Node Authentication and Key Generation/Update Protocol and data Integrity Verification for Safety Communication in Smart Grid Environment

In other words, such a data message has a user's personal information or living pattern, the charging information offered by Server or a variety of service information. [...]if the message is modified and fabricated, is reused or stolen by a malicious attacker, or is exposed to other security a...

Full description

Saved in:
Bibliographic Details
Published inResearch journal of pharmacy and technology Vol. 12; no. 4; pp. 1625 - 1631
Main Authors Choi, Won-Kyu, Park, Jong-Oh, Jun, Moon-Seok
Format Journal Article
LanguageEnglish
Published Raipur A&V Publications 01.04.2019
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In other words, such a data message has a user's personal information or living pattern, the charging information offered by Server or a variety of service information. [...]if the message is modified and fabricated, is reused or stolen by a malicious attacker, or is exposed to other security attacks, it is expected to face availability invasion and trigger massive financial and physical damage to a supplier and a demander. According to TTAK.OT-04.0006 which is the standard document of smart grid communication requirements of Telecommunications Technology Association (TTA), it is necessary to take into account the securities of confidentiality, integrity, availability, responsibility, and privacy over communication network, to provide safe communication network, to include authentication and encryption, and provide access control function. 3. If there is any slight change in a message in the low layer, a hash value of a parent node can be changed greatly. [...]DCU and Smart Meter compare hash values after synchronization in order to verify data integrity. According to the comparative analysis on safety and performance between the proposed protocol and the IEEE802.1x protocol used in the conventional wired and wireless communication environment, the proposed protocol provided two-way authentication between nodes and completed authentication three times of Handshake without authentication certificate and its one-time authentication time was 88.7 ms shorter than the IEEE802.1x protocol.
ISSN:0974-3618
0974-360X
0974-306X
DOI:10.5958/0974-360X.2019.00271.3