z-logo
open-access-imgOpen Access
Scalable and efficient authentication scheme for secure smart grid communication
Author(s) -
Hammami Hamza,
Ben Yahia Sadok,
Obaidat Mohammad S.
Publication year - 2020
Publication title -
iet networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.466
H-Index - 21
ISSN - 2047-4962
DOI - 10.1049/iet-net.2019.0225
Subject(s) - smart grid , computer science , computer security , scalability , authentication (law) , energy consumption , computer network , electricity , telecommunications , engineering , electrical engineering , database
Smart grids represent the latest trend that has disrupted the energy supplier sector. They are in the form of smart meters that automatically communicate power consumption data to the power grid operator. In fact, the smart‐grid technology is a great solution for energy suppliers and their end customers, enabling them to perform more frequent measurements of energy, monitor their consumption and thus control the amount of their energy bills. Although the smart‐grid technology brings significant gains in performance and economy to its users. However, this advanced technology immediately raises different types of attacks that can adversely affect the operation of smart grids by falsifying electricity consumption data transmitted between smart meters and the power distribution server and therefore through the generation of incorrect energy billing invoices. The reflection carried out in the proposed approach is part of this problem. It is particularly concerned with realising a new privacy‐protected authenticated key agreement scheme for secure communication between smart meters and energy providers. The conducted experiments show that the proposed authentication scheme exceeds its competitors in terms of calculation costs and resistance to various types of attacks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here