Anonymous security authentication protocol based on identity encryption for cyber-physical power system

被引:0
|
作者
Li, Xue [1 ]
Chen, Jiale [1 ,3 ]
Jiang, Cheng [1 ]
Du, Dajun [1 ]
Zhu, Yongsheng [2 ]
机构
[1] Shanghai Univ, Sch Mechatron Engn & Automat, Shanghai Key Lab Power Stn Automat Technol, Shanghai, Peoples R China
[2] Zhongyuan Univ Technol, Sch Elect & Informat Engn, Zhengzhou, Peoples R China
[3] Shanghai Univ, Sch Mechatron Engn & Automat, Shanghai Key Lab Power Stn Automat Technol, Shanghai 200072, Peoples R China
基金
美国国家科学基金会;
关键词
Cyber-physical power system (CPPS); smart devices; identity-based cryptograph; authentication protocol; PRIVACY-PRESERVING AUTHENTICATION; LIGHTWEIGHT; SCHEME; EFFICIENT; SIGNATURE; INTERNET;
D O I
10.1177/01423312231151642
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of wireless technology, the deep coupling of cyber-physical power system (CPPS) is accelerated, and the openness of communication network makes the importance of secure information transmission increasingly prominent. As the communication module of CPPS, smart devices play an important role in data transmission, to ensure reliable and confident communication between the two layers. This paper presents a design for a secure and efficient smart devices utilizing anonymous security authentication and negotiation protocol supported by the identity-based cryptograph, elliptic curve cryptography, and digital signature algorithm are mainly used for that purpose. The security of the protocol is proved and validated under the random oracle model. The analysis show that the protocol has security performance such as bidirectional authentication, privacy protection, and replay attacks resistance; moreover, it has less computation and communication cost.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Identity-Based Edge Computing Anonymous Authentication Protocol
    Kang, Naixin
    Ning, Zhenhu
    Zhang, Shiqiang
    Rehman, Sadaqat Ur
    Waqas
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 3931 - 3943
  • [42] An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System
    Kure, Halima Ibrahim
    Islam, Shareeful
    Razzaque, Mohammad Abdur
    APPLIED SCIENCES-BASEL, 2018, 8 (06):
  • [43] Model based security verification of Cyber-Physical System based on Petrinet: A case study of Nuclear power plant
    Tripathi, Dipty
    Singh, Lalit Kumar
    Tripathi, Anil Kumar
    Chaturvedi, Amrita
    ANNALS OF NUCLEAR ENERGY, 2021, 159
  • [44] A Review of Cyber-Physical Energy System Security Assessment
    Rasmussen, Theis B.
    Yang, Guangya
    Nielsen, Arne H.
    Dong, Zhaoyang
    2017 IEEE MANCHESTER POWERTECH, 2017,
  • [45] Research on Security Defense of Coupled Transportation and Cyber-Physical Power System Based on the Static Bayesian Game
    Yang, Zian
    Xiang, Yueping
    Liao, Kai
    Yang, Jianwei
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (03) : 3571 - 3583
  • [46] Cyber-physical system security for networked industrial processes
    Huang S.
    Zhou C.-J.
    Yang S.-H.
    Qin Y.-Q.
    International Journal of Automation and Computing, 2015, 12 (06) : 567 - 578
  • [47] Research on Security Estimation and Control of Cyber-Physical System
    Cai, Xiaobo
    Han, Ke
    Li, Yan
    Wang, Huihui
    Zhang, Jiajin
    Zhang, Yue
    2020 IEEE 39TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2020,
  • [48] Countermeasures to Enhance Cyber-Physical System Security and Safety
    Sabaliauskaite, Giedre
    Mathur, Aditya P.
    2014 38TH ANNUAL IEEE INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW 2014), 2014, : 13 - 18
  • [49] A Review of Cyber-Physical Security in the Generation System of the Grid
    Siu, Jun Yen
    Panda, Sanjib Kumar
    IECON 2020: THE 46TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2020, : 1520 - 1525
  • [50] Cyber-physical System Security for Networked Industrial Processes
    Shuang Huang
    Chun-Jie Zhou
    Shuang-Hua Yang
    Yuan-Qing Qin
    International Journal of Automation and Computing, 2015, (06) : 567 - 578