Font Size: a A A

Research And Design Of Authentication And Key Exchange Scheme In Smart Grid

Posted on:2022-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q LiFull Text:PDF
GTID:2492306341969369Subject:Electrical engineering
Abstract/Summary:PDF Full Text Request
The high-speed two-way real-time communication network is an indispensable part of the smart grid.A mass of electricity consumption data,grid operation information,and grid control instruction frequently flow in the communication network.The data makes the electricity company can elaborately analyze users’ behavior pattern,gird state to optimize the gird operation.The data also provides functions such as real-time feedback,dynamic price,auxiliary decision support,distributed generation access,and ensures the gird operating reliably,securely,economically,and efficiently.With the fast development of information and communication technologies,the smart grid is faced with a greater threat of information security.Using network attacks,an attacker may obtain vast sensitive information from the communication channel.He may steal the privacy of the user,modifies the control instruction,disturb the operation of the grid and break the grid security with sensitive information.Thus,it is necessary to study the security in smart grid communication.This research focuses on authentication and key exchange scheme,which makes the two entities in the communication network authenticate other’s identity and establish a session key.With this session key,the two entities can encrypt the communication messages to ensure security and confidentiality.After analyzing existing schemes,it is found that many of them are inadequate or insecure.In this dissertation,we point out the weakness of Chen et al.’s and Li et al.’s scheme and demonstrate the detailed attack steps.Then we propose two authentication and key exchange schemes in a smart gird environment based on elliptic curve cryptography.One of the schemes applies to devices that support manual control and management such as data aggregator in key point.The other scheme allows the devices,such as smart meters,to work automatically.To demonstrate the proposed schemes can withstand all well-known attacks,we provide detailed security analysis with BAN logic,the Random Oracle Model,and the Pro Verif verification tool.Meanwhile,we analyze the security,computational,and communication performance of the proposed schemes.The results show that the proposed schemes have better performance than other existing schemes.
Keywords/Search Tags:Smart Grid, Authentication, Key Exchange, Elliptic Cuvre Cryptography, Information Security
PDF Full Text Request
Related items