Comparative analysis and implementation of certificateless based authentication scheme. Communications in Computer and Information Science, Vol.251(2011), PART 1, pp.151-162.

DOI: 10.1007/978-3-642-25327-0_14

Google Scholar

[10] Peng Peng, Yiming Zhao, Wei Han, et al. Ultra-lightweight RFID Mutual Authentication Protocol. Computer Engineering, Vol. 37(2011), pp.140-142. In Chinese.

Google Scholar

[11] Min Zhu. A Survey on Ultra-lightweight Security Mechanism in Low-cost RFID. Computer Knowledge and Technology, Vol.6(2010),pp.9221-9224. In Chinsese.

Google Scholar

[12] Keting Jia. Cryptanalysis of CBC-MAC and Hash Function Related Algorithm. Shandong University Doctoral Dissertation. (2010). In Chinese.

Google Scholar