A Multi-User, Single-Authentication Protocol for Smart Grid Architectures

In a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing...

Full description

Bibliographic Details
Main Authors: Ahmed S. Alfakeeh, Sarmadullah Khan, Ali Hilal Al-Bayatti
Format: Article
Language:English
Published: MDPI AG 2020-03-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/20/6/1581
_version_ 1811308174090698752
author Ahmed S. Alfakeeh
Sarmadullah Khan
Ali Hilal Al-Bayatti
author_facet Ahmed S. Alfakeeh
Sarmadullah Khan
Ali Hilal Al-Bayatti
author_sort Ahmed S. Alfakeeh
collection DOAJ
description In a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing from the smart grid devices to the utility servers, which may result in energy disruption or imbalance. Thus, an authentication is mandatory to efficiently authenticate the devices and the utility servers and avoid tampering attacks. To this end, a group authentication algorithm is proposed for preserving demand−response security in a smart grid. The proposed mechanism also provides a fine-grained access control feature where the utility server can only access a limited number of smart grid devices. The initial authentication between the utility server and smart grid device in a group involves a single public key operation, while the subsequent authentications with the same device or other devices in the same group do not need a public key operation. This reduces the overall computation and communication overheads and takes less time to successfully establish a secret session key, which is used to exchange sensitive information over an unsecured wireless channel. The resilience of the proposed algorithm is tested against various attacks using formal and informal security analysis.
first_indexed 2024-04-13T09:18:31Z
format Article
id doaj.art-1727d3d959794110b3812e571a90ec20
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-04-13T09:18:31Z
publishDate 2020-03-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-1727d3d959794110b3812e571a90ec202022-12-22T02:52:41ZengMDPI AGSensors1424-82202020-03-01206158110.3390/s20061581s20061581A Multi-User, Single-Authentication Protocol for Smart Grid ArchitecturesAhmed S. Alfakeeh0Sarmadullah Khan1Ali Hilal Al-Bayatti2Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi ArabiaSchool of Computer Science and Informatics, De Montfort University, Leicester LE1 9BH, UKSchool of Computer Science and Informatics, De Montfort University, Leicester LE1 9BH, UKIn a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing from the smart grid devices to the utility servers, which may result in energy disruption or imbalance. Thus, an authentication is mandatory to efficiently authenticate the devices and the utility servers and avoid tampering attacks. To this end, a group authentication algorithm is proposed for preserving demand−response security in a smart grid. The proposed mechanism also provides a fine-grained access control feature where the utility server can only access a limited number of smart grid devices. The initial authentication between the utility server and smart grid device in a group involves a single public key operation, while the subsequent authentications with the same device or other devices in the same group do not need a public key operation. This reduces the overall computation and communication overheads and takes less time to successfully establish a secret session key, which is used to exchange sensitive information over an unsecured wireless channel. The resilience of the proposed algorithm is tested against various attacks using formal and informal security analysis.https://www.mdpi.com/1424-8220/20/6/1581authenticationsecret session keysmart grid
spellingShingle Ahmed S. Alfakeeh
Sarmadullah Khan
Ali Hilal Al-Bayatti
A Multi-User, Single-Authentication Protocol for Smart Grid Architectures
Sensors
authentication
secret session key
smart grid
title A Multi-User, Single-Authentication Protocol for Smart Grid Architectures
title_full A Multi-User, Single-Authentication Protocol for Smart Grid Architectures
title_fullStr A Multi-User, Single-Authentication Protocol for Smart Grid Architectures
title_full_unstemmed A Multi-User, Single-Authentication Protocol for Smart Grid Architectures
title_short A Multi-User, Single-Authentication Protocol for Smart Grid Architectures
title_sort multi user single authentication protocol for smart grid architectures
topic authentication
secret session key
smart grid
url https://www.mdpi.com/1424-8220/20/6/1581
work_keys_str_mv AT ahmedsalfakeeh amultiusersingleauthenticationprotocolforsmartgridarchitectures
AT sarmadullahkhan amultiusersingleauthenticationprotocolforsmartgridarchitectures
AT alihilalalbayatti amultiusersingleauthenticationprotocolforsmartgridarchitectures
AT ahmedsalfakeeh multiusersingleauthenticationprotocolforsmartgridarchitectures
AT sarmadullahkhan multiusersingleauthenticationprotocolforsmartgridarchitectures
AT alihilalalbayatti multiusersingleauthenticationprotocolforsmartgridarchitectures