ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System
The devices in smart grids (SG) transfer data to a utility center (UC) or to the remote control centers. Using these data, the energy balance is maintained between consumers and the grid. However, this flow of data may be tampered by the intruders, which may result in energy imbalance. Thus, a robus...
Uložené v:
| Vydané v: | IEEE transactions on industrial informatics Ročník 15; číslo 12; s. 6572 - 6582 |
|---|---|
| Hlavní autori: | , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Piscataway
IEEE
01.12.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Predmet: | |
| ISSN: | 1551-3203, 1941-0050 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | The devices in smart grids (SG) transfer data to a utility center (UC) or to the remote control centers. Using these data, the energy balance is maintained between consumers and the grid. However, this flow of data may be tampered by the intruders, which may result in energy imbalance. Thus, a robust authentication protocol, which supports dynamic SG device validation and UC addition, both in the local and global domains, is an essential requirement. For this reason, ECCAuth: a novel elliptic curve cryptography-based authentication protocol is proposed in this paper for preserving demand response in SG. This protocol allows establishment of a secret session key between an SG device and a UC after mutual authentication. Using this key, they can securely communicate for exchanging the sensitive information. The formal security analysis, informal security analysis, and formal security verification show that ECCAuth can withstand several known attacks. |
|---|---|
| AbstractList | The devices in smart grids (SG) transfer data to a utility center (UC) or to the remote control centers. Using these data, the energy balance is maintained between consumers and the grid. However, this flow of data may be tampered by the intruders, which may result in energy imbalance. Thus, a robust authentication protocol, which supports dynamic SG device validation and UC addition, both in the local and global domains, is an essential requirement. For this reason, ECCAuth: a novel elliptic curve cryptography-based authentication protocol is proposed in this paper for preserving demand response in SG. This protocol allows establishment of a secret session key between an SG device and a UC after mutual authentication. Using this key, they can securely communicate for exchanging the sensitive information. The formal security analysis, informal security analysis, and formal security verification show that ECCAuth can withstand several known attacks. |
| Author | Aujla, Gagangeet Singh Kumar, Neeraj Das, Ashok Kumar Conti, Mauro |
| Author_xml | – sequence: 1 givenname: Neeraj orcidid: 0000-0002-3020-3947 surname: Kumar fullname: Kumar, Neeraj email: neeraj.kumar@thapar.edu organization: Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, India – sequence: 2 givenname: Gagangeet Singh orcidid: 0000-0002-2870-8938 surname: Aujla fullname: Aujla, Gagangeet Singh email: gagi_aujla82@yahoo.com organization: Department of Computer Science and Engineering, Chandigarh University, Mohali, India – sequence: 3 givenname: Ashok Kumar orcidid: 0000-0002-5196-9589 surname: Das fullname: Das, Ashok Kumar email: iitkgp.akdas@gmail.com organization: Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India – sequence: 4 givenname: Mauro orcidid: 0000-0002-3612-1934 surname: Conti fullname: Conti, Mauro email: conti@math.unipd.it organization: Department of Mathematics, University of Padua, Padova, Italy |
| BookMark | eNp9kM1PAjEQxRuDiYDeTbw08bzYj93t1htBRBKMRvDclN2pLoEW23Lgv7cI8eDBU6eZ95uZ93qoY50FhK4pGVBK5N1iOh0wQuWAScZKKc5Ql8qcZoQUpJPqoqAZZ4RfoF4IK0K4IFx2kRqPRsNd_LzHQzyHeucBH75gY1vr2DqLX72LrnZrbJzHD7DRtsFvELbOBsDP2uoP2CQ5bi3WeL7RPuKJbxs834cIm0t0bvQ6wNXp7aP3x_Fi9JTNXibT0XCW1VzKmIllSSswhtJCFOli3ehSU8kFr3kFeUObuiyXVTJgckNyLiqdC9Pk1CyFLkDwPro9zt1697WDENXK7bxNKxXjjAlJGamSqjyqau9C8GBU3cYfm9Hrdq0oUYcwVQpTHcJUpzATSP6AW98mr_v_kJsj0gLAr7wSvMxT9xvJfYAx |
| CODEN | ITIICH |
| CitedBy_id | crossref_primary_10_1109_JIOT_2020_3038388 crossref_primary_10_1109_JIOT_2022_3184293 crossref_primary_10_3390_app10051758 crossref_primary_10_1007_s12243_020_00765_4 crossref_primary_10_1109_TII_2022_3158663 crossref_primary_10_3390_computers14060232 crossref_primary_10_1109_JIOT_2023_3324543 crossref_primary_10_3390_s22062269 crossref_primary_10_1016_j_seta_2024_103775 crossref_primary_10_1177_01423312231151642 crossref_primary_10_1007_s13369_023_07900_y crossref_primary_10_1109_TSG_2023_3234000 crossref_primary_10_1002_cpe_8080 crossref_primary_10_1109_TVT_2020_3035341 crossref_primary_10_1016_j_jisa_2020_102500 crossref_primary_10_3390_fi14040119 crossref_primary_10_1016_j_jnca_2023_103695 crossref_primary_10_1016_j_pmcj_2024_101919 crossref_primary_10_3390_fi16010009 crossref_primary_10_3390_s23042309 crossref_primary_10_1016_j_iot_2025_101626 crossref_primary_10_1371_journal_pone_0265937 crossref_primary_10_1016_j_ijepes_2021_107184 crossref_primary_10_3390_s23104868 crossref_primary_10_1109_JIOT_2021_3118471 crossref_primary_10_1109_TII_2019_2946047 crossref_primary_10_3390_s24247967 crossref_primary_10_1007_s12083_023_01585_8 crossref_primary_10_1109_TDSC_2022_3163138 crossref_primary_10_1109_ACCESS_2025_3549050 crossref_primary_10_1371_journal_pone_0296781 crossref_primary_10_1007_s00202_024_02636_w crossref_primary_10_1109_ACCESS_2024_3361039 crossref_primary_10_1016_j_epsr_2021_107630 crossref_primary_10_3390_app12147274 crossref_primary_10_3390_cryptography8020020 crossref_primary_10_1007_s12652_020_02740_2 crossref_primary_10_1016_j_sysarc_2020_101877 crossref_primary_10_1007_s12083_020_01020_2 crossref_primary_10_1109_ACCESS_2020_2995917 crossref_primary_10_1016_j_jisa_2023_103466 crossref_primary_10_1109_TSG_2021_3106105 crossref_primary_10_1016_j_heliyon_2023_e17240 crossref_primary_10_1049_smc2_12010 crossref_primary_10_1016_j_rser_2024_114748 crossref_primary_10_1016_j_seta_2021_101571 crossref_primary_10_1109_ACCESS_2020_2996093 crossref_primary_10_1109_TCC_2019_2950002 crossref_primary_10_1109_TDSC_2025_3568707 crossref_primary_10_1109_TVT_2021_3116279 crossref_primary_10_1109_TCE_2025_3570969 crossref_primary_10_1002_spe_2832 crossref_primary_10_1016_j_comnet_2020_107333 crossref_primary_10_32604_cmc_2021_018808 crossref_primary_10_1088_1742_6596_2741_1_012014 crossref_primary_10_1002_dac_5028 crossref_primary_10_1007_s11277_022_09826_4 crossref_primary_10_1016_j_iot_2023_100937 crossref_primary_10_1109_JSYST_2020_2994363 crossref_primary_10_1016_j_jisa_2022_103336 crossref_primary_10_26599_BDMA_2023_9020022 crossref_primary_10_1109_TII_2024_3399915 crossref_primary_10_1109_TSC_2019_2962677 crossref_primary_10_1007_s00202_024_02563_w crossref_primary_10_1007_s11227_023_05535_2 crossref_primary_10_1007_s41870_024_01813_1 crossref_primary_10_1109_TII_2021_3119685 crossref_primary_10_1007_s13369_024_08882_1 crossref_primary_10_3390_electronics12051250 crossref_primary_10_1109_JSYST_2022_3188759 crossref_primary_10_1016_j_sysarc_2024_103176 crossref_primary_10_1002_ett_4528 crossref_primary_10_1088_2631_8695_ade75d crossref_primary_10_1007_s11042_021_10512_z crossref_primary_10_1016_j_ijepes_2021_107550 crossref_primary_10_1002_ett_5017 crossref_primary_10_1109_TCE_2023_3320974 crossref_primary_10_1002_ett_3995 |
| Cites_doi | 10.1109/TSG.2011.2120634 10.1109/TETC.2014.2330516 10.1049/iet-com.2016.0091 10.1109/TII.2011.2166794 10.1109/TETC.2015.2392380 10.1109/MCC.2016.130 10.1007/s11276-014-0761-7 10.1109/TSG.2016.2602282 10.1109/TCC.2015.2449855 10.1016/j.future.2016.06.034 10.1109/TII.2015.2414355 10.1109/TWC.2015.2473165 10.1145/1880022.1880027 10.1109/TIFS.2015.2512525 10.1109/TSG.2015.2440658 10.1109/TII.2017.2732999 10.1007/978-3-540-30580-4_6 10.1109/TIT.1983.1056650 10.1109/TC.2002.1004593 10.1109/IMIS.2015.32 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1109/TII.2019.2922697 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1941-0050 |
| EndPage | 6582 |
| ExternalDocumentID | 10_1109_TII_2019_2922697 8736497 |
| Genre | orig-research |
| GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D RIG |
| ID | FETCH-LOGICAL-c399t-7b618eff11575050ada6a19373c38e4d1dc66b8320f4f04378a47fd41fb7a5e73 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 96 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000502295800038&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1551-3203 |
| IngestDate | Mon Jun 30 10:18:00 EDT 2025 Tue Nov 18 22:18:25 EST 2025 Sat Nov 29 04:16:48 EST 2025 Wed Aug 27 02:39:51 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 12 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c399t-7b618eff11575050ada6a19373c38e4d1dc66b8320f4f04378a47fd41fb7a5e73 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-3612-1934 0000-0002-3020-3947 0000-0002-5196-9589 0000-0002-2870-8938 |
| OpenAccessLink | https://durham-repository.worktribe.com/output/1243874 |
| PQID | 2322791208 |
| PQPubID | 85507 |
| PageCount | 11 |
| ParticipantIDs | ieee_primary_8736497 crossref_citationtrail_10_1109_TII_2019_2922697 proquest_journals_2322791208 crossref_primary_10_1109_TII_2019_2922697 |
| PublicationCentury | 2000 |
| PublicationDate | 2019-12-01 |
| PublicationDateYYYYMMDD | 2019-12-01 |
| PublicationDate_xml | – month: 12 year: 2019 text: 2019-12-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE transactions on industrial informatics |
| PublicationTitleAbbrev | TII |
| PublicationYear | 2019 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref12 ref15 ref14 ref10 ref1 ref17 ref16 ref19 ref18 (ref3) 0 (ref24) 0 ref25 ref20 ref21 (ref11) 0 ref28 kocher (ref22) 0 ref8 ref7 (ref2) 0 ref9 ref4 ref6 ref5 (ref26) 1995 von oheimb (ref23) 0 vanstone (ref27) 1992; 35 |
| References_xml | – ident: ref25 doi: 10.1109/TSG.2011.2120634 – ident: ref8 doi: 10.1109/TETC.2014.2330516 – ident: ref16 doi: 10.1049/iet-com.2016.0091 – ident: ref1 doi: 10.1109/TII.2011.2166794 – ident: ref28 doi: 10.1109/TETC.2015.2392380 – ident: ref7 doi: 10.1109/MCC.2016.130 – year: 0 ident: ref2 publication-title: Exploring the imperative of revitalizing America's electric infrastructure – ident: ref6 doi: 10.1007/s11276-014-0761-7 – ident: ref13 doi: 10.1109/TSG.2016.2602282 – start-page: 388 year: 0 ident: ref22 article-title: Differential power analysis publication-title: Proc 19th Annu Int Cryptology Conf – ident: ref9 doi: 10.1109/TCC.2015.2449855 – ident: ref5 doi: 10.1016/j.future.2016.06.034 – year: 0 ident: ref24 article-title: SPAN: Security Protocol ANimator for AVISPA – ident: ref4 doi: 10.1109/TII.2015.2414355 – ident: ref20 doi: 10.1109/TWC.2015.2473165 – start-page: 1 year: 0 ident: ref23 article-title: The high-level protocol specification language HLPSL developed in the EU project Avispa publication-title: Proc 3rd APPSEM II (Appl Semantics II) Workshop (APPSEM) – ident: ref21 doi: 10.1145/1880022.1880027 – year: 0 ident: ref11 article-title: Automated validation of internet security protocols and applications – ident: ref15 doi: 10.1109/TIFS.2015.2512525 – ident: ref12 doi: 10.1109/TSG.2015.2440658 – ident: ref17 doi: 10.1109/TII.2017.2732999 – year: 1995 ident: ref26 publication-title: Secure Hash Standard – ident: ref10 doi: 10.1007/978-3-540-30580-4_6 – volume: 35 start-page: 50 year: 1992 ident: ref27 article-title: Responses to NIST's proposal publication-title: Commun ACM – ident: ref18 doi: 10.1109/TIT.1983.1056650 – ident: ref19 doi: 10.1109/TC.2002.1004593 – year: 0 ident: ref3 publication-title: Application of Automated Controls for Voltage and Reactive Power Management - Initial Results – ident: ref14 doi: 10.1109/IMIS.2015.32 |
| SSID | ssj0037039 |
| Score | 2.5676742 |
| Snippet | The devices in smart grids (SG) transfer data to a utility center (UC) or to the remote control centers. Using these data, the energy balance is maintained... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 6572 |
| SubjectTerms | Authentication automated validation of internet security protocols and applications (AVISPA) Control centres Cryptography Curves cyber-physical-social systems (CPSS) Data analysis Data encryption Data transfer (computers) Domains Energy management Load management Protocols real-or-random (RoR) model Remote control security Smart devices Smart grid smart grid (SG) Smart meters |
| Title | ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System |
| URI | https://ieeexplore.ieee.org/document/8736497 https://www.proquest.com/docview/2322791208 |
| Volume | 15 |
| WOSCitedRecordID | wos000502295800038&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1941-0050 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0037039 issn: 1551-3203 databaseCode: RIE dateStart: 20050101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8QwEB508aAH3-LqKjl4EazbNtlM421ZnyAiuoK3krYTWHC7sg9_v0naXQVF8NaUSSn5JsmXyeQLwAka6khDJjBO5lIIjoGSWgUSMxVxY1-Ql8y_x4eH5PVVPS7B2eIsDBH55DM6d49-L78Y5TMXKmsnyKVQuAzLiFid1ZqPutx6rvLaqJ0o4HHI51uSoWr37-5cDpc6j5UlG07e6dsU5O9U-TEQ-9nleuN__7UJ6zWLZN0K9i1YonIb1r5pC-5AetXrufjXBesyH1Qn5oouOaiK0rHH8Wg6sn7ALG9llzTUZcGeqpRZYl9pMWxQMs2eh9bH2M14ULBK5HwXXq6v-r3boL5NIcgtCZkGmMkoIWOcuo6lPaEutNSWviHPeUKiiIpcysx28NAI4xSPEi3QFCIyGeoOId-DRjkqaR9YnPOctOBGZplAjTqzCxMdW3ueiCiWTWjPGzjNa6lxd-PFW-qXHKFKLSSpgyStIWnC6aLGeyWz8YftjoNgYVe3fhNacwzTuh9OUssXY1RRHCYHv9c6hFX37SpBpQWN6XhGR7CSf0wHk_Gxd7FPEv_M3g |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFD7oFNQH7-K85sEXwbq2yZLGN5m34RyiE3wLaXsCA-1kbv5-k7SbgiL41pQTWvKdJF9OTr4AHAmDTW7QBMbJXDJGRSC5lgEXqYyosS_QS-Z3RLebPD_L-xk4mZ6FQUSffIan7tHv5eeDbOxCZY1EUM6kmIW5JmNxVJ7Wmoy71Pqu9OqozSigcUgnm5KhbPTabZfFJU9jaemGE3j6Ngn5W1V-DMV-frla-d-frcJyxSPJeQn8GsxgsQ5L39QFN0BdtlouAnZGzokPqyNxRZceVMbpyP1wMBpYTyCWuZILfNVFTh7KpFkkX4kxpF8QTR5frZeR62E_J6XM-SY8XV32WjdBdZ9CkFkaMgpEyqMEjXH6Opb4hDrXXFsCJ2hGE2R5lGecp7aLh4YZp3mUaCZMziKTCt1EQbegVgwK3AYSZzRDzajhacqEFjq1SxMdW3uasCjmdWhMGlhlldi4u_PiRflFRyiVhUQ5SFQFSR2OpzXeSqGNP2w3HARTu6r167A3wVBVPfFdWcYYCxnFYbLze61DWLjp3XVUp9293YVF950yXWUPaqPhGPdhPvsY9d-HB97dPgHlmNAl |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=ECCAuth%3A+A+Secure+Authentication+Protocol+for+Demand+Response+Management+in+a+Smart+Grid+System&rft.jtitle=IEEE+transactions+on+industrial+informatics&rft.au=Kumar%2C+Neeraj&rft.au=Gagangeet+Singh+Aujla&rft.au=Das%2C+Ashok+Kumar&rft.au=Conti%2C+Mauro&rft.date=2019-12-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1551-3203&rft.eissn=1941-0050&rft.volume=15&rft.issue=12&rft.spage=6572&rft_id=info:doi/10.1109%2FTII.2019.2922697&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1551-3203&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1551-3203&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1551-3203&client=summon |