Neeraj Kumar
ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System
Kumar, Neeraj; Aujla, Gagangeet Singh; Das, Ashok Kumar; Conti, Mauro
Authors
Dr Gagangeet Aujla gagangeet.s.aujla@durham.ac.uk
Associate Professor in Computer Science
Ashok Kumar Das
Mauro Conti
Abstract
The devices in smart grids (SG) transfer data to a utility center (UC) or to the remote control centers. Using these data, the energy balance is maintained between consumers and the grid. However, this flow of data may be tampered by the intruders, which may result in energy imbalance. Thus, a robust authentication protocol, which supports dynamic SG device validation and UC addition, both in the local and global domains, is an essential requirement. For this reason, ECCAuth: a novel elliptic curve cryptography-based authentication protocol is proposed in this paper for preserving demand response in SG. This protocol allows establishment of a secret session key between an SG device and a UC after mutual authentication. Using this key, they can securely communicate for exchanging the sensitive information. The formal security analysis, informal security analysis, and formal security verification show that ECCAuth can withstand several known attacks.
Citation
Kumar, N., Aujla, G. S., Das, A. K., & Conti, M. (2019). ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System. IEEE Transactions on Industrial Informatics, 15(12), 6572 - 6582. https://doi.org/10.1109/tii.2019.2922697
Journal Article Type | Article |
---|---|
Acceptance Date | Jun 8, 2019 |
Online Publication Date | Jun 13, 2019 |
Publication Date | 2019-12 |
Deposit Date | Apr 27, 2021 |
Journal | IEEE Transactions on Industrial Informatics |
Print ISSN | 1551-3203 |
Electronic ISSN | 1941-0050 |
Publisher | Institute of Electrical and Electronics Engineers |
Volume | 15 |
Issue | 12 |
Pages | 6572 - 6582 |
DOI | https://doi.org/10.1109/tii.2019.2922697 |
Keywords | Authentication, automated validation of internet security protocols and applications (AVISPA), cyber-physical-social systems (CPSS), real-or-random (RoR) model, security, smart grid (SG). |
Public URL | https://durham-repository.worktribe.com/output/1243874 |
You might also like
COPS: Controller Placement in Next-Generation Software Defined Edge-Cloud Networks
(2025)
Presentation / Conference Contribution
Energy-based Predictive Root Cause Analysis for Real-Time Anomaly Detection in Big Data Systems
(2025)
Presentation / Conference Contribution
Green Reinforcement and Split Learning Framework for Edge-Fog-Cloud Continuum in 6G Networks
(2025)
Presentation / Conference Contribution
Intelligent edge–fog interplay for healthcare informatics: A blockchain perspective
(2024)
Journal Article
Green AutoML: Energy-Efficient AI Deployment Across the Edge-Fog-Cloud Continuum
(2024)
Presentation / Conference Contribution