Anonymous Authentication Protocol Based on Physical Unclonable Function and Elliptic Curve Cryptography for Smart Grid

被引:9
|
作者
Ma, Huanhuan [1 ]
Wang, Chenyu [1 ]
Xu, Guosheng [1 ]
Cao, Qiang [1 ]
Xu, Guoai [2 ]
Duan, Li [3 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Dept Natl Engn, Lab Mobile Network Secur, Beijing 100876, Peoples R China
[2] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen 518055, Peoples R China
[3] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Transp, Beijing 100044, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 04期
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Index Terms-Authentication; elliptic curve cryptography (ECC); key agreement; physical unclonable function (PUF); smart grid (SG); KEY AGREEMENT SCHEME; LIGHTWEIGHT; SECURITY;
D O I
10.1109/JSYST.2023.3289492
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart grid (SG) achieves more convenient and efficient power transmission through the rapid development of the information and communication technology. In addition to the transmission of electrical energy, the SG system also involves privacy and control information of service providers, which is closely related to people's livelihood. However, at present, the data in the SG system are transmitted in the form of plaintext, which does not have complete protection measures for entity privacy and communication data security. Focusing on preserving entity privacy and data security, this article proposes an anonymous secure authentication protocol (ASAP-SG) for the SG environment. Based on elliptic curve cryptography and physical unclonable function, ASAP-SG can realize authentication and key agreement between smart meters and service providers. The security of ASAP-SG has been verified with proverif tool and proven strictly under the real-or-random model. Furthermore, heuristic analysis manifests that ASAP-SG can successfully resist known security attacks. Finally, a fully comparison with the other five most advanced schemes reveals that ASAP-SG consumes the optimal computation cost on both smart meters and service providers and reduces the communication overhead by 33.3%-45.8%, on the basis of satisfying ten security objectives. These features make ASAP-SG more suitable for resource-constrained SG environment.
引用
收藏
页码:6425 / 6436
页数:12
相关论文
共 50 条
  • [1] Physical-Unclonable-Function-Based Lightweight Anonymous Authentication Protocol for Smart Grid
    Guo, Yu
    Li, Lifeng
    Jin, Xu
    An, Chunyan
    Wang, Chenyu
    Huang, Hairui
    ELECTRONICS, 2025, 14 (03):
  • [2] Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography
    Nyangaresi, Vincent Omollo
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 133
  • [3] Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography
    Nyangaresi, Vincent Omollo
    Journal of Systems Architecture, 2022, 133
  • [4] Authentication protocol based on elliptic curve cryptography
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
  • [5] A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEEE ACCESS, 2016, 4 : 4394 - 4407
  • [6] An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
    Mahmood, Khalid
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Kumari, Saru
    Li, Xiong
    Sangaiah, Arun Kumar
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 81 : 557 - 565
  • [7] On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    Chen, Long-Sheng
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018), 2018, : 88 - 91
  • [8] Elliptic curve cryptography based wireless authentication protocol
    Yongliang, Liu
    Gao, Wen
    Yao, Hongxun
    Yu, Xinghua
    International Journal of Network Security, 2007, 5 (03) : 327 - 337
  • [9] Deniable authentication protocol based on elliptic curve cryptography
    Hwang, MS
    Sung, PC
    Tzeng, SF
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67
  • [10] An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems
    K. Sowjanya
    Mou Dasgupta
    Sangram Ray
    International Journal of Information Security, 2020, 19 : 129 - 146