Your browser doesn't support javascript.
loading
Low complexity smart grid security protocol based on elliptic curve cryptography, biometrics and hamming distance.
Mutlaq, Keyan Abdul-Aziz; Nyangaresi, Vincent Omollo; Omar, Mohd Adib; Abduljabbar, Zaid Ameen; Abduljaleel, Iman Qays; Ma, Junchao; Al Sibahee, Mustafa A.
Afiliación
  • Mutlaq KA; School of Computer Sciences, Universiti Sains Malaysia, USM, Gelugor, Penang, Malaysia.
  • Nyangaresi VO; IT and Communications Center, University of Basrah, Basrah, Iraq.
  • Omar MA; Department of Computer Science and Software Engineering, Jaramogi Oginga Odinga University of Science & Technology, Bondo, Kenya.
  • Abduljabbar ZA; School of Computer Sciences, Universiti Sains Malaysia, USM, Gelugor, Penang, Malaysia.
  • Abduljaleel IQ; Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah, Iraq.
  • Ma J; Department of Computer Science, College of Computer Science and Information Technology, University of Basrah, Basrah, Iraq.
  • Al Sibahee MA; College of Big Data and Internet, Shenzhen Technology University, Shenzhen, China.
PLoS One ; 19(1): e0296781, 2024.
Article en En | MEDLINE | ID: mdl-38261555
ABSTRACT
The incorporation of information and communication technologies in the power grids has greatly enhanced efficiency in the management of demand-responses. In addition, smart grids have seen considerable minimization in energy consumption and enhancement in power supply quality. However, the transmission of control and consumption information over open public communication channels renders the transmitted messages vulnerable to numerous security and privacy violations. Although many authentication and key agreement protocols have been developed to counter these issues, the achievement of ideal security and privacy levels at optimal performance still remains an uphill task. In this paper, we leverage on Hamming distance, elliptic curve cryptography, smart cards and biometrics to develop an authentication protocol. It is formally analyzed using the Burrows-Abadi-Needham (BAN) logic, which shows strong mutual authentication and session key negotiation. Its semantic security analysis demonstrates its robustness under all the assumptions of the Dolev-Yao (DY) and Canetti- Krawczyk (CK) threat models. From the performance perspective, it is shown to incur communication, storage and computation complexities compared with other related state of the art protocols.
Asunto(s)

Texto completo: 1 Colección: 01-internacional Base de datos: MEDLINE Asunto principal: Unionidae / Tarjetas Inteligentes de Salud Límite: Animals Idioma: En Revista: PLoS One Asunto de la revista: CIENCIA / MEDICINA Año: 2024 Tipo del documento: Article País de afiliación: Malasia

Texto completo: 1 Colección: 01-internacional Base de datos: MEDLINE Asunto principal: Unionidae / Tarjetas Inteligentes de Salud Límite: Animals Idioma: En Revista: PLoS One Asunto de la revista: CIENCIA / MEDICINA Año: 2024 Tipo del documento: Article País de afiliación: Malasia
...