4.6 Article

A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography

Journal

IEEE SYSTEMS JOURNAL
Volume 13, Issue 3, Pages 2830-2838

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2018.2876226

Keywords

Anonymity; formal proof; key agreement systems; simulation; smart grid systems

Funding

  1. Program for New Century Excellent Talents in Fujian Province University (2018)
  2. University Distinguished Young Research Talent Training Program of Fujian Province (2016)
  3. Hunan Provincial Natural Science Foundation of China [2018JJ3191]
  4. National Natural Science Foundation of China [61572013, 61772194]

Ask authors/readers for more resources

Cyber-physical systems (CPSs) have attracted the attention of researchers from all disciplines. In such systems, physical devices collect data, interact with Internet, and send the gathered data to serve people. As one important part of such systems, a smart grid is accepted widely and has played a great role for information and communication technology (ICT) and power communities. Secure communication in the smart grid turns to be an urgent aim in the CPS. Several key agreement schemes have been devised in the literature for smart grids. Unfortunately, researchers are still searching for good ways to make the smart grid own anonymity and efficiency simultaneously. This study proposes a novel key agreement scheme for a smart grid with elliptic curve cryptography. Then, we use formal proof based on an authenticated key agreement to give the negligible probability of the attacker. The ProVerif code also proves that our scheme can withstand the simulated attackers under the Dolev-Yao model. By comparing of security properties and performance, our scheme is better than other recent competing schemes. Moreover, via simulation analysis using NS-3, it is found that our scheme is efficient and practical in communication.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Edge-Assisted Intelligent Device Authentication in Cyber-Physical Systems

Yanrong Lu, Ding Wang, Mohammad S. Obaidat, Pandi Vijayakumar

Summary: Cyber-physical system (CPS) combined with artificial intelligence (AI) is used to extract information from the large volumes of data in the Industrial Internet of Things (IIoT). However, the traditional host-centric communication model of the current Internet faces challenges due to the increasing data traffic and number of IIoT devices. To address this, we propose an information-centric networking (ICN)-based system model that processes data closer to the edge in CPS. We also propose an edge-assisted authentication scheme in CPS to protect against unauthorized access and reduce workload for resource-constrained devices.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

A Contactless Authentication System Based on WiFi CSI

Chi Lin, Pengfei Wang, Chuanying Ji, Mohammad S. Obaidat, Lei Wang, Guowei Wu, Qiang Zhang

Summary: The ubiquitous and fine-grained features of WiFi signals make it promising for contactless authentication. Existing methods are sensitive to environmental dynamics and over-depend on certain activities. This article presents WiTL, a transfer learning-based contactless authentication system that detects unique human features and removes environment dynamics. The system includes a Height Estimation algorithm based on Angle of Arrival and a transfer learning technology combined with Residual Network and adversarial network. Experiments demonstrate WiTL's high accuracy in multi-scenes and multi-activities identity recognition, surpassing state-of-the-art systems.

ACM TRANSACTIONS ON SENSOR NETWORKS (2023)

Article Computer Science, Information Systems

Nondeterministic Evaluation Mechanism for User Recruitment in Mobile Crowd-Sensing

Ying Xie, Xiaohui Liu, Mohammad S. Obaidat, Xiong Li, Pandi Vijayakumar

Summary: Based on IoB, MCS utilizes IoT to recruit users by analyzing behavioral patterns. However, due to nondeterministic user mobility and behaviors, MCS cannot provide stable and high-quality services. This article proposes a stochastic semialgebraic hybrid system (SSAHS) model to characterize user mobility and behaviors, and introduces a nondeterministic evaluation mechanism to measure and predict user behavior and recruit high-quality users. Simulation experiments demonstrate that the proposed user recruitment scheme achieves higher quality of service compared to competing strategies.

ACM TRANSACTIONS ON SENSOR NETWORKS (2023)

Article Chemistry, Physical

Molten salt guided synthesis of carbon Microfiber/FeS dielectric/magnetic composite for microwave absorption application

Zhiqian Yang, Liqun Duan, Gang Chang, Wenke Zhou, Zhi Zhang, Fan Wu, Aming Xie, Ziming Xiong

Summary: In this study, a series of carbon microfiber/FeS composites were synthesized using a molten-salt-guided synthetic strategy. The microstructures, electromagnetic response behaviors, and microwave absorption properties of these composites were systematically investigated. The results showed that the prepared composites exhibited effective microwave absorption performance, and the choice of molten salt system had an influence on the properties of the composites.

CARBON (2023)

Article Computer Science, Information Systems

Privacy-Preserving Federated Learning for Internet of Medical Things Under Edge Computing

Ruijin Wang, Jinshan Lai, Zhiyang Zhang, Xiong Li, Pandi Vijayakumar, Marimuthu Karuppiah

Summary: This article proposes a Privacy Protection Scheme for Federated Learning under Edge Computing (PPFLEC), which addresses the privacy disclosure and security issues in edge intelligent computing through a lightweight privacy protection protocol, an algorithm based on digital signature and hash function, and a periodic average training strategy.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2023)

Article Computer Science, Information Systems

Capitalize Your Data: Optimal Selling Mechanisms for IoT Data Exchange

Qinya Li, Zun Li, Zhenzhe Zheng, Fan Wu, Shaojie Tang, Zhao Zhang, Guihai Chen

Summary: With the fast-growing market demand, more and more IoT data is being traded online in cloud-based data marketplaces. However, data consumers face difficulties in making purchasing decisions due to uncertain data quality and inflexible pricing interface. To address these issues, potential solutions include launching data demonstrations and releasing free sampling data to reduce uncertainty about data quality, and implementing flexible pricing based on the volume of data used. The economic benefits of these mechanisms are not yet clear. In this paper, we design optimal data selling mechanisms for IoT data exchange and derive two main findings based on theoretical analysis and evaluation on a real-world Taxi GPS dataset.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Information Systems

Blockchain-Oriented Data Exchange Protocol With Traceability and Revocation for Smart Grid

Prince Silas Kwesi Oberko, Tianang Yao, Hu Xiong, Saru Kumari, Sachin Kumar

Summary: This article presents a secure access design for smart grids based on the Ethereum blockchain, resolving security issues in the smart energy system. The design includes functions such as identity verification, public-key storage, and revocable lists, ensuring system security under complex theory and multi-attack scenarios.

JOURNAL OF INTERNET TECHNOLOGY (2023)

Article Computer Science, Hardware & Architecture

An energy and time-saving task scheduling algorithm for UAV-IoT collaborative system

Anuradha Banerjee, Abu Sufian, Ashutosh Srivastava, Sachin Kumar Gupta, Saru Kumari, Sachin Kumar

Summary: Unmanned Aerial Vehicles (UAVs) have the potential to enhance Internet of Things (IoT) devices through various sensors and systems. However, there are challenges such as resource allocation, security, trajectory optimization, and energy management that require extensive research. In this article, an energy-efficient and time-saving task scheduling algorithm is proposed, which effectively divides IoT devices into clusters based on proximity. By using an ARMA model, the algorithm predicts task arrival times and estimated payments, allowing cluster heads to advise UAVs on their next arrival time. Simulation results demonstrate significant improvements in energy and delay compared to existing task scheduling methods. The ARMA model ensures efficient utilization of UAV processing capacity by ensuring a sufficient task queue at cluster heads.

MICROPROCESSORS AND MICROSYSTEMS (2023)

Article Computer Science, Information Systems

xperbp: a cloud-based lightweight mutual authentication protocol

Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari

Summary: Cloud-based RFID system provides real-time data for easy access and interpretation. However, the security and privacy of constrained devices in these systems pose challenges.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2023)

Article Computer Science, Hardware & Architecture

Characterizing User Association Patterns for Optimizing Small-Cell Edge System Performance

Fan Wu, Feng Lyu, Huaqing Wu, Ju Ren, Yaoxue Zhang, Xuemin (Sherman) Shen

Summary: This article explores data-driven approaches to optimize edge system performance by mining user association patterns in WLAN. The study describes the collected association traces and analyzes the impact of user association patterns on edge system performance. Three data-driven approaches are proposed, including efficient resource deployment, mobility-aware user service migration, and distributed cooperative learning for edge intelligence. A case study on distributed learning validates the effectiveness of the proposed cooperation scheme, CoLo.

IEEE NETWORK (2023)

Article Engineering, Civil

An Efficient and Physically Secure Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network

Muhammad Asad Saleem, Xiong Li, Muhammad Faizan Ayub, Salman Shamshad, Fan Wu, Haider Abbas

Summary: The popularity of vehicles has led to the development of smart cities, making vehicular ad-hoc network (VANET) a widely used communication method for obtaining information about road conditions, speed, vehicle location, and traffic congestion. However, the security of private data in VANET is a critical task due to various security threats. In this article, a lightweight and secure privacy-preserving key agreement protocol for VANETs is proposed, which utilizes hashing technique for efficient and secure data transmission.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Telecommunications

A module lattice based construction of post quantum secure blockchain architecture

Dharminder Chaudhary, M. S. P. Durgarao, Dheerendra Mishra, Saru Kumari

Summary: This article introduces a blockchain design using module lattices and efficient aggregate signatures for verifying multiple nodes. The design ensures security against quantum attacks and is simulated in ns-3 for latency and throughput testing.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2023)

Article Engineering, Multidisciplinary

PCNNCEC: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration

Jing Wang, Debiao He, Aniello Castiglione, Brij B. Gupta, Marimuthu Karuppiah, Libing Wu

Summary: Deploying CNN inference on resource-constrained devices is a challenge in IIoT, but a new framework called PCNNCEC has been designed to address this issue. The framework enables efficient and privacy-preserving CNN inference through private comparison protocols and secure two-party computation protocols. Experimental results show that PCNNCEC achieves a better tradeoff between latency and throughput compared to other protocols.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Review Materials Science, Multidisciplinary

The vital application of rare earth for future high-performance electromagnetic wave absorption materials: A review

Jing Qiao, Lutong Li, Jiurong Liu, Na Wu, Wei Liu, Fan Wu, Zhihui Zeng

Summary: Rare earth plays a crucial role in electromagnetic wave absorption materials, and the strategies of doping rare earth elements and constructing rare earth oxide composites are important for the fabrication of high-efficiency electromagnetic wave absorption materials. This review provides a comprehensive summary of the research background, classification, features, progress, and future development of rare earth electromagnetic wave absorption materials, offering guidance for future development.

JOURNAL OF MATERIALS SCIENCE & TECHNOLOGY (2024)

No Data Available