Abstract

The edge computing infrastructure has enabled a massive amount of data in the smart grid environment by a large number of connected automated devices to be processed at the edge of the network in proximity to the data generation source. The demand response management is a fundamental requirement for an efficient and reliable smart grid environment, which can be accomplished by the transfer of data between smart devices and the utility center (UC) in a smart city, very frequently. However, this frequent data transfer is subject to multiple threats including the tempering. Several authentication schemes were proposed to secure smart grid environment. However, many such schemes are either insecure or lack the required efficiency. To counter the threats and to provide efficiency, a new authentication scheme for demand response management (DRMAS) is proposed in this paper. DRMAS provides all necessary security requirements and resists known attacks. The proposed DRMAS is provably secure under formal analysis supplemented by a brief discussion on attack resilience. Moreover, the DRMAS completes the authentication procedure in just 20.11 ms by exchanging only 2 messages.

Highlights

  • Smart grid (SG) is envisioned to be the generation power systems providing a seamless integration of cyber physical systems, information and communication technologies (ICT), and power generation and distribution domains

  • For securing the demand response (DR) management, in this paper, we propose an authentication scheme DRMAS which can mitigate pitfalls of existing schemes

  • The research contributions are illustrated as under: 1) A new certificate based authentication scheme DRMAS is proposed to manage demand response in smart grid-based systems, which makes certain the exchange of sensitive information only after a mutually agreed session key is established between SG device and utility center (UC)

Read more

Summary

INTRODUCTION

Smart grid (SG) is envisioned to be the generation power systems providing a seamless integration of cyber physical systems, information and communication technologies (ICT), and power generation and distribution domains. Afterwards, Saxena et al [14] presented a scheme for smart grid systems making certain the security against insider and outsider threats as posed to the SG environment Later, He et al [15] presented an elliptic curve cryptography (ECC)-based key distribution protocol for SGs ensuring anonymity to the stakeholders. MOTIVATIONS AND CONTRIBUTIONS The SG-based system relies on internet-oriented communication and networking which renders the SG infrastructure vulnerable to several attacks including forgery attacks, impersonation attacks, man-in-the-middle attacks and replay attacks This strong reliance of deployed smart meters (SMs) on ICT raise the same security concerns as already posed to ICT-based paradigms. The research contributions are illustrated as under: 1) A new certificate based authentication scheme DRMAS is proposed to manage demand response in smart grid-based systems, which makes certain the exchange of sensitive information only after a mutually agreed session key is established between SG device and UC. We assume the trust authority (TA) to be fully trusted, and the utility centre (UC) as semi-trusted since both of these entities may not be compromised by the attacker

DRMAS: PROPOSED SCHEME
SG DEVICE REGISTRATION
AUTHENTICATION
DISCUSSION
FORMAL SECURITY ANALYSIS
RANDOM ORACLE
COMPARATIVE SECURITY AND PERFORMANCE ANALYSIS
COMPUTATION COST
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call