A Certificateless Authenticated Key Agreement Scheme for the Power IoT

被引:9
|
作者
Cui, Wenchao [1 ]
Cheng, Rui [1 ]
Wu, Kehe [1 ]
Su, Yuling [1 ]
Lei, Yuqing [2 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing 102206, Peoples R China
[2] China Elect Power Res Inst, 15 Qinghe Xiaoying Rd, Beijing 100192, Peoples R China
基金
国家重点研发计划;
关键词
power IoT; PKI; CL-PKC; authenticated key agreement; eCK security model; PROTOCOL;
D O I
10.3390/en14196317
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Power Internet of Things (IoT) is the application of IoT technology in the field of power grid, which can better control all kinds of power equipment, power personnel and operating environment. However, access to mass terminals brings higher requirements for terminal authentication and key management for the power IoT. And the traditional public key infrastructure (PKI) and identity-based public key cryptography (IB-PKC) exist the problems of certificate management and key escrow. Therefore, the paper proposes a novel authenticated key agreement scheme based on the certificateless public key cryptography (CL-PKC) mechanism. In addition, the proposed scheme is proven with the improved extended Canetti-Krawczyk (eCK) security model. Finally, the implementation of the authenticated key agreement protocol is given based on the actual application requirement of the power IoT, and the analysis and comparison of the simulation demonstrates that the proposed scheme has higher efficiency and would be suitable for the power IoT.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] STCLA: An Efficient Certificateless Authenticated Key Agreement Scheme for the Internet of Vehicles
    Ma, Yuqian
    Li, Xinghua
    Shi, Wenbo
    Cheng, Qingfeng
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (04) : 4830 - 4841
  • [2] A Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare
    Ma, Yuqian
    Ma, Yongliu
    Liu, Yidan
    Cheng, Qingfeng
    CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 17 - 31
  • [3] Cryptanalysis of certificateless authenticated key agreement protocols
    Zeng R.
    Wang L.
    International Journal of Ad Hoc and Ubiquitous Computing, 2020, 34 (04): : 249 - 257
  • [4] Cryptanalysis of certificateless authenticated key agreement protocols
    Zeng, Runzhi
    Wang, Libin
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 34 (04) : 249 - 257
  • [5] Certificateless Authenticated Key Agreement for Decentralized WBANs
    Gervais, Mwitende
    Sun, Liang
    Wang, Ke
    Li, Fagen
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 268 - 290
  • [6] On the Security of Certificateless Authenticated Key Agreement Protocol
    Hou Meng-bo
    Xu Qiu-liang
    2009 IEEE INTERNATIONAL SYMPOSIUM ON IT IN MEDICINE & EDUCATION, VOLS 1 AND 2, PROCEEDINGS, 2009, : 974 - 979
  • [7] Hierarchical certificateless authenticated key agreement protocol
    Su H.
    Liu J.-W.
    Tao R.
    Tongxin Xuebao/Journal on Communications, 2016, 37 (07): : 161 - 171
  • [8] An Improved Certificateless Authenticated Key Agreement Protocol
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 26 - 30
  • [9] Certificateless two-party authenticated key agreement scheme for smart grid
    Deng, Lunzhi
    Gao, Ronghai
    INFORMATION SCIENCES, 2021, 543 : 143 - 156
  • [10] Certificateless two-party authenticated key agreement scheme for smart grid
    Deng, Lunzhi
    Gao, Ronghai
    Information Sciences, 2021, 543 : 143 - 156