Volume 17, Issue 4 (Journal of Control, V.17, N.4 Winter 2024)                   JoC 2024, 17(4): 65-73 | Back to browse issues page

XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Rezaei F, Rashidy P. Compound authentication in the network of smart meters. JoC 2024; 17 (4) :65-73
URL: http://joc.kntu.ac.ir/article-1-992-en.html
1- K. N. Toosi University of Technology
Abstract:   (907 Views)
Despite the expansion of the smart grid, information security in this network has faced many challenges, and we need a strong security framework for it. In this article, a compound and efficient method for authentication in the network of smart meters is presented. In the proposed model, first, the authentication of devices and sensor data is done in the smart meter, and then the value of the cumulative hash chain of the authorized devices' data is calculated in the smart meter and along with the cumulative data is sent to the collector. In the first step of the proposed method, devices are connected to the smart meter using RFID tags, and the device ID is processed in the smart meter. We use the Elliptic Curve method for authentication. In the second step, by calculating the value of the cumulative hash chain and comparing it with the received value, the validation of the received messages is done on the collector. Therefore, sending additional data to the collector, occupying the bandwidth, and the possibility of intrusion of malicious devices are prevented. The proposed method, in addition to adapting to the structure of the smart grid, also provides a lower computational and communication cost than the existing methods.
Full-Text [PDF 560 kb]   (40 Downloads)    
Type of Article: Research paper | Subject: Special
Received: 2023/10/14 | Accepted: 2024/02/9 | ePublished ahead of print: 2024/02/14 | Published: 2024/02/20

References
1. [1] M. R. Asghar, G. Dan, D. Miorandi, and I. Chlamtac, "Smart Meter Data Privacy: A Survey," IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2820-2835, 2017. [DOI:10.1109/COMST.2017.2720195]
2. [2] G. R. Barai, S. Krishnan, and B. Venkatesh, "Smart metering and functionalities of smart meters in smart grid-a review," IEEE Electrical Power and Energy Conference (EPEC), 2015. [DOI:10.1109/EPEC.2015.7379940]
3. [3] S. Nimbargi, S. Mhaisne, S. Nangare, and M. Sinha, "Review on AMI technology for Smart Meter," 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT), 2016. [DOI:10.1109/ICAECCT.2016.7942549]
4. [4] K. Deepak and K. Chandrasekaran, "Investigating Elliptic Curve Cryptography for Securing Smart Grid Environments", Third ISEA Conference on Security and Privacy (ISEA-ISAP), 2020. [DOI:10.1109/ISEA-ISAP49340.2020.234993]
5. [5] J. Zheng, D. W. Gao, and L. Lin, "Smart Meters in Smart Grid: An Overview," IEEE Green Technologies Conference (GreenTech), 2013.
6. [6] S. Kumar, H. Kumar, and G. R. Gunnam, "Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack," 2019 2nd International Conference on Data Intelligence and Security (ICDIS), 2019. [DOI:10.1109/ICDIS.2019.00009]
7. [7] A. Albalawi, A. Almrshed, A. Badhib, and S. Alshehri, "A Survey on Authentication Techniques for the Internet of Things", International Conference on Computer and Information Sciences (ICCIS), 2019. [DOI:10.1109/ICCISci.2019.8716401]
8. [8] RFID Forecasts, Players and Opportunities, IDTechEx, 2020.
9. [9] X. Lin, R. Lu, D. Kwan, and X. S. Shen, "REACT: an RFIDbased privacy-preserving children tracking scheme for large amusement parks," Computer Networks, vol. 54, no. 15, pp. 2744-2755, 2010. [DOI:10.1016/j.comnet.2010.05.005]
10. [10] D. C. Wyld, "Preventing the "worst case scenario:" combating the lost laptop epidemic with RFID technology," Novel Algorithms and Techniques in Telecommunications and Networking, pp. 29-33, Springer, 2010. [DOI:10.1007/978-90-481-3662-9_5]
11. [11] S. W. Wang, W. H. Chen, C. S. Ong, L. Liu, and Y. W. Chuang, "RFID application in hospitals: a case study on a demonstration RFID project in a Taiwan hospital," in Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), 2006.
12. [12] M. M. Perez, M. Cabrero-Canosa, J. V. Hermida et al., "Application of RFID technology in patient tracking and medication traceability in emergency care," Journal of Medical Systems, vol. 36, no. 6, pp. 3983-3993, 2012. [DOI:10.1007/s10916-012-9871-x]
13. [13] J. E. Katz and R. E. Rice, "Public views of mobile medical devices and services: a US national survey of consumer sentiments towards RFID healthcare technology," International Journal of Medical Informatics, vol. 78, no. 2, pp. 104-114, 2009. [DOI:10.1016/j.ijmedinf.2008.06.001]
14. [14] A. Ohsaga and K. Kondoh, "Bedside medication safety management system using a PDA and RFID tags," in 2013 7th International Symposium on Medical Information and Communication Technology (ISMICT), pp. 85-89, Tokyo, Japan, 2013. [DOI:10.1109/ISMICT.2013.6521705]
15. [15] Y. T. Liao, T. L. Chen, T. S. Chen, Z. H. Zhong, and J. H. Hwang, "The application of RFID to healthcare management of nursing house," Wireless Personal Communications, vol. 91, no. 3, pp. 1237-1257, 2016. [DOI:10.1007/s11277-016-3525-0]
16. [16] K. Fan, W. Jiang, H. Li, and Y. Yang, "Lightweight RFID protocol for medical privacy protection in IoT," IEEE Transactions on Industrial Informatics, vol. 14, pp. 1656-1665, 2018. [DOI:10.1109/TII.2018.2794996]
17. [17] S. Anandhi, R. Anitha, and V. Sureshkumar, "IoT enabled RFID authentication and secure object tracking system for smart logistics," Wireless Personal Communications, vol. 104, no. 2, pp. 543-560, 2019. [DOI:10.1007/s11277-018-6033-6]
18. [18] Y. K. Lee, L. Batina, and I. Verbauwhede, "EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol," in 2008 IEEE international conference on RFID, pp. 97-104, Las Vegas, NV, USA, 2008. [DOI:10.1109/RFID.2008.4519370]
19. [19] R. Want, "An introduction to RFID technology," IEEE Pervasive Computing, vol. 5, no. 1, pp. 25-33, 2006. [DOI:10.1109/MPRV.2006.2]
20. [20] H. Lamrani Alaoui, A. El Ghazi, M. Zbakh, A. Touhafi, and A. Braeken, "A Highly Efficient ECC-Based Authentication Protocol for RFID," Journal of Sensors, 2021. [DOI:10.1155/2021/8876766]
21. [21] M. Alshahrani and I. Traore, "Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain," Journal of Information Security and Applications, no. 45, pp.156-175, 2019. [DOI:10.1016/j.jisa.2019.02.003]
22. [22] F. Li, B. Luo, and P. Liu, "Secure Information Aggregation for Smart Grids Using Homomorphic Encryption," 2010 First IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, pp. 327-332, 2010. [DOI:10.1109/SMARTGRID.2010.5622064]
23. [23] P. Bhanse, B. Mishra, and D. Jena, "A Novel Smart Meter Authentication Scheme for Secure Smart Grid Communication," 2019 IEEE Region 10 Conference (TENCON), 2019. [DOI:10.1109/TENCON.2019.8929367]
24. [24] A. Madhu and P. Prajeesha, "Prevention of FDI Attacks in Smart Meter by providing Multi-Layer Authentication using ElGamal and SHA," 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), 2021. [DOI:10.1109/ICCMC51019.2021.9418464]

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

© 2024 CC BY-NC 4.0 | Journal of Control

Designed & Developed by : Yektaweb