Anonymous Authentication Protocol Based on Physical Unclonable Function and Elliptic Curve Cryptography for Smart Grid

被引:9
|
作者
Ma, Huanhuan [1 ]
Wang, Chenyu [1 ]
Xu, Guosheng [1 ]
Cao, Qiang [1 ]
Xu, Guoai [2 ]
Duan, Li [3 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Dept Natl Engn, Lab Mobile Network Secur, Beijing 100876, Peoples R China
[2] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen 518055, Peoples R China
[3] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Transp, Beijing 100044, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 04期
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Index Terms-Authentication; elliptic curve cryptography (ECC); key agreement; physical unclonable function (PUF); smart grid (SG); KEY AGREEMENT SCHEME; LIGHTWEIGHT; SECURITY;
D O I
10.1109/JSYST.2023.3289492
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart grid (SG) achieves more convenient and efficient power transmission through the rapid development of the information and communication technology. In addition to the transmission of electrical energy, the SG system also involves privacy and control information of service providers, which is closely related to people's livelihood. However, at present, the data in the SG system are transmitted in the form of plaintext, which does not have complete protection measures for entity privacy and communication data security. Focusing on preserving entity privacy and data security, this article proposes an anonymous secure authentication protocol (ASAP-SG) for the SG environment. Based on elliptic curve cryptography and physical unclonable function, ASAP-SG can realize authentication and key agreement between smart meters and service providers. The security of ASAP-SG has been verified with proverif tool and proven strictly under the real-or-random model. Furthermore, heuristic analysis manifests that ASAP-SG can successfully resist known security attacks. Finally, a fully comparison with the other five most advanced schemes reveals that ASAP-SG consumes the optimal computation cost on both smart meters and service providers and reduces the communication overhead by 33.3%-45.8%, on the basis of satisfying ten security objectives. These features make ASAP-SG more suitable for resource-constrained SG environment.
引用
收藏
页码:6425 / 6436
页数:12
相关论文
共 50 条
  • [31] Low complexity smart grid security protocol based on elliptic curve cryptography, biometrics and hamming distance
    Mutlaq, Keyan Abdul-Aziz
    Nyangaresi, Vincent Omollo
    Omar, Mohd Adib
    Abduljabbar, Zaid Ameen
    Abduljaleel, Iman Qays
    Ma, Junchao
    Al Sibahee, Mustafa A.
    PLOS ONE, 2024, 19 (01):
  • [32] Smart card authentication model based on elliptic curve cryptography in IoT networks
    Joy, A. Shakeela
    Ravi, R.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (05) : 548 - 569
  • [33] Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids
    Zhang, Liping
    Tang, Shanyu
    Luo, He
    PLOS ONE, 2016, 11 (03):
  • [34] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    R. Arshad
    N. Ikram
    Multimedia Tools and Applications, 2013, 66 : 165 - 178
  • [35] Construction of elliptic curve cryptography-based authentication protocol for internet of things
    Chhikara, Deepak
    Rana, Saurabh
    Mishra, Ankita
    Mishra, Dheerendra
    SECURITY AND PRIVACY, 2022, 5 (04)
  • [36] SLEC: A Novel Serverless RFID Authentication Protocol Based on Elliptic Curve Cryptography
    Baashirah, Rania
    Abuzneid, Abdelshakour
    ELECTRONICS, 2019, 8 (10)
  • [37] A secure authentication scheme for session initiation protocol based on elliptic curve cryptography
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Naqvi, Husnain
    Sher, Muhammad
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1961 - 1966
  • [38] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    Arshad, R.
    Ikram, N.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) : 165 - 178
  • [39] An anonymous authentication and key exchange protocol in smart grid
    Luo, Yi
    Zheng, Wei-Min
    Chen, Yeh-Cheng
    Journal of Network Intelligence, 2021, 6 (02): : 206 - 215
  • [40] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530