[go: up one dir, main page]

Computer Science ›› 2018, Vol. 45 ›› Issue (7): 158-161.doi: 10.11896/j.issn.1002-137X.2018.07.027

• Information Security • Previous Articles     Next Articles

Authentication Protocol for Smart Meter Based on Quadratic Residues

XU Yang ,YUAN Jin-sha, GAO Hui-sheng ,ZHAO Zhen-bing   

  1. School of Electrical and Electronic Engineering,North China Electric Power University,Baoding,Hebei 071003,China
  • Received:2017-02-27 Online:2018-07-30 Published:2018-07-30

Abstract: Only little memory in RFID tag is available for security problems under the stadard of EPC Class 1 Gen-2.Therefore,this paper proposed a RFID authentication protocol based on quadratic residue property.The protocol gua-rantees the forward security and anonymity of the tag by presetting the hash value of a smart meter ID in the reader and tag,and validates the identity of the tag by quadratic residue property.Then BAN logic theory is used to prove the security.Compared with the other two kinds of smart meter authentication protocols,this protocol has low complexity and can resist many kinds of attacks,ensuring user’s privacy and security.

Key words: Authenticated protocol, BAN logic, Hash, Quadratic residues, Smart meter

CLC Number: 

  • TN918.91
[1]YU Y X,LUAN W P.Smart Grid.Power System & Clean Energy,2009,127(9):251-253.
[2]KHURANA H,HADLEY M,LU N,et al.Smart-Grid Security Issues.IEEE Security & Privacy,2010,8(1):81-85.
[3]SHARMA K,SAINI L M.Performance analysis of smart metering for smart grid:An overview.Renewable & Sustainable Energy Reviews,2015,49:720-735.
[4]ZHAO B,ZHAI F,LI T Y,et al.Secure Communication Protocol for Smart Meter Bidirectional Interaction System.Automation of Electric Power System,2016,47(17):93-98.(in Chinese)
赵兵,翟峰,李涛永,等.适用于智能电表双向互动系统的安全通信协议.电力系统自动化,2016,47(17):93-98.
[5]DUAN J H,CUI A J,ZHANG X,et al,The Network Information Security of Smart Grid Architecture.Information Security and Technology,2015(11):52-54.(in Chinese)
段军红,崔阿军,张驯,等.面向智能电网的网络信息安全架构.信息安全与技术,2015(11):52-54.
[6]LIU X Y,ZHANG Q,LI Z M.A Survey on Information Security for Smart Grid.Electric Power ICT,2014,12(4):56-60.(in Chinese)
刘雪艳,张强,李战明.智能电网信息安全研究综述.电力信息与通信技术,2014,12(4):56-60.
[7]HAN Y N,LI F G.Research on combined public key cryptographic scheme for smart grid.Journal of Cryptologic Research,2016,3(4):340-351.(in Chinese)
韩亚楠,李发根.适用于智能电网的组合公钥密码体制研究.密码学报,2016,3(4):340-351.
[8]HU Y,DONG M C.Strengthening the security of network applications with SSL protocol.Automation of Electiric Power Systems,2002,26(15):70-77.(in Chinese)
胡炎,董名垂.用SSL协议加强电力系统网络应用的安全性.电力系统自动化,2002,26(15):70-77.
[9]GARCIA F D,JACOBS B.Privacy-friendly energy-metering via homomorphic encryption∥Security and Trust Management.Springer Berlin Heidelberg,2010:226-238.
[10]XUE R.IK-CPA security implies IE-CCA security in the random oracle model.Science China(Information Sciences),2013,56(3):179-189.
[11]HSIANG H C,KUO H C,SHIH W K.Security Enhancement for a Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems[C]∥Second International Confe-rence on Future Generation Communication and Networking,2008(FGCN’08).IEEE,2008:197-200.
[12]XIAO H G,LI W,WU X R.A lightweight and efficient RFID authentication protocol based on synchronization code.Computer Engineering & Science,2016,38(4):673-678.(in Chinese)
肖红光,李为,巫小蓉.基于同步数的轻量级高效RFID身份认证协议.计算机工程与科学,2016,38(4):673-678.
[13]ZHAO B,GAO X,GAO P P,et al.A lightweight authenticated protocol with key agreement for power utilization information collecting.Automation of Electric Power Systems,2013,37(12):81-86.(in Chinese)
赵兵,高欣,郜盼盼,等.适用于用电信息采集的轻量级认证密钥协商协议.电力系统自动化,2013,37(12):81-86.
[14]XUAN X W,TENG J F,BAI Y.Enhanced RFID Authentication Protocol Based on Quardratic Residue.Computer Enginee-ring,2012,38(3):124-125,129.(in Chinese)
轩秀巍,滕建辅,白煜.基于二次剩余的增强型RFID认证协议.计算机工程,2012,38(3):124-125,129. [15]ROSEN K H.Elementary Number Theory and Its Applications.Beijing:China Machine Press,2004.
[16]WANG Z C,XU D Y,WANG X F,et al.Reliability Analysis and Improvement of BAN Logic.Computer Engineering,2012,38(17):110-115.(in Chinese)
王正才,许道云,王晓峰,等.BAN逻辑的可靠性分析与改进.计算机工程,2012,38(17):110-115.BOYD C,MAO W.On a limitation of BAN logic[M]∥Advances in Cryptology-EUROCRYPT’93.Springer Berlin Heidelberg,1993:240-247.
[1] CAO Xiao-wen, LIANG Mei-yu, LU Kang-kang. Fine-grained Semantic Reasoning Based Cross-media Dual-way Adversarial Hashing Learning Model [J]. Computer Science, 2022, 49(9): 123-131.
[2] ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119.
[3] SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295.
[4] LI Peng-yu, LIU Sheng-li, YIN Xiao-kang, LIU Hao-hui. Detection Method of ROP Attack for Cisco IOS [J]. Computer Science, 2022, 49(4): 369-375.
[5] LIU Feng, ZHANG Jia-hao, ZHOU Jun-jie, LI Mu, KONG De-li, YANG Jie, QI Jia-yin, ZHOU Ai-min. Novel Hash-time-lock-contract Based Cross-chain Token Swap Mechanism of Blockchain [J]. Computer Science, 2022, 49(1): 336-344.
[6] XIA Zhong, XIANG Min, HUANG Chun-mei. Hierarchical Management Mechanism of P2P Video Surveillance Network Based on CHBL [J]. Computer Science, 2021, 48(9): 278-285.
[7] LENG Feng, ZHANG Ming-kai, YAN Zhi-wei, ZHANG Cui-ling, ZENG Yu. Application of Chinese Cryptographic Algorithm in RPKI [J]. Computer Science, 2021, 48(11A): 678-681.
[8] ZOU Ao, HAO Wen-ning, JIN Da-wei, CHEN Gang, TIAN Yuan. Study on Text Retrieval Based on Pre-training and Deep Hash [J]. Computer Science, 2021, 48(11): 300-306.
[9] LI Rui-xiang, MAO Ying-chi, HAO Shuai. Cache Management Method in Mobile Edge Computing Based on Approximate Matching [J]. Computer Science, 2021, 48(1): 96-102.
[10] DENG Liang, XU Geng-lin, LI Meng-jie, CHEN Zhang-jin. Fast Face Recognition Based on Deep Learning and Multiple Hash Similarity Weighting [J]. Computer Science, 2020, 47(9): 163-168.
[11] SHANG Jin-yue, BI Xiu-li, XIAO Bin, LI Wei-sheng. Image Forgery Detection Based on DCT Coefficients Hashing [J]. Computer Science, 2020, 47(6): 310-315.
[12] DENG Yi-jiao, ZHANG Feng-li, CHEN Xue-qin, AI Qing, YU Su-zhe. Collaborative Attention Network Model for Cross-modal Retrieval [J]. Computer Science, 2020, 47(4): 54-59.
[13] PAN Ji-fei,HUANG De-cai. Blockchain Dynamic Sharding Model Based on Jump Hash and Asynchronous Consensus Group [J]. Computer Science, 2020, 47(3): 273-280.
[14] LI Shu-quan,LIU Lei,ZHU Da-yong,XIONG Chao,LI Rui. Protocol of Dynamic Provable Data Integrity for Cloud Storage [J]. Computer Science, 2020, 47(2): 256-261.
[15] ZHANG Xiang-yang,SUN Zi-wen. Automatic Error Correction CRO PUF Key Generation Scheme [J]. Computer Science, 2020, 47(1): 302-308.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!