TY - GEN
T1 - A Secure Identity Authentication Protocol for Edge Data in Smart Grid Environment
AU - Xiao, Lijun
AU - Cai, Jiahong
AU - Qiu, Meikang
AU - Liu, Meiqin
N1 - Publisher Copyright:
© 2021 IEEE.
PY - 2021/6
Y1 - 2021/6
N2 - Edge computing uses devices deployed at the edge of the network to preprocess data to reduce the computing pressure on the central server. Through edge computing, smart grid can process large amounts of data faster, meeting real-time, reliability, and high-efficiency requirements. However, as the number of edge devices continues to increase, the problem of leakage and tampering of private data is gradually exposed. In order to solve this problem, this paper proposes a lightweight identity authentication scheme suitable for smart grid environment based on Elliptic Curve Encryption (ECC) technology. In the proposed protocol, we encrypt the identity and key information through ECC, and use the timestamp to verify the validity of the session. In addition, the proposed protocol is encrypted with a random number for each round of authentication, and an attacker cannot crack our protocol through a replay attack. Experimental analysis shows that the proposed protocol is safety and key information will not be leaked. Finally, the cost analysis shows that the proposed protocol has lower communication and lower calculation cost than other that of related protocols, and is suitable for deployment in large-scale intelligent smart grid environments.
AB - Edge computing uses devices deployed at the edge of the network to preprocess data to reduce the computing pressure on the central server. Through edge computing, smart grid can process large amounts of data faster, meeting real-time, reliability, and high-efficiency requirements. However, as the number of edge devices continues to increase, the problem of leakage and tampering of private data is gradually exposed. In order to solve this problem, this paper proposes a lightweight identity authentication scheme suitable for smart grid environment based on Elliptic Curve Encryption (ECC) technology. In the proposed protocol, we encrypt the identity and key information through ECC, and use the timestamp to verify the validity of the session. In addition, the proposed protocol is encrypted with a random number for each round of authentication, and an attacker cannot crack our protocol through a replay attack. Experimental analysis shows that the proposed protocol is safety and key information will not be leaked. Finally, the cost analysis shows that the proposed protocol has lower communication and lower calculation cost than other that of related protocols, and is suitable for deployment in large-scale intelligent smart grid environments.
KW - Edge computing
KW - identification authentication
KW - information encryption
KW - smart grid
UR - https://www.scopus.com/pages/publications/85112167525
U2 - 10.1109/CSCloud-EdgeCom52276.2021.00042
DO - 10.1109/CSCloud-EdgeCom52276.2021.00042
M3 - 会议稿件
AN - SCOPUS:85112167525
T3 - Proceedings - 2021 8th IEEE International Conference on Cyber Security and Cloud Computing and 2021 7th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2021
SP - 188
EP - 193
BT - Proceedings - 2021 8th IEEE International Conference on Cyber Security and Cloud Computing and 2021 7th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2021
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 8th IEEE International Conference on Cyber Security and Cloud Computing and 2021 7th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2021
Y2 - 26 June 2021 through 28 June 2021
ER -