A Multi-User, Single-Authentication Protocol for Smart Grid Architectures
In a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-03-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/20/6/1581 |
_version_ | 1811308174090698752 |
---|---|
author | Ahmed S. Alfakeeh Sarmadullah Khan Ali Hilal Al-Bayatti |
author_facet | Ahmed S. Alfakeeh Sarmadullah Khan Ali Hilal Al-Bayatti |
author_sort | Ahmed S. Alfakeeh |
collection | DOAJ |
description | In a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing from the smart grid devices to the utility servers, which may result in energy disruption or imbalance. Thus, an authentication is mandatory to efficiently authenticate the devices and the utility servers and avoid tampering attacks. To this end, a group authentication algorithm is proposed for preserving demand−response security in a smart grid. The proposed mechanism also provides a fine-grained access control feature where the utility server can only access a limited number of smart grid devices. The initial authentication between the utility server and smart grid device in a group involves a single public key operation, while the subsequent authentications with the same device or other devices in the same group do not need a public key operation. This reduces the overall computation and communication overheads and takes less time to successfully establish a secret session key, which is used to exchange sensitive information over an unsecured wireless channel. The resilience of the proposed algorithm is tested against various attacks using formal and informal security analysis. |
first_indexed | 2024-04-13T09:18:31Z |
format | Article |
id | doaj.art-1727d3d959794110b3812e571a90ec20 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-04-13T09:18:31Z |
publishDate | 2020-03-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-1727d3d959794110b3812e571a90ec202022-12-22T02:52:41ZengMDPI AGSensors1424-82202020-03-01206158110.3390/s20061581s20061581A Multi-User, Single-Authentication Protocol for Smart Grid ArchitecturesAhmed S. Alfakeeh0Sarmadullah Khan1Ali Hilal Al-Bayatti2Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi ArabiaSchool of Computer Science and Informatics, De Montfort University, Leicester LE1 9BH, UKSchool of Computer Science and Informatics, De Montfort University, Leicester LE1 9BH, UKIn a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing from the smart grid devices to the utility servers, which may result in energy disruption or imbalance. Thus, an authentication is mandatory to efficiently authenticate the devices and the utility servers and avoid tampering attacks. To this end, a group authentication algorithm is proposed for preserving demand−response security in a smart grid. The proposed mechanism also provides a fine-grained access control feature where the utility server can only access a limited number of smart grid devices. The initial authentication between the utility server and smart grid device in a group involves a single public key operation, while the subsequent authentications with the same device or other devices in the same group do not need a public key operation. This reduces the overall computation and communication overheads and takes less time to successfully establish a secret session key, which is used to exchange sensitive information over an unsecured wireless channel. The resilience of the proposed algorithm is tested against various attacks using formal and informal security analysis.https://www.mdpi.com/1424-8220/20/6/1581authenticationsecret session keysmart grid |
spellingShingle | Ahmed S. Alfakeeh Sarmadullah Khan Ali Hilal Al-Bayatti A Multi-User, Single-Authentication Protocol for Smart Grid Architectures Sensors authentication secret session key smart grid |
title | A Multi-User, Single-Authentication Protocol for Smart Grid Architectures |
title_full | A Multi-User, Single-Authentication Protocol for Smart Grid Architectures |
title_fullStr | A Multi-User, Single-Authentication Protocol for Smart Grid Architectures |
title_full_unstemmed | A Multi-User, Single-Authentication Protocol for Smart Grid Architectures |
title_short | A Multi-User, Single-Authentication Protocol for Smart Grid Architectures |
title_sort | multi user single authentication protocol for smart grid architectures |
topic | authentication secret session key smart grid |
url | https://www.mdpi.com/1424-8220/20/6/1581 |
work_keys_str_mv | AT ahmedsalfakeeh amultiusersingleauthenticationprotocolforsmartgridarchitectures AT sarmadullahkhan amultiusersingleauthenticationprotocolforsmartgridarchitectures AT alihilalalbayatti amultiusersingleauthenticationprotocolforsmartgridarchitectures AT ahmedsalfakeeh multiusersingleauthenticationprotocolforsmartgridarchitectures AT sarmadullahkhan multiusersingleauthenticationprotocolforsmartgridarchitectures AT alihilalalbayatti multiusersingleauthenticationprotocolforsmartgridarchitectures |