an ecc-based mutual authentication scheme with one time signature (ots) in advanced metering infrastructure

نویسندگان

f. naji mohades

m. h. yaghmaee moghadam

چکیده

advanced metering infrastructure (ami) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  this study focuses on communication between a smart meter and a server on the utility side. hence, a mutual authentication mechanism in ami is presented based on the elliptic curve cryptography (ecc) and one time signature (ots) consists of two phases: a key and signature generation phase as well as a signature verification phase. the next challenge, is securing communication messages. accordingly, a message authentication mechanism based on ecc and ots is proposed in this paper. such protocols are designed based on resource constraint problem on the consumer side and security requirement satisfaction in ami. security of the protocol with ban logic is proved and possibility of signature forgery via the mathematical principle of birthday paradox formula is represented. in the end, security of the protocol is scrutinized with informal methods and is simulated on java. simulation and analytical results show that proposed protocols are more secure and efficient than similar methods against most of the security attacks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

An efficient RFID mutual authentication scheme based on ECC

Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applications, such as medical drugs management in hospitals and missing children searching in amusement parks. The applications basically can be classified into two types: non-public key cryptosystem (PKC)-based and PKC-based. However, many of them have been found to be flawed in the aspect of privacy pro...

متن کامل

Efficient and Fault-Diagnosable Authentication Scheme for Advanced Metering Infrastructure

The recently emerging Advanced Metering Infrastructure (AMI) is envisioned to be one of the most prominent features of the smart grid. Security, especially authentication, is crucial for the success of large-scale AMI deployment. Unfortunately, AMI’s natural requirements — efficiency, scalability, fault-diagnoses and reliability — cannot be fully satisfied by existing authentication schemes: pe...

متن کامل

An ECC-Based Blind Signature Scheme

Cryptography is increasingly applied to the E-commerce world, especially to the untraceable payment system and the electronic voting system. Protocols for these systems strongly require the anonymous digital signature property, and thus a blind signature strategy is the answer to it. Chaum stated that every blind signature protocol should hold two fundamental properties, blindness and intractab...

متن کامل

An Efficient and More Secure Id- Based Mutual Authentication Scheme Based on Ecc for Mobile Devices

Mobile services are spread throughout the wireless network and are one of the crucial components needed for various applications and services. However, the security of mobile communication has topped the list of concerns for mobile phone users. Confidentiality, Authentication, Integrity and Non-repudiation are required security services for mobile communication. Currently available network secu...

متن کامل

An Enhanced ECC Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices

Recently, Islam and Biswas proposed an efficient and secure ID-based remote mutual authentication with key agreement scheme. We have analyzed the security and performance of Islam and Biswas’s scheme and showed that their scheme has some pitfalls. In order to solve these problems, we have constructed an enhanced ECC remote mutual authentication with key agreement scheme and proven that the prop...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
amirkabir international journal of modeling, identification, simulation & control

ناشر: amirkabir university of technology

ISSN 2008-6067

دوره 46

شماره 1 2014

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023