A Novel Efficient Signcryption Scheme for Resource-Constrained Smart Terminals in Cyber-Physical Power Systems

12/08/2022
by   Xue Li, et al.
0

Most of the existing signcryption schemes generate pseudonym by key generation center (KGC) and usually choose bilinear pairing to construct authentication schemes. The drawback is that these schemes not only consume heavy computation and communication costs during information exchange, but also can not eliminate security risks due to not updating pseudonym, which do not work well for resource-constrained smart terminals in cyber-physical power systems (CPPSs). The main objective of this paper is to propose a novel efficient signcryption scheme for resource-constrained smart terminals. First, a dynamical pseudonym self-generation mechanism (DPSGM) is explored to achieve privacy preservation and avoid the source being linked. Second, combined with DPSGM, an efficient signcryption scheme based on certificateless cryptography (CLC) and elliptic curve cryptography (ECC) is designed, which reduces importantly computation and communication burden. Furthermore, under random oracle model (ROM), the confidentiality and non-repudiation of the proposed signcryption scheme are transformed into elliptic curve discrete logarithm and computational Diffie-Hellman problems that cannot be solved in polynomial time, which guarantees the security. Finally, the effectiveness and feasibility of the proposed signcryption scheme are confirmed by experimental analyses.

READ FULL TEXT

page 1

page 3

research
08/26/2020

An Energy Efficient Authentication Scheme using Chebyshev Chaotic Map for Smart Grid Environment

As one of the important applications of Smart grid, charging between ele...
research
06/13/2023

Modification in Elliptic Curve Cryptography based Mutual authentication scheme for smart grid communication using biometric approach

Smart grid is a self-sufficient system. That tracks how the energy is us...
research
07/21/2019

LiSA: A Lightweight and Secure Authentication Mechanism for Smart Metering Infrastructure

Smart metering infrastructure (SMI) is the core component of the smart g...
research
07/21/2019

A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing

With the advent of the Internet-of-Things (IoT), vehicular networks and ...
research
11/09/2012

Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)

In this paper secured wireless communication using fuzzy logic based hig...
research
04/02/2019

An Efficient Blockchain-based Hierarchical Authentication Mechanism for Energy Trading in V2G Environment

Vehicle-to-grid (V2G) networks have emerged as a new technology in moder...
research
08/01/2020

Cyber-Resilient Transactive Energy System Design over Insecure Communication Links

In this paper, the privacy and security issues associated with transacti...

Please sign up or login with your details

Forgot password? Click here to reset