• DocumentCode
    653494
  • Title

    Robust and Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Smart Grids

  • Author

    Liping Zhang ; Shanyu Tang ; Yijing Jiang ; Zhao Ma

  • Author_Institution
    Secure Commun. Inst., China Univ. of Geosci., Wuhan, China
  • fYear
    2013
  • fDate
    20-23 Aug. 2013
  • Firstpage
    2089
  • Lastpage
    2093
  • Abstract
    Unlike traditional power networks, the smart grid power system has the ability to arrange the power supply in real time to the customer for active power consumption. Therefore, it can avoid excess electricity generation. In addition, based on the current power consumption, the power service providers can measure the expected power generation amount to stabilize the power system. Compared with traditional power networks, the characteristics of the smart grid power system make it easier to suffer from several types of security threats and attacks such as impersonation, eavesdropping and message modification etc. In order to strength the security of smart grid networks, a robust and efficient authentication protocol should provide to mutual authentication and session key agreement. Since the communications between the control center and the substation is protected by the Supervisory Control and Data Acquisition system, we focus on the secure communication between the substation and the smart appliances. In this paper, a robust and efficient authentication protocol based on elliptic curve cryptography is proposed to achieve mutual authentication and key agreement between the substation and the smart appliances. In addition, the proposed protocol not only resists replay attacks, impersonation attacks, and man-in-middle attacks, but also provides the session key security and the known-key security.
  • Keywords
    computer network security; cryptographic protocols; power engineering computing; power system measurement; public key cryptography; smart meters; smart power grids; substations; authentication protocol; elliptic curve cryptography; impersonation attack; known key security; man-in-middle attack; replay attack; session key agreement; session key security; smart appliance; smart power grid system; substation communication; supervisory control and data acquisition system; Authentication; Encryption; Home appliances; Protocols; Smart grids; Substations; authentication; elliptic curve; key agreement; smart grids;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing
  • Conference_Location
    Beijing
  • Type

    conf

  • DOI
    10.1109/GreenCom-iThings-CPSCom.2013.392
  • Filename
    6682402