“…In this phase, the SM i and the NG share a key K i by running a key agreement protocol , , . The following steps are performed after the shared key generation.…”
Section: The Security‐enhanced Lightweight Communication Schemementioning
In smart grid, usage reports of consumers are collected via the smart meters (SMs) and sent to the power management and control center. In addition, some instructions are sent from the control center to the SMs. These two‐way communications between customers and energy suppliers are subject to numerous security threats. Due to the limited processing capability and storage space of the SMs, it is required to employ lightweight communication schemes. To do so, quite recently, Liu et al have proposed an interesting lightweight authenticated communication scheme for the secure bidirectional communications of SMs and neighborhood gateways in smart grid. In this paper, we first demonstrate that their scheme suffers from the SM's memory modification attack and pollution attack, then, we propose an enhanced lightweight communication scheme that is secure against the mentioned attacks. The comparative performance analysis with recent works in this field shows that our scheme not only is more efficient in terms of computational complexity and communication cost, but also benefits from substantial reduction in the required storage space. Our realistic hardware implementation on two popular microcontrollers confirms this claim.
“…In this phase, the SM i and the NG share a key K i by running a key agreement protocol , , . The following steps are performed after the shared key generation.…”
Section: The Security‐enhanced Lightweight Communication Schemementioning
In smart grid, usage reports of consumers are collected via the smart meters (SMs) and sent to the power management and control center. In addition, some instructions are sent from the control center to the SMs. These two‐way communications between customers and energy suppliers are subject to numerous security threats. Due to the limited processing capability and storage space of the SMs, it is required to employ lightweight communication schemes. To do so, quite recently, Liu et al have proposed an interesting lightweight authenticated communication scheme for the secure bidirectional communications of SMs and neighborhood gateways in smart grid. In this paper, we first demonstrate that their scheme suffers from the SM's memory modification attack and pollution attack, then, we propose an enhanced lightweight communication scheme that is secure against the mentioned attacks. The comparative performance analysis with recent works in this field shows that our scheme not only is more efficient in terms of computational complexity and communication cost, but also benefits from substantial reduction in the required storage space. Our realistic hardware implementation on two popular microcontrollers confirms this claim.
“…The security must be fully considered from the commencement of data collection up to their reception at the control and management center. Intensive review of the previous works shows that the security of SG is a very interesting topic and so many papers have discussed this challenging requirement. To have a taxonomy of these works, we can mention the works that have considered the key management in SG, the many works that have paid attention to false data injection attack, the miscellaneous works that have proposed privacy‐preserving schemes, and the few works that have taken the advantage of lattice‐based cryptosystem into account …”
Section: Introductionmentioning
confidence: 99%
“…For the message transmission, they have used a similar strategy to Fouda et al as . Quite recently, Mahmood et al have proposed another identity‐based key establishment protocol that can be used by different entities of SG. However, Mahmood et al have not discussed the message transmission process.…”
Section: Introductionmentioning
confidence: 99%
“…Quite recently, Mahmood et al have proposed another identity‐based key establishment protocol that can be used by different entities of SG. However, Mahmood et al have not discussed the message transmission process. Yet 2 other key agreement schemes have been proposed in Uludag et al and Abbasinezhad‐Mood and Nikooghdam .…”
Section: Introductionmentioning
confidence: 99%
“…Intensive review of the previous works shows that the security of SG is a very interesting topic and so many papers have discussed this challenging requirement. To have a taxonomy of these works, we can mention the works that have considered the key management in SG, [26][27][28] the many works that have paid attention to false data injection attack, [29][30][31][32][33][34][35] the miscellaneous works that have proposed privacy-preserving schemes, [36][37][38][39][40][41][42][43][44][45] and the few works that have taken the advantage of lattice-based cryptosystem into account. 46,47 In the traditional power grid, there is a 1-way flow of electricity from the electric utility to the consumers.…”
Summary
In smart grid, bidirectional communications between the smart meters and control center are subject to several security challenges. Since the smart meters have limited storage space and processing capability, the suggested communication scheme not only must consider the security requirements but also should put the least possible burden on the smart meters' resources. In 2014, an interesting communication scheme has been proposed for the secure consumption reports transmission of the smart meters to the neighbor gateways. In this paper, we first show that this scheme is vulnerable to the smart meter's memory modification, pollution, and denial of service attacks; then, we propose an authenticated communication scheme, which not only is secure against the aforementioned attacks, but also is much more efficient in terms of storage space, communication overhead, and computational complexity. Moreover, our scheme also presents the details of control messages transmission from the neighborhood gateways to the smart meters. Our comparative analysis with several recently published schemes indicates that the proposed scheme is more suitable than the previous ones. More significantly, our realistic implementation on ATmega2560, as a suitable candidate to be used for the smart meters, confirms our claim.
Wearable devices (WDs) adopting advanced microsensors and IoT technology are facing severe security risks in the process of building wearable healthcare monitoring system. In particular, new requirements are proposed for the security of the identity authentication and key agreement protocol as well as the consumption of computing resources for WDs, such as replay attack, modification attack, server-spoofing attack, privileged-insider attack, and denial-of-service attack. To satisfy such requirements, cloud-assisted EC password authenticated key exchange (CEPAK), an identity dynamic authentication and key agreement protocol, is proposed, and it uses a cloud-assisted authentication service and elliptic curve algorithm. The capability of CEPAK protocol is analyzed to deal with network attack and consumption of computing resources and communication resources. It is shown that on the basis of satisfying the security requirements of the system, the cloud-assisted authentication server can greatly share
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.