Multicast Authentication in the Smart Grid With One-Time Signature

被引:108
|
作者
Li, Qinghua [1 ]
Cao, Guohong [1 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
关键词
Authentication; multicast; one-time signature; security; smart grid; NETWORKS;
D O I
10.1109/TSG.2011.2138172
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Multicast has been envisioned to be useful in many smart grid applications such as demand-response, wide area protection, in-substation protection and various operation and control. Since the multicast messages are related to critical control, authentication is necessary to prevent message forgery attacks. In this paper, we first identify the requirements of multicast communication and multicast authentication in the smart grid. Based on these requirements, we find that one-time signature based multicast authentication is a promising solution, due to its short authentication delay and low computation cost. However, existing one-time signatures are not designed for the smart grid and they may have high storage and bandwidth overhead. To address this problem, we propose a new one-time signature scheme which can reduce the storage cost by a factor of 8 and reduce the signature size by 40% compared with existing schemes. Thus, our scheme is more appropriate for smart grid applications where the receivers have limited storage (e. g., home appliances and field devices) or where data communication is frequent and short (e. g., phasor data). These gains are at the cost of increased computations in signature generation and/or verification and fortunately our scheme can flexibly allocate the computations between the sender and receiver based on their computing resources. We formulate the computation allocation as a nonlinear integer programming problem to minimize the signing cost under a certain verification cost and propose a heuristic solution to solve it.
引用
收藏
页码:686 / 696
页数:11
相关论文
共 50 条
  • [31] GENERATION OF ONE-TIME KEYS FOR SINGLE LINE AUTHENTICATION
    Hossain, Sazzad
    Goh, Alwyn
    Sin, Cheong Hoon
    Win, Lee Kay
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [32] Simple and Effective One-time Password Authentication Scheme
    Jiang, Xiangyang
    Ling, Jie
    2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 529 - 531
  • [33] Sausage-Style One-Time Authentication Schemes
    Suga, Yuji
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2017, 2018, 12 : 658 - 667
  • [34] AUTHENTICATION ENCRYPTION CRYPTOSYSTEM WITH DERIVED ONE-TIME KEYS
    Zubov, A. Yu
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2020, (50): : 51 - 61
  • [35] A Cloud Authentication Protocol using One-Time Pad
    Sim, Lexus Jun Hong
    Ren, Shu Qin
    Keoh, Sye Loong
    Aung, Khin Mi Mi
    PROCEEDINGS OF THE 2016 IEEE REGION 10 CONFERENCE (TENCON), 2016, : 2513 - 2516
  • [36] Cryptanalysis of a code-based one-time signature
    Deneuville, Jean-Christophe
    Gaborit, Philippe
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (09) : 1857 - 1866
  • [37] Revocable One-Time Ring Signature from Pairings
    Han, Xu
    Zhang, Dawei
    Huang, Zongmin
    Yao, Shuang
    Wu, Zuodong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [38] One-time proxy signature based on quantum cryptography
    Tian-Yin Wang
    Zong-Li Wei
    Quantum Information Processing, 2012, 11 : 455 - 463
  • [39] Forgery attack on one-time proxy signature and the improvement
    Chun-Wei Yang
    Yi-Ping Luo
    Tzonelih Hwang
    Quantum Information Processing, 2014, 13 : 2007 - 2016
  • [40] Cryptanalysis of a code-based one-time signature
    Jean-Christophe Deneuville
    Philippe Gaborit
    Designs, Codes and Cryptography, 2020, 88 : 1857 - 1866