ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System

The devices in smart grids (SG) transfer data to a utility center (UC) or to the remote control centers. Using these data, the energy balance is maintained between consumers and the grid. However, this flow of data may be tampered by the intruders, which may result in energy imbalance. Thus, a robus...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:IEEE transactions on industrial informatics Ročník 15; číslo 12; s. 6572 - 6582
Hlavní autori: Kumar, Neeraj, Aujla, Gagangeet Singh, Das, Ashok Kumar, Conti, Mauro
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Piscataway IEEE 01.12.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Predmet:
ISSN:1551-3203, 1941-0050
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract The devices in smart grids (SG) transfer data to a utility center (UC) or to the remote control centers. Using these data, the energy balance is maintained between consumers and the grid. However, this flow of data may be tampered by the intruders, which may result in energy imbalance. Thus, a robust authentication protocol, which supports dynamic SG device validation and UC addition, both in the local and global domains, is an essential requirement. For this reason, ECCAuth: a novel elliptic curve cryptography-based authentication protocol is proposed in this paper for preserving demand response in SG. This protocol allows establishment of a secret session key between an SG device and a UC after mutual authentication. Using this key, they can securely communicate for exchanging the sensitive information. The formal security analysis, informal security analysis, and formal security verification show that ECCAuth can withstand several known attacks.
AbstractList The devices in smart grids (SG) transfer data to a utility center (UC) or to the remote control centers. Using these data, the energy balance is maintained between consumers and the grid. However, this flow of data may be tampered by the intruders, which may result in energy imbalance. Thus, a robust authentication protocol, which supports dynamic SG device validation and UC addition, both in the local and global domains, is an essential requirement. For this reason, ECCAuth: a novel elliptic curve cryptography-based authentication protocol is proposed in this paper for preserving demand response in SG. This protocol allows establishment of a secret session key between an SG device and a UC after mutual authentication. Using this key, they can securely communicate for exchanging the sensitive information. The formal security analysis, informal security analysis, and formal security verification show that ECCAuth can withstand several known attacks.
Author Aujla, Gagangeet Singh
Kumar, Neeraj
Das, Ashok Kumar
Conti, Mauro
Author_xml – sequence: 1
  givenname: Neeraj
  orcidid: 0000-0002-3020-3947
  surname: Kumar
  fullname: Kumar, Neeraj
  email: neeraj.kumar@thapar.edu
  organization: Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, India
– sequence: 2
  givenname: Gagangeet Singh
  orcidid: 0000-0002-2870-8938
  surname: Aujla
  fullname: Aujla, Gagangeet Singh
  email: gagi_aujla82@yahoo.com
  organization: Department of Computer Science and Engineering, Chandigarh University, Mohali, India
– sequence: 3
  givenname: Ashok Kumar
  orcidid: 0000-0002-5196-9589
  surname: Das
  fullname: Das, Ashok Kumar
  email: iitkgp.akdas@gmail.com
  organization: Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India
– sequence: 4
  givenname: Mauro
  orcidid: 0000-0002-3612-1934
  surname: Conti
  fullname: Conti, Mauro
  email: conti@math.unipd.it
  organization: Department of Mathematics, University of Padua, Padova, Italy
BookMark eNp9kM1PAjEQxRuDiYDeTbw08bzYj93t1htBRBKMRvDclN2pLoEW23Lgv7cI8eDBU6eZ95uZ93qoY50FhK4pGVBK5N1iOh0wQuWAScZKKc5Ql8qcZoQUpJPqoqAZZ4RfoF4IK0K4IFx2kRqPRsNd_LzHQzyHeucBH75gY1vr2DqLX72LrnZrbJzHD7DRtsFvELbOBsDP2uoP2CQ5bi3WeL7RPuKJbxs834cIm0t0bvQ6wNXp7aP3x_Fi9JTNXibT0XCW1VzKmIllSSswhtJCFOli3ehSU8kFr3kFeUObuiyXVTJgckNyLiqdC9Pk1CyFLkDwPro9zt1697WDENXK7bxNKxXjjAlJGamSqjyqau9C8GBU3cYfm9Hrdq0oUYcwVQpTHcJUpzATSP6AW98mr_v_kJsj0gLAr7wSvMxT9xvJfYAx
CODEN ITIICH
CitedBy_id crossref_primary_10_1109_JIOT_2020_3038388
crossref_primary_10_1109_JIOT_2022_3184293
crossref_primary_10_3390_app10051758
crossref_primary_10_1007_s12243_020_00765_4
crossref_primary_10_1109_TII_2022_3158663
crossref_primary_10_3390_computers14060232
crossref_primary_10_1109_JIOT_2023_3324543
crossref_primary_10_3390_s22062269
crossref_primary_10_1016_j_seta_2024_103775
crossref_primary_10_1177_01423312231151642
crossref_primary_10_1007_s13369_023_07900_y
crossref_primary_10_1109_TSG_2023_3234000
crossref_primary_10_1002_cpe_8080
crossref_primary_10_1109_TVT_2020_3035341
crossref_primary_10_1016_j_jisa_2020_102500
crossref_primary_10_3390_fi14040119
crossref_primary_10_1016_j_jnca_2023_103695
crossref_primary_10_1016_j_pmcj_2024_101919
crossref_primary_10_3390_fi16010009
crossref_primary_10_3390_s23042309
crossref_primary_10_1016_j_iot_2025_101626
crossref_primary_10_1371_journal_pone_0265937
crossref_primary_10_1016_j_ijepes_2021_107184
crossref_primary_10_3390_s23104868
crossref_primary_10_1109_JIOT_2021_3118471
crossref_primary_10_1109_TII_2019_2946047
crossref_primary_10_3390_s24247967
crossref_primary_10_1007_s12083_023_01585_8
crossref_primary_10_1109_TDSC_2022_3163138
crossref_primary_10_1109_ACCESS_2025_3549050
crossref_primary_10_1371_journal_pone_0296781
crossref_primary_10_1007_s00202_024_02636_w
crossref_primary_10_1109_ACCESS_2024_3361039
crossref_primary_10_1016_j_epsr_2021_107630
crossref_primary_10_3390_app12147274
crossref_primary_10_3390_cryptography8020020
crossref_primary_10_1007_s12652_020_02740_2
crossref_primary_10_1016_j_sysarc_2020_101877
crossref_primary_10_1007_s12083_020_01020_2
crossref_primary_10_1109_ACCESS_2020_2995917
crossref_primary_10_1016_j_jisa_2023_103466
crossref_primary_10_1109_TSG_2021_3106105
crossref_primary_10_1016_j_heliyon_2023_e17240
crossref_primary_10_1049_smc2_12010
crossref_primary_10_1016_j_rser_2024_114748
crossref_primary_10_1016_j_seta_2021_101571
crossref_primary_10_1109_ACCESS_2020_2996093
crossref_primary_10_1109_TCC_2019_2950002
crossref_primary_10_1109_TDSC_2025_3568707
crossref_primary_10_1109_TVT_2021_3116279
crossref_primary_10_1109_TCE_2025_3570969
crossref_primary_10_1002_spe_2832
crossref_primary_10_1016_j_comnet_2020_107333
crossref_primary_10_32604_cmc_2021_018808
crossref_primary_10_1088_1742_6596_2741_1_012014
crossref_primary_10_1002_dac_5028
crossref_primary_10_1007_s11277_022_09826_4
crossref_primary_10_1016_j_iot_2023_100937
crossref_primary_10_1109_JSYST_2020_2994363
crossref_primary_10_1016_j_jisa_2022_103336
crossref_primary_10_26599_BDMA_2023_9020022
crossref_primary_10_1109_TII_2024_3399915
crossref_primary_10_1109_TSC_2019_2962677
crossref_primary_10_1007_s00202_024_02563_w
crossref_primary_10_1007_s11227_023_05535_2
crossref_primary_10_1007_s41870_024_01813_1
crossref_primary_10_1109_TII_2021_3119685
crossref_primary_10_1007_s13369_024_08882_1
crossref_primary_10_3390_electronics12051250
crossref_primary_10_1109_JSYST_2022_3188759
crossref_primary_10_1016_j_sysarc_2024_103176
crossref_primary_10_1002_ett_4528
crossref_primary_10_1088_2631_8695_ade75d
crossref_primary_10_1007_s11042_021_10512_z
crossref_primary_10_1016_j_ijepes_2021_107550
crossref_primary_10_1002_ett_5017
crossref_primary_10_1109_TCE_2023_3320974
crossref_primary_10_1002_ett_3995
Cites_doi 10.1109/TSG.2011.2120634
10.1109/TETC.2014.2330516
10.1049/iet-com.2016.0091
10.1109/TII.2011.2166794
10.1109/TETC.2015.2392380
10.1109/MCC.2016.130
10.1007/s11276-014-0761-7
10.1109/TSG.2016.2602282
10.1109/TCC.2015.2449855
10.1016/j.future.2016.06.034
10.1109/TII.2015.2414355
10.1109/TWC.2015.2473165
10.1145/1880022.1880027
10.1109/TIFS.2015.2512525
10.1109/TSG.2015.2440658
10.1109/TII.2017.2732999
10.1007/978-3-540-30580-4_6
10.1109/TIT.1983.1056650
10.1109/TC.2002.1004593
10.1109/IMIS.2015.32
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TII.2019.2922697
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1941-0050
EndPage 6582
ExternalDocumentID 10_1109_TII_2019_2922697
8736497
Genre orig-research
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
RIA
RIE
RNS
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
RIG
ID FETCH-LOGICAL-c399t-7b618eff11575050ada6a19373c38e4d1dc66b8320f4f04378a47fd41fb7a5e73
IEDL.DBID RIE
ISICitedReferencesCount 96
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000502295800038&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1551-3203
IngestDate Mon Jun 30 10:18:00 EDT 2025
Tue Nov 18 22:18:25 EST 2025
Sat Nov 29 04:16:48 EST 2025
Wed Aug 27 02:39:51 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 12
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c399t-7b618eff11575050ada6a19373c38e4d1dc66b8320f4f04378a47fd41fb7a5e73
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-3612-1934
0000-0002-3020-3947
0000-0002-5196-9589
0000-0002-2870-8938
OpenAccessLink https://durham-repository.worktribe.com/output/1243874
PQID 2322791208
PQPubID 85507
PageCount 11
ParticipantIDs ieee_primary_8736497
crossref_citationtrail_10_1109_TII_2019_2922697
proquest_journals_2322791208
crossref_primary_10_1109_TII_2019_2922697
PublicationCentury 2000
PublicationDate 2019-12-01
PublicationDateYYYYMMDD 2019-12-01
PublicationDate_xml – month: 12
  year: 2019
  text: 2019-12-01
  day: 01
PublicationDecade 2010
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE transactions on industrial informatics
PublicationTitleAbbrev TII
PublicationYear 2019
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
ref14
ref10
ref1
ref17
ref16
ref19
ref18
(ref3) 0
(ref24) 0
ref25
ref20
ref21
(ref11) 0
ref28
kocher (ref22) 0
ref8
ref7
(ref2) 0
ref9
ref4
ref6
ref5
(ref26) 1995
von oheimb (ref23) 0
vanstone (ref27) 1992; 35
References_xml – ident: ref25
  doi: 10.1109/TSG.2011.2120634
– ident: ref8
  doi: 10.1109/TETC.2014.2330516
– ident: ref16
  doi: 10.1049/iet-com.2016.0091
– ident: ref1
  doi: 10.1109/TII.2011.2166794
– ident: ref28
  doi: 10.1109/TETC.2015.2392380
– ident: ref7
  doi: 10.1109/MCC.2016.130
– year: 0
  ident: ref2
  publication-title: Exploring the imperative of revitalizing America's electric infrastructure
– ident: ref6
  doi: 10.1007/s11276-014-0761-7
– ident: ref13
  doi: 10.1109/TSG.2016.2602282
– start-page: 388
  year: 0
  ident: ref22
  article-title: Differential power analysis
  publication-title: Proc 19th Annu Int Cryptology Conf
– ident: ref9
  doi: 10.1109/TCC.2015.2449855
– ident: ref5
  doi: 10.1016/j.future.2016.06.034
– year: 0
  ident: ref24
  article-title: SPAN: Security Protocol ANimator for AVISPA
– ident: ref4
  doi: 10.1109/TII.2015.2414355
– ident: ref20
  doi: 10.1109/TWC.2015.2473165
– start-page: 1
  year: 0
  ident: ref23
  article-title: The high-level protocol specification language HLPSL developed in the EU project Avispa
  publication-title: Proc 3rd APPSEM II (Appl Semantics II) Workshop (APPSEM)
– ident: ref21
  doi: 10.1145/1880022.1880027
– year: 0
  ident: ref11
  article-title: Automated validation of internet security protocols and applications
– ident: ref15
  doi: 10.1109/TIFS.2015.2512525
– ident: ref12
  doi: 10.1109/TSG.2015.2440658
– ident: ref17
  doi: 10.1109/TII.2017.2732999
– year: 1995
  ident: ref26
  publication-title: Secure Hash Standard
– ident: ref10
  doi: 10.1007/978-3-540-30580-4_6
– volume: 35
  start-page: 50
  year: 1992
  ident: ref27
  article-title: Responses to NIST's proposal
  publication-title: Commun ACM
– ident: ref18
  doi: 10.1109/TIT.1983.1056650
– ident: ref19
  doi: 10.1109/TC.2002.1004593
– year: 0
  ident: ref3
  publication-title: Application of Automated Controls for Voltage and Reactive Power Management - Initial Results
– ident: ref14
  doi: 10.1109/IMIS.2015.32
SSID ssj0037039
Score 2.5676742
Snippet The devices in smart grids (SG) transfer data to a utility center (UC) or to the remote control centers. Using these data, the energy balance is maintained...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 6572
SubjectTerms Authentication
automated validation of internet security protocols and applications (AVISPA)
Control centres
Cryptography
Curves
cyber-physical-social systems (CPSS)
Data analysis
Data encryption
Data transfer (computers)
Domains
Energy management
Load management
Protocols
real-or-random (RoR) model
Remote control
security
Smart devices
Smart grid
smart grid (SG)
Smart meters
Title ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System
URI https://ieeexplore.ieee.org/document/8736497
https://www.proquest.com/docview/2322791208
Volume 15
WOSCitedRecordID wos000502295800038&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1941-0050
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0037039
  issn: 1551-3203
  databaseCode: RIE
  dateStart: 20050101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8QwEB508aAH3-LqKjl4EazbNtlM421ZnyAiuoK3krYTWHC7sg9_v0naXQVF8NaUSSn5JsmXyeQLwAka6khDJjBO5lIIjoGSWgUSMxVxY1-Ql8y_x4eH5PVVPS7B2eIsDBH55DM6d49-L78Y5TMXKmsnyKVQuAzLiFid1ZqPutx6rvLaqJ0o4HHI51uSoWr37-5cDpc6j5UlG07e6dsU5O9U-TEQ-9nleuN__7UJ6zWLZN0K9i1YonIb1r5pC-5AetXrufjXBesyH1Qn5oouOaiK0rHH8Wg6sn7ALG9llzTUZcGeqpRZYl9pMWxQMs2eh9bH2M14ULBK5HwXXq6v-r3boL5NIcgtCZkGmMkoIWOcuo6lPaEutNSWviHPeUKiiIpcysx28NAI4xSPEi3QFCIyGeoOId-DRjkqaR9YnPOctOBGZplAjTqzCxMdW3ueiCiWTWjPGzjNa6lxd-PFW-qXHKFKLSSpgyStIWnC6aLGeyWz8YftjoNgYVe3fhNacwzTuh9OUssXY1RRHCYHv9c6hFX37SpBpQWN6XhGR7CSf0wHk_Gxd7FPEv_M3g
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFD7oFNQH7-K85sEXwbq2yZLGN5m34RyiE3wLaXsCA-1kbv5-k7SbgiL41pQTWvKdJF9OTr4AHAmDTW7QBMbJXDJGRSC5lgEXqYyosS_QS-Z3RLebPD_L-xk4mZ6FQUSffIan7tHv5eeDbOxCZY1EUM6kmIW5JmNxVJ7Wmoy71Pqu9OqozSigcUgnm5KhbPTabZfFJU9jaemGE3j6Ngn5W1V-DMV-frla-d-frcJyxSPJeQn8GsxgsQ5L39QFN0BdtlouAnZGzokPqyNxRZceVMbpyP1wMBpYTyCWuZILfNVFTh7KpFkkX4kxpF8QTR5frZeR62E_J6XM-SY8XV32WjdBdZ9CkFkaMgpEyqMEjXH6Opb4hDrXXFsCJ2hGE2R5lGecp7aLh4YZp3mUaCZMziKTCt1EQbegVgwK3AYSZzRDzajhacqEFjq1SxMdW3uasCjmdWhMGlhlldi4u_PiRflFRyiVhUQ5SFQFSR2OpzXeSqGNP2w3HARTu6r167A3wVBVPfFdWcYYCxnFYbLze61DWLjp3XVUp9293YVF950yXWUPaqPhGPdhPvsY9d-HB97dPgHlmNAl
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=ECCAuth%3A+A+Secure+Authentication+Protocol+for+Demand+Response+Management+in+a+Smart+Grid+System&rft.jtitle=IEEE+transactions+on+industrial+informatics&rft.au=Kumar%2C+Neeraj&rft.au=Gagangeet+Singh+Aujla&rft.au=Das%2C+Ashok+Kumar&rft.au=Conti%2C+Mauro&rft.date=2019-12-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1551-3203&rft.eissn=1941-0050&rft.volume=15&rft.issue=12&rft.spage=6572&rft_id=info:doi/10.1109%2FTII.2019.2922697&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1551-3203&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1551-3203&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1551-3203&client=summon