A Secured Elliptic Curve Cryptography Authentication Scheme for Advanced Metering Infrastructure Communication

Authors

  • Otisitswe Kebotogetse, Ravi Samikannu, Abid Yahya

Keywords:

Advanced Metering Infrastructure, Elliptic Curve Authentication Scheme, Elliptic Curve Cryptography, Smart Grid, Smart Meter

Abstract

Advanced Metering Infrastructure (AMI) has been a key element in upgrading the Smart Grid. The smart meter as one of the components of the AMI system allows the system to take measurements in the real-time resulting in a more efficient energy use and also good load balancing. Securing the smart meter's cyber-security is vital as a compromise will lead to serious problems affecting millions of users. This paper proposes an Elliptic Curve Authentication Scheme (ECCAS) method that is light-weight and utilizes bilinear map method to form an ideal elliptic curve. Furthermore, it improves the concealed-based method designed in NS2 environment and the proposed method to show the light-weight characteristic. Results show that total consumed energy by the nodes has been reduced by 6%, throughput increased by 4% and packets dropped reduced by 2%. All these results show a slight difference in computational costs to prove that the proposed method is light-weight and can safely be used in AMI subsystem.

Downloads

Download data is not yet available.

References

G. Rahman, M. F. Bin, R. Chowdhury, A. Al Mamun, R. Hasan, and S. Mahfuz, “Summary of Smart Grid : Benefits and Issues,” Int. J. Sci. Eng. Res., vol. 4, no. 3, pp. 1–7, 2013, [Online]. Available: http://www.ijser.org.

Archana, R. Shankar, and S. Singh, “Development of smart grid for the power sector in India,” Clean. Energy Syst., vol. 2, p. 100011, 2022, doi: https://doi.org/10.1016/j.cles.2022.100011.

P. Rai, A. Mishra, and A. Lal, “Smart Grid and IEC 61850,” in 2021 International Conference on Intelligent Technologies (CONIT), 2021, pp. 1–6, doi: 10.1109/CONIT51480.2021.9498555.

F. Syed and A. Ullah, “Estimation of economic benefits associated with the reduction in the CO2 emission due to COVID-19,” Environ. Challenges, vol. 3, p. 100069, 2021, doi: https://doi.org/10.1016/j.envc.2021.100069.

M. Z. Gunduz and R. Das, “Analysis of cyber-attacks on smart grid applications,” 2018 Int. Conf. Artif. Intell. Data Process. IDAP 2018, no. March, pp. 1–5, 2019, doi: 10.1109/IDAP.2018.8620728.

O. Kebotogetse, R. Samikannu, and A. Yahya, “A Concealed Based Approach for Secure Transmission in Advanced Metering Infrastructure,” IEEE Access, vol. 10, pp. 84809–84817, 2022, doi: 10.1109/ACCESS.2022.3195240.

J. W. Bos, J. A. Halderman, N. Heninger, J. Moore, M. Naehrig, and E. Wustrow, “Elliptic Curve Cryptography in Practice.”

O. G. Abood and S. K. Guirguis, “A Survey on Cryptography Algorithms,” Int. J. Sci. Res. Publ., vol. 8, no. 7, 2018, doi: 10.29322/ijsrp.8.7.2018.p7978.

M. Faheem, S. Jamel, A. Hassan, Z. A., N. Shafinaz, and M. Mat, “A Survey on the Cryptographic Encryption Algorithms,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 11, 2017, doi: 10.14569/ijacsa.2017.081141.

S. D. Galbraith and P. Gaudry, “Recent progress on the elliptic curve discrete logarithm problem,” Des. Codes Cryptogr., vol. 78, no. 1, pp. 51–72, 2016, doi: 10.1007/s10623-015-0146-7.

W. Fang, W. Zhang, W. Chen, Y. Liu, and C. Tang, “TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing,” Wirel. Networks, vol. 26, no. 5, pp. 3169–3182, 2020, doi: 10.1007/s11276-019-02129-w.

N. T. Mbungu, R. C. Bansal, R. M. Naidoo, and M. Bettayeb, “A dynamic energy management system using smart metering,” Appl. Energy, vol. 280, no. October, p. 115990, 2020, doi: 10.1016/j.apenergy.2020.115990.

Y. Chen, J. F. Martinez-Ortega, P. Castillejo, and L. Lopez, “An Elliptic Curve-Based Scalable Data Aggregation Scheme for Smart Grid,” IEEE Syst. J., vol. 14, no. 2, pp. 2066–2077, 2020, doi: 10.1109/JSYST.2019.2954080.

S. Hussain et al., “A Lightweight and Formally Secure Certificate Based Signcryption with Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid,” IEEE Access, vol. 8, pp. 93230–93248, 2020, doi: 10.1109/ACCESS.2020.2994988.

M. U. Saleem, M. R. Usman, and M. Shakir, “Design , Implementation , and Deployment of an IoT Based Smart Energy Management System,” pp. 59649–59664, 2021, doi: 10.1109/ACCESS.2021.3070960.

S. Aghapour, M. Kaveh, M. R. Mosavi, and D. Martin, “An Ultra-Lightweight Mutual Authentication Scheme for Smart Grid Two-Way Communications,” IEEE Access, vol. 9, pp. 74562–74573, 2021, doi: 10.1109/ACCESS.2021.3080835.

Z. Song, Y. Ren, and G. He, “Privacy-Preserving KNN Classification Algorithm for Smart Grid,” vol. 2022, 2022.

L. Wu, J. Wang, S. Zeadally, and D. He, “Anonymous and Efficient Message Authentication Scheme for Smart Grid,” vol. 2019, 2019.

T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2. 2009.

V. Odelu, A. K. Das, S. Kumari, X. Huang, and M. Wazid, “Provably secure authenticated key agreement scheme for distributed mobile cloud computing services,” Futur. Gener. Comput. Syst., vol. 68, no. C, pp. 74–88, 2017, doi: 10.1016/j.future.2016.09.009.

M. F. Khan, E. A. Felemban, S. Qaisar, and S. Ali, “Performance analysis on packet delivery ratio and end-to-end delay of different network topologies in wireless sensor networks (WSNs),” Proc. - IEEE 9th Int. Conf. Mob. Ad-Hoc Sens. Networks, MSN 2013, pp. 324–329, 2013, doi: 10.1109/MSN.2013.74.

A. Saravanaselvan and B. Paramasivan, “Implementation of an Efficient Light Weight Security Algorithm for Energy-Constrained Wireless Sensor Nodes,” Circuits Syst., vol. 07, no. 09, pp. 2234–2241, 2016, doi: 10.4236/cs.2016.79194.

M. A. Hamid and C. S. Hong, “Energy conserving security mechanisms for wireless sensor networks,” Ann. des Telecommun. Telecommun., vol. 64, no. 11–12, pp. 723–734, 2009, doi: 10.1007/s12243-009-0088-z.

S. Randhawa and S. Jain, “An intelligent PSO-based energy efficient load balancing multipath technique in wireless sensor networks,” Turkish J. Electr. Eng. Comput. Sci., vol. 25, no. 4, pp. 3113–3131, 2017, doi: 10.3906/elk-1606-206.

Downloads

Published

05.06.2024

How to Cite

Otisitswe Kebotogetse. (2024). A Secured Elliptic Curve Cryptography Authentication Scheme for Advanced Metering Infrastructure Communication. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 4182–4188. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6131

Issue

Section

Research Article