Securing Demand Response Management: A Certificate-Based Access Control in Smart Grid Edge Computing Infrastructure

The edge computing infrastructure has enabled a massive amount of data in the smart grid environment by a large number of connected automated devices to be processed at the edge of the network in proximity to the data generation source. The demand response management is a fundamental requirement for an efficient and reliable smart grid environment, which can be accomplished by the transfer of data between smart devices and the utility center (UC) in a smart city, very frequently. However, this frequent data transfer is subject to multiple threats including the tempering. Several authentication schemes were proposed to secure smart grid environment. However, many such schemes are either insecure or lack the required efficiency. To counter the threats and to provide efficiency, a new authentication scheme for demand response management (DRMAS) is proposed in this paper. DRMAS provides all necessary security requirements and resists known attacks. The proposed DRMAS is provably secure under formal analysis supplemented by a brief discussion on attack resilience. Moreover, the DRMAS completes the authentication procedure in just 20.11 ms by exchanging only 2 messages.

[1]  Mauro Conti,et al.  ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System , 2019, IEEE Transactions on Industrial Informatics.

[2]  Muhammad Usman,et al.  A provable and secure mobile user authentication scheme for mobile cloud computing services , 2019, Int. J. Commun. Syst..

[3]  Kijoon Chae,et al.  Secure Authentication for Structured Smart Grid System , 2015, 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[4]  Laurence T. Yang,et al.  A Tensor-Based Big Service Framework for Enhanced Living Environments , 2016, IEEE Cloud Computing.

[5]  Athanasios V. Vasilakos,et al.  Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems , 2020, Future Gener. Comput. Syst..

[6]  Jia-Lun Tsai,et al.  Secure Anonymous Key Distribution Scheme for Smart Grid , 2016, IEEE Transactions on Smart Grid.

[7]  Debasis Giri,et al.  A robust authentication and access control protocol for securing wireless healthcare sensor networks , 2020, J. Inf. Secur. Appl..

[8]  Arif Ur Rahman,et al.  Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key , 2019, Int. J. Commun. Syst..

[9]  Ali Nauman,et al.  Smart Contract Privacy Protection Using AI in Cyber-Physical Systems: Tools, Techniques and Challenges , 2020, IEEE Access.

[10]  Fadi Al-Turjman Smart Grid in IoT-Enabled Spaces : The Road to Intelligence in Power , 2020 .

[11]  Mauro Conti,et al.  Provably Secure Authenticated Key Agreement Scheme for Smart Grid , 2018, IEEE Transactions on Smart Grid.

[12]  Zeeshan Ali,et al.  Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles , 2020, IEEE Access.

[13]  Fadi Al-Turjman,et al.  Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems , 2020, Comput. Commun..

[14]  Tsu-Yang Wu,et al.  Cryptanalysis of a Pairing-Based Anonymous Key Agreement Scheme for Smart Grid , 2020 .

[15]  Christof Paar,et al.  On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme , 2008, CRYPTO.

[16]  Muhammad Ahsan Latif,et al.  Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach , 2019, IEEE Access.

[17]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.

[18]  Ely Salwana,et al.  Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography , 2019, Sensors.

[19]  Mohammad Hesam Tadayon,et al.  A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid , 2018, IEEE Transactions on Smart Grid.

[20]  Biplab Sikdar,et al.  Two-Factor Authentication for IoT With Location Information , 2019, IEEE Internet of Things Journal.

[21]  David Pointcheval,et al.  Password-Based Authenticated Key Exchange in the Three-Party Setting , 2005, Public Key Cryptography.

[22]  Chin-Chen Chang,et al.  A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.

[23]  Saru Kumari,et al.  An enhanced anonymous identity‐based key agreement protocol for smart grid advanced metering infrastructure , 2019, Int. J. Commun. Syst..

[24]  Robert H. Sloan,et al.  Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.

[25]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[26]  Fadi Al-Turjman,et al.  Correctness of an Authentication Scheme for Managing Demand Response in Smart Grid , 2020 .

[27]  Palash Sarkar,et al.  A Simple and Generic Construction of Authenticated Encryption with Associated Data , 2010, TSEC.

[28]  Taskin Koçak,et al.  Smart Grid Technologies: Communication Technologies and Standards , 2011, IEEE Transactions on Industrial Informatics.

[29]  Kim-Kwang Raymond Choo,et al.  A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network , 2018, IEEE Transactions on Dependable and Secure Computing.

[30]  Dariush Abbasinezhad-Mood,et al.  Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications , 2018, Future Gener. Comput. Syst..

[31]  Huaqun Wang,et al.  Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography , 2016, IET Commun..

[32]  Biplab Sikdar,et al.  Data Provenance for IoT With Light Weight Authentication and Privacy Preservation , 2019, IEEE Internet of Things Journal.

[33]  Yining Liu,et al.  A Secure Authentication Protocol for Internet of Vehicles , 2019, IEEE Access.

[34]  Tugrul Yanik,et al.  A Survey of SIP Authentication and Key Agreement Schemes , 2014, IEEE Communications Surveys & Tutorials.

[35]  Rongxing Lu,et al.  Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid , 2016, IEEE Transactions on Information Forensics and Security.

[36]  Xiong Li,et al.  An elliptic curve cryptography based lightweight authentication scheme for smart grid communication , 2018, Future Gener. Comput. Syst..

[37]  Shehzad Ashraf Chaudhry,et al.  Comments on “Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment” , 2019, IEEE Internet of Things Journal.

[38]  Xiong Li,et al.  Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure , 2018, Future Gener. Comput. Syst..

[39]  SK Hafizul Islam,et al.  A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL Attack , 2014, Wirel. Pers. Commun..