DocumentCode
653494
Title
Robust and Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Smart Grids
Author
Liping Zhang ; Shanyu Tang ; Yijing Jiang ; Zhao Ma
Author_Institution
Secure Commun. Inst., China Univ. of Geosci., Wuhan, China
fYear
2013
fDate
20-23 Aug. 2013
Firstpage
2089
Lastpage
2093
Abstract
Unlike traditional power networks, the smart grid power system has the ability to arrange the power supply in real time to the customer for active power consumption. Therefore, it can avoid excess electricity generation. In addition, based on the current power consumption, the power service providers can measure the expected power generation amount to stabilize the power system. Compared with traditional power networks, the characteristics of the smart grid power system make it easier to suffer from several types of security threats and attacks such as impersonation, eavesdropping and message modification etc. In order to strength the security of smart grid networks, a robust and efficient authentication protocol should provide to mutual authentication and session key agreement. Since the communications between the control center and the substation is protected by the Supervisory Control and Data Acquisition system, we focus on the secure communication between the substation and the smart appliances. In this paper, a robust and efficient authentication protocol based on elliptic curve cryptography is proposed to achieve mutual authentication and key agreement between the substation and the smart appliances. In addition, the proposed protocol not only resists replay attacks, impersonation attacks, and man-in-middle attacks, but also provides the session key security and the known-key security.
Keywords
computer network security; cryptographic protocols; power engineering computing; power system measurement; public key cryptography; smart meters; smart power grids; substations; authentication protocol; elliptic curve cryptography; impersonation attack; known key security; man-in-middle attack; replay attack; session key agreement; session key security; smart appliance; smart power grid system; substation communication; supervisory control and data acquisition system; Authentication; Encryption; Home appliances; Protocols; Smart grids; Substations; authentication; elliptic curve; key agreement; smart grids;
fLanguage
English
Publisher
ieee
Conference_Titel
Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing
Conference_Location
Beijing
Type
conf
DOI
10.1109/GreenCom-iThings-CPSCom.2013.392
Filename
6682402
Link To Document