Font Size: a A A

Study Of Authentication Mode For Mobile User Smart Grid

Posted on:2013-01-15Degree:MasterType:Thesis
Country:ChinaCandidate:F GuoFull Text:PDF
GTID:2212330362467704Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the intensification of the global energy crisis and the increasingdemands for electricity in modern society, the concept of Smart Gridemerged and has become a hot topic of discussion and study in worldwideexperts and scholars in the past two years. It also has attracted more andmore attentions by governments, electric power enterprises and relatedresearch institutions. Smart grid is essentially an intelligent and new powergrid which is called "Smart Grid" abroad. Compared with the traditionalpower grid, Smart Grid not only brings us many benefits but also makes usfacing many more security issues and challenges. In addition, mobile users'demands for real-time and outdoor electricity are continuing increased inSmart Grid, but the existing authentication mode for Smart Grid cannoteffectively solve the problem of authentication for mobile users since it islimited by the traditional fixed supply of electricity and therefore unable tomeet the application needs of mobile users in Smart Grid.According to these issues and application needs, this paper mainlycompletes the following research:(1) This paper proposes a concept of Mobile User Smart Grid (MUSG)and gives a detailed description of the application scene under MUSGaccording to the application needs of mobile users in Smart Grid. It reallymeets the application needs of mobile users in Smart Grid since it achievesa flexible supply of electricity which uses mobile users as the vectors ofelectricity consumption instead of the traditional unitary supply ofelectricity which uses fixed locations as the vectors of electricityconsumption. After that, this paper gives an analysis of the problems andchallenges which appear in MUSG due to the drawbacks of the existing authentication mode for Smart Grid. And then this paper considers usingthe identity-based cryptographic techniques to solve the problem ofauthentication for MUSG according to the advantages and features of theidentity-based cryptographic techniques.(2) In order to achieve the authentication for mobile users in SmartGrid, this paper presents an identity-based signature scheme and anidentity-based encryption scheme, respectively, and also gives the proof ofcorrectness and security. Analysis shows that, based on the difficulty of theComputational Diffie-Hellman assumption, the signature scheme is secureagainst an adaptive chosen message and identity attack under the randomoracle model. The encryption scheme is secure against an adaptive chosenciphertext attack under the random oracle model.(3) This paper gives a specific identity-based authentication scheme forMUSG according to the concept of MUSG and the application scene underMUSG on the basis of the identity-based signature scheme and theidentity-based encryption scheme presented before. It primarily combinesthese identity-based schemes and finally achieves the authentication formobile users in Smart Grid.(4) This scheme can effectively solve the problem of authentication formobile users in MUSG and really meet the demands of the real-time andoutdoor electricity consumption compared with the existing authenticationschemes for Smart Grid. It is highly secure against the conspiracy attacksand the replay attacks. This scheme also highly protects the consumptionprivacy of mobile users while reducing the system cost in computationand communication. So it really meets the application needs of MUSG andcontributes to help the services of Smart Grid conversing from fixed usersto mobile users.
Keywords/Search Tags:Smart Grid, Mobile Users, Authentication Scheme, Secure and Efficient
PDF Full Text Request
Related items