Efficient mutual authentication using kerberos for resource constraint smart meter in advanced metering infrastructure
The continuous development of information communication technology facilitates the conventional grid in transforming into an automated modern system. Internet-of-Things solutions are used along with the evolving services of end-users to the electricity service provider for smart grid applications. I...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Published: |
Walter de Gruyter GmbH
2023
|
Online Access: | http://psasir.upm.edu.my/id/eprint/107630/ https://www.degruyter.com/document/doi/10.1515/jisys-2021-0095/html |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Putra Malaysia |
Summary: | The continuous development of information communication technology facilitates the conventional grid in transforming into an automated modern system. Internet-of-Things solutions are used along with the evolving services of end-users to the electricity service provider for smart grid applications. In terms of various devices and machine integration, adequate authentication is the key to an accurate source and destination in advanced metering infrastructure (AMI). Various protocols are deployed to lead the identification between two parties, which require high computation time and communicational bit operations for system development. Therefore, Kerberos-based authentication protocols were designed in this study with the assistance of elliptic curve cryptography to manage the mutual authentication between two parties and reduce the time and bit operations. The protocols were evaluated in a widely adopted tool, AVISPA, which builds an understanding of the proposed protocol and ensures mutual authentication without unauthorized knowledge. In addition, upon comparing security and performance assessments to the current schemes, it was found that the protocol in this study required less time and bits to transmit information. Consequently, it effectively provides multiple security features making it suitable for resource constraint smart meters in AMI. |
---|