A lightweight authentication mechanism in MIP networks

2016 ◽  
Vol 9 (17) ◽  
pp. 4272-4284
Author(s):  
Green Kim ◽  
Youngse Kim ◽  
Ung Heo ◽  
Keecheon Kim
2018 ◽  
Vol 8 (9) ◽  
pp. 1508 ◽  
Author(s):  
Israa Aziz ◽  
Hai Jin ◽  
Ihsan Abdulqadder ◽  
Zaid Hussien ◽  
Zaid Abduljabbar ◽  
...  

Self-reconfiguration in electrical power grids is a significant tool for their planning and operation during both normal and abnormal conditions. The increasing in employment of Intelligent Electronic Devices (IEDs), as well as the rapid growth of the new communication technologies have increased the application of Feeder Automation (FA) in Distribution Networks (DNs). In a Smart Grid (SG), automation equipment, such as a Smart Breaker (SB), is used. Using either a wired or a wireless network or even a combination of both, communication between the Control Center (CC) and SBs can be made. Nowadays, wireless technology is widely used in the communication of DNs. This may cause several security vulnerabilities in the power system, such as remote attacks, with the goal of cutting off the electrical power provided to significant consumers. Therefore, to preserve the cybersecurity of the system, there is a need for a secure scheme. The available literature investments proposed a heavyweight level in security schemes, while the overhead was not considered. To overcome this drawback, this paper presents an efficient lightweight authentication mechanism with the necessary steps to ensure real-time automatic reconfiguration during a fault. As a first stage, authentication will be made between CC and SB, SB then sends the information about its status. To ensure the integrity of the authentication exchange, a hash function is used, while the symmetric algorithm is used to ensure privacy. The applicability of the suggested scheme has been proved by conducting security performance and analysis. The proposed scheme will be injected on ABB medium voltage breaker with the REF 542plus controller. Therefore, the probable benefit of the suggested scheme is the contribution to provide more flexibility for electrical utilities in terms of reducing the overall computational overhead and withstanding to various types of attacks, while also opening new prospects in FA of SGs.


2019 ◽  
Vol 6 (1) ◽  
pp. 288-296 ◽  
Author(s):  
Alireza Esfahani ◽  
Georgios Mantas ◽  
Rainer Matischek ◽  
Firooz B. Saghezchi ◽  
Jonathan Rodriguez ◽  
...  

2020 ◽  
Vol 150 ◽  
pp. 102496 ◽  
Author(s):  
Mohammad Wazid ◽  
Ashok Kumar Das ◽  
Vivekananda Bhat K ◽  
Athanasios V. Vasilakos

With the widespread popularity of the Internet of Things (IoT), different sectors-based applications are increasingly developed. One of the most popular application layer protocols is the Constrained Application Protocol (CoAP), and the necessity of ensuring data security in this layer is crucial. Moreover, attackers target the vulnerabilities of IoT to gain access to the system, which leads to a security threat and violate privacy. Typically, user authentication and data encryption are applied for securing data communication over a public channel between two or more participants. However, most of the existing solutions use cryptography for achieving security, with the exception of high computation cost. Hence, these solutions fail to satisfy the resource-constrained characteristics of IoT devices. Therefore, a lightweight security mechanism is required for achieving both secure transmission and better performance. This paper proposes a Lightweight Authentication with Two-way Encryption for Secure Transmission in CoAP Protocol (LATEST) that provides a secure transmission between the server and IoT devices. This mutual authentication mechanism uses ROT 18 Cipher with XoR operation and 128-bit AES based encryption for securing the data transmission. The ROT18 Cipher is a monoalphabetic substitution cipher, which is a combination of ROT13 and ROT5. The proposed scheme employs symmetric encryption in both client and server for ensuring secure authentication and mutually confirm each other identity. In addition, the proposed LATEST scheme ensures confidentiality and integrity by being resistant to replay attacks, impersonation attacks, and modification attacks. The experimental evaluation demonstrates that the proposed LATEST scheme is lightweight and provides better security compared to the existing scheme.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 43711-43724 ◽  
Author(s):  
Zeeshan Ali ◽  
Shehzad Ashraf Chaudhry ◽  
Muhammad Sher Ramzan ◽  
Fadi Al-Turjman

Author(s):  
Waseem Iqbal ◽  
Haider Abbas ◽  
Pan Deng ◽  
Jiafu Wan ◽  
Bilal Rauf ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document