XML Persian Abstract Print


1- K. N. Toosi University of Technology
Abstract:   (212 Views)
Despite the expansion of the smart grid, information security in this network has faced many challenges, and we need a strong security framework for it. In this article, a compound and efficient method for authentication in the network of smart meters is presented. In the proposed model, first, the authentication of devices and sensor data is done in the smart meter, and then the value of the cumulative hash chain of the authorized devices' data is calculated in the smart meter and along with the cumulative data is sent to the collector. In the first step of the proposed method, devices are connected to the smart meter using RFID tags, and the device ID is processed in the smart meter. We use the Elliptic Curve method for authentication. In the second step, by calculating the value of the cumulative hash chain and comparing it with the received value, the validation of the received messages is done on the collector. Therefore, sending additional data to the collector, occupying the bandwidth, and the possibility of intrusion of malicious devices are prevented. The proposed method, in addition to adapting to the structure of the smart grid, also provides a lower computational and communication cost than the existing methods.
     
Type of Article: Research paper | Subject: Special
Received: 2023/07/13 | Accepted: 2024/03/13 | ePublished ahead of print: 2024/04/26

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

© 2024 CC BY-NC 4.0 | Journal of Control

Designed & Developed by : Yektaweb