
Research Article
Anonymous Key Agreement and Mutual Authentication Protocol for Smart Grids
@INPROCEEDINGS{10.1007/978-3-030-98002-3_24, author={Vincent Omollo Nyangaresi and Zaid Ameen Abduljabbar and Salah H. Abbdal Refish and Mustafa A. Al Sibahee and Enas Wahab Abood and Songfeng Lu}, title={Anonymous Key Agreement and Mutual Authentication Protocol for Smart Grids}, proceedings={Cognitive Radio Oriented Wireless Networks and Wireless Internet. 16th EAI International Conference, CROWNCOM 2021, Virtual Event, December 11, 2021, and 14th EAI International Conference, WiCON 2021, Virtual Event, November 9, 2021, Proceedings}, proceedings_a={CROWNCOM \& WICON}, year={2022}, month={3}, keywords={Ephemerals Mutual authentication Nonce Privacy leaks Security Session keys Smart grids}, doi={10.1007/978-3-030-98002-3_24} }
- Vincent Omollo Nyangaresi
Zaid Ameen Abduljabbar
Salah H. Abbdal Refish
Mustafa A. Al Sibahee
Enas Wahab Abood
Songfeng Lu
Year: 2022
Anonymous Key Agreement and Mutual Authentication Protocol for Smart Grids
CROWNCOM & WICON
Springer
DOI: 10.1007/978-3-030-98002-3_24
Abstract
The security and privacy protection of smart grid data exchanged over the open and public wireless communication channels is critical yet challenging in this environment. Conventionally, public key cryptography, group signatures, blind signatures, identity based schemes and elliptic curve cryptography could provide the much needed security and privacy. However, all these techniques either lack some smart grid security requirements or have intensive communication, storage and computation overheads. This obviously renders them inefficient for resource-constrained smart grid network devices. In this paper, an anonymous key agreement and authentication protocol to address some of these challenges is proposed. The simulation results showed that the proposed protocol is the most efficient in terms of bandwidth and computation requirements. It also required relatively less memory space during its entire execution than some of the related protocols. Further, it is demonstrated that it offers both backward and forward key secrecy, anonymity, and is robust against impersonation, session hijacking, privileged insider, side-channels, packet replays, packet injection and privacy leaks attacks.