Paper
1 June 2023 Lightweight authentication for smart metering infrastructure in smart grid
Junlun Wu, Qianqian Ma, Xiaona Deng, Zhongyuan Qin
Author Affiliations +
Proceedings Volume 12718, International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2023); 1271815 (2023) https://doi.org/10.1117/12.2681762
Event: International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2023), 2023, Nanjing, China
Abstract
In this paper, a secure and efficient access authentication scheme is designed between edge devices in the smart grid, to achieve secure communication between devices in the smart grid. Considering the characteristics of power grid equipment, identity based cryptography is introduced to embed the equipment identity, timestamp, etc., into the process of identity recognition and private key update. Combined with the characteristics of private key update in the cryptographic system, bilinear pairing is used to negotiate the communication key in each time interval, and only hash, XOR operation and concatenation operation are used to achieve lightweight authentication scheme. The scheme can not only meet the security requirements, but also minimize the burden on edge device resources. Experimental results show that the communication cost and computation cost of our scheme are less than the existing schemes.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Junlun Wu, Qianqian Ma, Xiaona Deng, and Zhongyuan Qin "Lightweight authentication for smart metering infrastructure in smart grid", Proc. SPIE 12718, International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2023), 1271815 (1 June 2023); https://doi.org/10.1117/12.2681762
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Telecommunications

Power grids

Samarium

Data communications

Network security

Computer security

Back to Top