Saxena, N., Choi, B.J. and Lu, R., 2016. Authentication and Authorization Scheme for Various User-Roles and Devices in Smart Grid. IEEE Transactions on Information Forensics and Security, 11 (5), 907 - 921.
Full text available as:
|
PDF ((c) 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users)
AA.pdf - Accepted Version Available under License Creative Commons Attribution Non-commercial No Derivatives. 1MB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
DOI: 10.1109/TIFS.2015.2512525
Abstract
The smart grid, as the next generation of the power grid, is characterized by employing many different types of intelligent devices, such as intelligent electronic devices located at substations, smart meters positioned in the home area network, and outdoor field equipment deployed in the fields. Also, there are various users in the smart grid network, including customers, operators, maintenance personnel, and etc., who use these devices for various purposes. Therefore, a secure and efficient mutual authentication and authorization scheme is needed in the smart grid to prevent various insider and outsider attacks on many different devices. In this paper, we propose an authentication and authorization scheme for mitigating outsider and insider threats in the smart grid by verifying the user authorization and performing the user authentication together whenever a user accesses the devices. The proposed scheme computes each user-role dynamically using an attribute-based access control and verifies the identity of user together with the device. Security and performance analysis show that the proposed scheme resists various insider as well as outsider attacks, and is more efficient in terms of communication and computation costs in comparison with the existing schemes. The correctness of the proposed scheme is also proved using BAN-Logic and Proverif.
Item Type: | Article |
---|---|
ISSN: | 1556-6021 |
Additional Information: | (c) 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works |
Uncontrolled Keywords: | Smart Grid; Authentication; Authorization; Insider Threat; Security |
Group: | Faculty of Science & Technology |
ID Code: | 26837 |
Deposited By: | Symplectic RT2 |
Deposited On: | 06 Feb 2017 15:23 |
Last Modified: | 14 Mar 2022 14:02 |
Downloads
Downloads per month over past year
Repository Staff Only - |