Smart Grid Communication Under Elliptic Curve Cryptography

被引:0
|
作者
Prabakaran, B. [1 ]
Sumithira, T. R. [2 ]
Nagaraj, V. [3 ]
机构
[1] Mahendra Engn Coll, Salem 637503, Tamil Nadu, India
[2] Govt Coll Engn, Salem 636011, Tamil Nadu, India
[3] Knowledge Inst Technol, Salem 637504, Tamil Nadu, India
来源
关键词
Smart grid; elliptic curve cryptography; key management; mutual authentication; MANAGEMENT; SYSTEM; TECHNOLOGIES; LIGHTWEIGHT; INTERNET;
D O I
10.32604/iasc.2023.029725
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart Grids (SGs) are introduced as a solution for standard power distribution. The significant capabilities of smart grids help to monitor consumer behaviors and power systems. However, the delay-sensitive network faces numerous challenges in which security and privacy gain more attention. Threats to transmitted messages, control over smart grid information and user privacy are the major concerns in smart grid security. Providing secure communication between the service provider and the user is the only possible solution for these security issues. So, this research work presents an efficient mutual authentication and key agreement protocol for smart grid communication using elliptic curve cryptography which is robust against security threats. A trust authority module is introduced in the security model apart from the user and service provider for authentication. The proposed approach performance is verified based on different security features, communication costs, and computation costs. The comparative analysis of experimental results demonstrates that the proposed authentication model attains better performance than existing state of art of techniques.
引用
收藏
页码:2333 / 2347
页数:15
相关论文
共 50 条
  • [21] Elliptic Curve Cryptography in Practice
    Bos, Joppe W.
    Halderman, J. Alex
    Heninger, Nadia
    Moore, Jonathan
    Naehrig, Michael
    Wustrow, Eric
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 157 - 175
  • [22] The State of Elliptic Curve Cryptography
    Neal Koblitz
    Alfred Menezes
    Scott Vanstone
    Designs, Codes and Cryptography, 2000, 19 : 173 - 193
  • [23] Elliptic-curve cryptography
    Fernandes, AD
    DR DOBBS JOURNAL, 1999, 24 (12): : 56 - +
  • [24] A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY
    Aydin, M. Ali
    Aydin, G. Zeynep
    ISTANBUL UNIVERSITY-JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING, 2006, 6 (02): : 211 - 221
  • [25] A survey of elliptic curve cryptography
    Istanbul University, Engineering Faculty, Computer Engineering Dept., 34320 Avcilar, Istanbul, Turkey
    Istanb. Univ. J. Electr. Electron. Eng., 2006, 2 (211-221):
  • [26] Research on elliptic curve cryptography
    Qiu, QZ
    Xiong, QX
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : 698 - 701
  • [27] Investigation into the Elliptic Curve Cryptography
    Fang, Xianjin
    Wu, Yanting
    2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), 2017, : 412 - 415
  • [28] Elliptic curve cryptography engineering
    Cilardo, A
    Coppolino, L
    Mazzocca, N
    Romano, L
    PROCEEDINGS OF THE IEEE, 2006, 94 (02) : 395 - 406
  • [29] Communication security and secret based on elliptic curve cryptography in packet networks
    Department of Biological Medical and Electronic Engineering, Fourth Military Medical University, Xi'an 710032, China
    不详
    Jisuanji Gongcheng, 2006, 21 (133-135):
  • [30] Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol
    Chochtoula, Despoina
    Ilias, Aristidis
    Stamatiou, Yannis C.
    Makris, Christos
    FUTURE INTERNET, 2022, 14 (08):