Neeraj Kumar
ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System
Kumar, Neeraj; Aujla, Gagangeet Singh; Das, Ashok Kumar; Conti, Mauro
Authors
Dr Gagangeet Aujla gagangeet.s.aujla@durham.ac.uk
Associate Professor in Computer Science
Ashok Kumar Das
Mauro Conti
Abstract
The devices in smart grids (SG) transfer data to a utility center (UC) or to the remote control centers. Using these data, the energy balance is maintained between consumers and the grid. However, this flow of data may be tampered by the intruders, which may result in energy imbalance. Thus, a robust authentication protocol, which supports dynamic SG device validation and UC addition, both in the local and global domains, is an essential requirement. For this reason, ECCAuth: a novel elliptic curve cryptography-based authentication protocol is proposed in this paper for preserving demand response in SG. This protocol allows establishment of a secret session key between an SG device and a UC after mutual authentication. Using this key, they can securely communicate for exchanging the sensitive information. The formal security analysis, informal security analysis, and formal security verification show that ECCAuth can withstand several known attacks.
Citation
Kumar, N., Aujla, G. S., Das, A. K., & Conti, M. (2019). ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System. IEEE Transactions on Industrial Informatics, 15(12), 6572 - 6582. https://doi.org/10.1109/tii.2019.2922697
Journal Article Type | Article |
---|---|
Acceptance Date | Jun 8, 2019 |
Online Publication Date | Jun 13, 2019 |
Publication Date | 2019-12 |
Deposit Date | Apr 27, 2021 |
Journal | IEEE Transactions on Industrial Informatics |
Print ISSN | 1551-3203 |
Electronic ISSN | 1941-0050 |
Publisher | Institute of Electrical and Electronics Engineers |
Volume | 15 |
Issue | 12 |
Pages | 6572 - 6582 |
DOI | https://doi.org/10.1109/tii.2019.2922697 |
Keywords | Authentication, automated validation of internet security protocols and applications (AVISPA), cyber-physical-social systems (CPSS), real-or-random (RoR) model, security, smart grid (SG). |
Public URL | https://durham-repository.worktribe.com/output/1243874 |
You might also like
Uncovering hidden and complex relations of pandemic dynamics using an AI driven system
(2024)
Journal Article
Trusted Explainable AI for 6G-Enabled Edge Cloud Ecosystem
(2023)
Journal Article
Compliance Checking of Cloud Providers: Design and Implementation
(2023)
Journal Article
Downloadable Citations
About Durham Research Online (DRO)
Administrator e-mail: dro.admin@durham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search