{"title":"面向智能电网安全认证的掩码对称密钥加密验证码","authors":"V. O. Nyangaresi","doi":"10.1109/gpecom55404.2022.9815718","DOIUrl":null,"url":null,"abstract":"Although many smart grid authentication protocols have been presented in literature, majority of them remain susceptible to numerous attacks. In addition, some of these protocols are based on computationally intensive cryptographic primitives, which render them inefficient. To address some of these challenges, a protocol based on masked symmetric key encrypted verification codes is presented in this paper. The security analysis carried out shows that this protocol provides message confidentiality, unlinkability, and traceability for malicious network entities. It is also resilient against side-channel and forgery attacks. In terms of efficiency, limited numbers of elliptic curve multiplication and one way-hashing operations are executed during mutual authentication, message signing and verification. As such, this protocol exhibits the least computation and communication complexities in comparison with its peers.","PeriodicalId":441321,"journal":{"name":"2022 4th Global Power, Energy and Communication Conference (GPECOM)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Masked Symmetric Key Encrypted Verification Codes for Secure Authentication in Smart Grid Networks\",\"authors\":\"V. O. Nyangaresi\",\"doi\":\"10.1109/gpecom55404.2022.9815718\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Although many smart grid authentication protocols have been presented in literature, majority of them remain susceptible to numerous attacks. In addition, some of these protocols are based on computationally intensive cryptographic primitives, which render them inefficient. To address some of these challenges, a protocol based on masked symmetric key encrypted verification codes is presented in this paper. The security analysis carried out shows that this protocol provides message confidentiality, unlinkability, and traceability for malicious network entities. It is also resilient against side-channel and forgery attacks. In terms of efficiency, limited numbers of elliptic curve multiplication and one way-hashing operations are executed during mutual authentication, message signing and verification. As such, this protocol exhibits the least computation and communication complexities in comparison with its peers.\",\"PeriodicalId\":441321,\"journal\":{\"name\":\"2022 4th Global Power, Energy and Communication Conference (GPECOM)\",\"volume\":\"280 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 4th Global Power, Energy and Communication Conference (GPECOM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/gpecom55404.2022.9815718\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 4th Global Power, Energy and Communication Conference (GPECOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/gpecom55404.2022.9815718","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Masked Symmetric Key Encrypted Verification Codes for Secure Authentication in Smart Grid Networks
Although many smart grid authentication protocols have been presented in literature, majority of them remain susceptible to numerous attacks. In addition, some of these protocols are based on computationally intensive cryptographic primitives, which render them inefficient. To address some of these challenges, a protocol based on masked symmetric key encrypted verification codes is presented in this paper. The security analysis carried out shows that this protocol provides message confidentiality, unlinkability, and traceability for malicious network entities. It is also resilient against side-channel and forgery attacks. In terms of efficiency, limited numbers of elliptic curve multiplication and one way-hashing operations are executed during mutual authentication, message signing and verification. As such, this protocol exhibits the least computation and communication complexities in comparison with its peers.