CFP last date
20 May 2024
Reseach Article

On Lightweight Authentication for Smart Grid Network

by Vaidehi Dudhwadkar, Himanshu Agarwal, Aarti Agarkar, Pratish Ray
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 5
Year of Publication: 2015
Authors: Vaidehi Dudhwadkar, Himanshu Agarwal, Aarti Agarkar, Pratish Ray
10.5120/ijca2015905307

Vaidehi Dudhwadkar, Himanshu Agarwal, Aarti Agarkar, Pratish Ray . On Lightweight Authentication for Smart Grid Network. International Journal of Computer Applications. 123, 5 ( August 2015), 1-6. DOI=10.5120/ijca2015905307

@article{ 10.5120/ijca2015905307,
author = { Vaidehi Dudhwadkar, Himanshu Agarwal, Aarti Agarkar, Pratish Ray },
title = { On Lightweight Authentication for Smart Grid Network },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 5 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number5/21952-2015905307/ },
doi = { 10.5120/ijca2015905307 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:11:50.128536+05:30
%A Vaidehi Dudhwadkar
%A Himanshu Agarwal
%A Aarti Agarkar
%A Pratish Ray
%T On Lightweight Authentication for Smart Grid Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 5
%P 1-6
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the last 6-7 years, there is a rapid growth in the development of Smart Grid Network on earth. Smart Grid (SG) is an advancement to the traditional power grid which integrates the power grid with Information and Communication Technology (ICT). SG is a multilayer environment. In this multilayer environment, there are different layers of communications such as Appliance to Home Area Network (HAN), HAN to Building Area Network (BAN) and BAN to Neighbourhood Area Network (NAN). NAN finally connects to Smart Grid Control Center. There are various security challenges at each layer of communication in SG. In this paper, a comprehensive survey of various authentication protocols to address the security threats in SG environment is presented. Study on five different types of authentication protocols such as simple password based, mutual authentication consensus based and password authentication with Juggling is conducted. Simulation study shows that among all protocols, SG-MCPAK and MCEPAK outperforms in terms of number of hashes, passwords, phases, random number and number of packets transferred. Moreover, an improved protocol SG-JMCPAK is suggested, which combines the best of J-PAKE and SG-MCPAK.

References
  1. “Introduction to NISTIR 7628 guidelines for smart grid cyber security,” National Institute of Standards and Technology (NIST), 2010
  2. Li, X.; Liang, X.; Lu, R.; Shen, X.; Lin, X. & Zhu, H. Securing smart grid: cyber attacks, countermeasures, and challenges IEEE Communications Magazine, Vol 50, pp 38-45, 2012.
  3. Jiang, Rongxing Lu, Ye Wang, Jun Luo, Chnagxiang Shen,and XueminShen, “Energy-Theft Detection Issues for Advanced Metering Infrastructure in Smart Grid,” Tsinghua Science and Technology, Volume 19,Number 2, pp 105-120, April 2014.
  4. A.J Dinusha Rathnayaka,Vidyasagar M.Potdar,Tharam Dillion,Omar Hussain,Samitha Kuruppu,”Analysis of Energy Behavior Profiles by Prosumer,”IEEE explorer 2012.
  5. Nicanfar, H.; Jokar, P.; Beznosov, K. & Leung, V. Efficient Authentication and Key Management Mechanisms for Smart Grid , IEEE Communications Systems Journal, Vol. 8, pp. 629-640, 2014.
  6. Nicanfar, H. & Leung, V. Smart grid multilayer consensus password authenticated key exchange protocol, IEEE International Conference on Communications (ICC), pp. 6716-6720, 2012.
  7. Nicanfar, H. & Leung, V. Multilayer Consensus ECC-Based Password Authenticated Key-Exchange (MCEPAK) Protocol for Smart Grid System Smart Grid, IEEE Transactions on Smart Grid, vol. 4 (1), pp. 253-264, March 2013.
  8. “Password-Authenticated Key Exchange (PAKE) Protocol,” International Telecommunication Union (ITU-T), Recommendation X.1035, 2007.
  9. A. H. Koblitz, N. Koblitzb, and A. Menezes, “Elliptic curve cryptography:The serpentine course of a paradigm shift,” Elsevier J. Number Theory, vol. 131, no. 5, pp. 781–814, May 2011.
  10. F. Hao and P. Ryan, “Password Authenticated Key Exchange by Juggling,” 16th Workshop on Security Protocols, 2008.
  11. D. H. Seo and P. Sweeney, “Simple authenticated key agreement algorithm,” Electron. Lett., Vol. 35, no. 13, pp. 1073–1074, Jun. 1999.
  12. S. M. Bellovin and M. Merritt,”EKE: Password-based protocols secure against dictionary attacks,” In Proc. IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, May 1992.
  13. M.M. Fouda, Z.M. Fadlullah, N. Kato, R. Lu, and X. Shen, “Towards a light-weight message authentication mechanism tailored for smart grid communications, ‖n Proc. IFIP SCNC Workshop, Shanghai, China, Apr. 2011.
  14. AVISPA- Automated Validation of Internet Security Protocols [Online]. Available:http://www.avispa-project.org.
  15. W. Diffie and M. E. Hellman, “ New directions in Cryptography” , IEEE Trans. Information Theory, Vol IT-11, pp. 644-654, Nov. 1976.
  16. T. ElGamal, “ A public key Cryptosystem and signature scheme based on discrete logarithm”, IEEE Trans. Information Theory, Vol IT-31, pp. 469-472, July 1985.
  17. “India’s largest blackout in History on July 2012”, [Online] Avaliable : http://blog.powercuts.in/?p=28.
Index Terms

Computer Science
Information Sciences

Keywords

Smart Grid (SG) Security Authentication Elliptic Curve Cryptography(ECC).