Node Authentication and Key Generation/Update Protocol and data Integrity Verification for Safety Communication in Smart Grid Environment
In other words, such a data message has a user's personal information or living pattern, the charging information offered by Server or a variety of service information. [...]if the message is modified and fabricated, is reused or stolen by a malicious attacker, or is exposed to other security a...
Saved in:
Published in | Research journal of pharmacy and technology Vol. 12; no. 4; pp. 1625 - 1631 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Raipur
A&V Publications
01.04.2019
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In other words, such a data message has a user's personal information or living pattern, the charging information offered by Server or a variety of service information. [...]if the message is modified and fabricated, is reused or stolen by a malicious attacker, or is exposed to other security attacks, it is expected to face availability invasion and trigger massive financial and physical damage to a supplier and a demander. According to TTAK.OT-04.0006 which is the standard document of smart grid communication requirements of Telecommunications Technology Association (TTA), it is necessary to take into account the securities of confidentiality, integrity, availability, responsibility, and privacy over communication network, to provide safe communication network, to include authentication and encryption, and provide access control function. 3. If there is any slight change in a message in the low layer, a hash value of a parent node can be changed greatly. [...]DCU and Smart Meter compare hash values after synchronization in order to verify data integrity. According to the comparative analysis on safety and performance between the proposed protocol and the IEEE802.1x protocol used in the conventional wired and wireless communication environment, the proposed protocol provided two-way authentication between nodes and completed authentication three times of Handshake without authentication certificate and its one-time authentication time was 88.7 ms shorter than the IEEE802.1x protocol. |
---|---|
ISSN: | 0974-3618 0974-360X 0974-306X |
DOI: | 10.5958/0974-360X.2019.00271.3 |