Integrated Distributed Authentication Protocol for Smart Grid Communications

Article English OPEN
Saxena, N. ; Choi, B.J. (2016)

In the smart grid, an integrated distributed authen-\ud tication protocol is needed to not only securely manage the system but also efficiently authenticate many different entities for the communications. In addition, a lightweight authentication protocol is required to handle frequent authentications among billions of devices. Unfortunately, in the literature, there is no such integrated protocol that provides mutual authentication among the home environment, energy provider, gateways, and advanced metering infrastructure network. Therefore, in this paper, we propose a lightweight cloud-trusted authorities-based integrated (centrally controlled) distributed authentication protocol that provides mutual authentications among communicated entities in a distributed\ud manner. Based on certificateless cryptosystem, our protocol is lightweight and efficient even when there are invalid requests in a batch. Security and performance analysis show that the protocol provides privacy preservation, forward secrecy, semantic security,perfect key ambiguous, and protection against identity thefts while generating lower overheads in comparison with the existing protocols. Also, the protocol is secure against man-in-the-middle attacks,\ud redirection attacks, impersonation attacks, and denial-of-service attacks. Moreover, our protocol provides a complete resistance against flood-based denial-of-service attacks.
  • References (47)
    47 references, page 1 of 5

    [1] M. Fouda, Z. Fadlullah, N. Kato, R. Lu, and X. Shen, “A lightweight message authentication scheme for smart grid communications,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 675-685, Dec. 2011.

    [2] M. Balakrishnan, “Smart energy solutions for home area networks and grid-end applications,” in Proc. Smart Energy, 2012, pp. 67-73.

    [3] W. Wang and Z. Lu, “Cyber security in the smart grid: Survey and challenges,” Comput. Netw., vol. 57, pp. 1344-1371, 2013.

    [4] A. Bari, J. Jiang, W. Saad, and A. Jaekel, “Challenges in the smart grid applications: An overview,” Int. J. Distrib. Sens. Netw., vol. 2014, pp. 1-11, 2014.

    [5] Smart grid cyber security, potential threats, vulnerabilities and risks, California State Univ., Long Beach, CA, USA, May. 2012. [Online]. Available: www.energy.ca.gov/2012publications/CEC-500-2012- 047/CEC-500-2012-047.pdf. Accessed on: May. 22, 2015.

    [6] K. Kursawe and C. Peters, “Structural weaknesses in the open smart grid protocol,” IACR, Jun. 2015. [Online]. Available: https://eprint.iacr.org/2015/088.pdf. Accessed on: Jun. 26, 2015.

    [7] Application Note: CyberFence Protection for DNP3, 3eTI, Ultra Electronics, Aug. 2015. [Online]. Available: http://www.ultra3eti.com/assets/1/7/CyberFence_DNP3_Appliction_Note.pdf. Accessed on: Mar. 9, 2016.

    [8] Guidelines for Smart Grid Cyber Security, NISTIR7628, Aug. 2010. [Online]. Available: csrc.nist.gov/publications/nistir/ir7628/nistir7628_vol3.pdf. Accessed on: May. 24, 2015.

    [9] Report to NIST on the smart grid interoperability standards roadmap, Electric Power Research Institute, Aug. 2009. [Online]. Available: www.nist.gov/smartgrid/upload/Report_to_NIST_August10_2.pdf. Accessed on: Jun. 6, 2015.

    [10] A. Al-Majali, A. Vishwanathan, and C. Neuman, “Analyzing resiliency of the smart grid communication architectures under cyber attack,” in Proc. Cyber Security Exp. Test, 2012, pp. 1-8.

  • Metrics
    0
    views in OpenAIRE
    0
    views in local repository
    187
    downloads in local repository

    The information is available from the following content providers:

    From Number Of Views Number Of Downloads
    Bournemouth University Research Online - IRUS-UK 0 187
Share - Bookmark