Anonymous Key Agreement and Mutual Authentication Protocol for Smart Grids

被引:7
|
作者
Nyangaresi, Vincent Omollo [1 ]
Abduljabbar, Zaid Ameen [2 ,3 ]
Refish, Salah H. Abbdal [4 ]
Al Sibahee, Mustafa A. [5 ,6 ]
Abood, Enas Wahab [7 ]
Lu, Songfeng [3 ,8 ]
机构
[1] Tom Mboya Univ Coll, Fac Biol & Phys Sci, Homabay, Kenya
[2] Univ Basrah, Coll Educ Pure Sci, Dept Comp Sci, Basrah, Iraq
[3] Huazhong Univ Sci & Technol, Shenzhen Inst, Shenzhen, Peoples R China
[4] Imam Jaafar Al Sadiq Univ, Fac Informat Technol, Comp Tech Engn Dept, Baghdad, Iraq
[5] Shenzhen Technol Univ, Coll Big Data & Internet, Shenzhen 518118, Peoples R China
[6] Iraq Univ Coll, Comp Technol Engn Dept, Basrah, Iraq
[7] Univ Basrah, Coll Sci, Dept Math, Basrah, Iraq
[8] Huazhong Univ Sci & Technol, Hubei Engn Res Ctr Big Data Secur, Sch Cyber Sci & Engn, Wuhan, Peoples R China
关键词
Ephemerals; Mutual authentication; Nonce; Privacy leaks; Security; Session keys; Smart grids; ADVANCED METERING INFRASTRUCTURE; MANAGEMENT; SCHEME;
D O I
10.1007/978-3-030-98002-3_24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security and privacy protection of smart grid data exchanged over the open and public wireless communication channels is critical yet challenging in this environment. Conventionally, public key cryptography, group signatures, blind signatures, identity based schemes and elliptic curve cryptography could provide the much needed security and privacy. However, all these techniques either lack some smart grid security requirements or have intensive communication, storage and computation overheads. This obviously renders them inefficient for resource-constrained smart grid network devices. In this paper, an anonymous key agreement and authentication protocol to address some of these challenges is proposed. The simulation results showed that the proposed protocol is the most efficient in terms of bandwidth and computation requirements. It also required relatively less memory space during its entire execution than some of the related protocols. Further, it is demonstrated that it offers both backward and forward key secrecy, anonymity, and is robust against impersonation, session hijacking, privileged insider, side-channels, packet replays, packet injection and privacy leaks attacks.
引用
收藏
页码:325 / 340
页数:16
相关论文
共 50 条
  • [21] A New Mutual Authentication and Key Agreement Protocol for Mobile Communications
    Zhang, Juan
    Chen, Guang-hui
    Deng, Fang-min
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 9096 - +
  • [22] Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
    AL-Saraireh, Ja'afer M.
    Saraireh, Mohammad S.
    Saraireh, Saleh S.
    Al Nabhan, Mohammad M.
    [J]. JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2011, 11 (02): : 86 - 92
  • [23] Secure and Efficient Anonymous Authentication Key Agreement Scheme for Smart Industry
    Su, Xing
    Xie, Yong
    Wang, Hui
    Liu, Wei
    Shui, Dingyi
    [J]. 2022 IEEE 28TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, ICPADS, 2022, : 250 - 257
  • [24] An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol
    Reddy, Alavalapati Goutham
    Yoon, Eun-Jun
    Das, Ashok Kumar
    Yoo, Kee-Young
    [J]. SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, : 144 - 148
  • [25] An anonymous and secure authentication and key agreement scheme for session initiation protocol
    Hao Lin
    Fengtong Wen
    Chunxia Du
    [J]. Multimedia Tools and Applications, 2017, 76 : 2315 - 2329
  • [26] Provably secure anonymous authentication key agreement protocol for multicast group
    Feng T.
    Liu Y.-Y.
    Ma J.-F.
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 40 (02): : 273 - 277
  • [27] An anonymous and secure authentication and key agreement scheme for session initiation protocol
    Lin, Hao
    Wen, Fengtong
    Du, Chunxia
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (02) : 2315 - 2329
  • [28] An anonymous mutual authentication and key agreement scheme in WMSN using physiological data
    Rai, Shanvendra
    Paul, Rituparna
    Banerjee, Subhasish
    Meher, Preetisudha
    [J]. WIRELESS NETWORKS, 2024, 30 (04) : 2733 - 2752
  • [29] A User Anonymous Mutual Authentication Protocol
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    Das, Ashok Kumar
    Odelu, Vanga
    Khan, Muhammad Khurram
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (09): : 4508 - 4528
  • [30] An Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card
    Liao, Chiu-Hsiung
    Chen, Ho-Chan
    Wang, Ching-Te
    [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (02): : 117 - 124