Next Article in Journal
Laser-Based Mobile Visible Light Communication System
Next Article in Special Issue
Automated ECG Arrhythmia Classification Using Feature Images with Common Matrix Approach-Based Classifier
Previous Article in Journal
Generalized Pulse Width Modulation Switch Model for Converters Based on the Multistate Switching Cell in Discontinuous Conduction Mode
Previous Article in Special Issue
Preliminary Study of Novel Bio-Crypto Key Generation Using Clustering-Based Binarization of ECG Features
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Lightweight Hash-Based Authentication Protocol for Smart Grids

1
Department of Electrical and Computer Engineering, Sungkyunkwan University, 2066 Seobu-ro, Jangan-gu, Suwon-si 16419, Republic of Korea
2
School of Computer and Information Engineering, Kwangwoon University, Seoul-si 01897, Republic of Korea
3
Department of Computer Information Security, Howon University, 64 Impi-myeon, Howondae 3-gil, Gunsan-si 54058, Republic of Korea
*
Author to whom correspondence should be addressed.
Sensors 2024, 24(10), 3085; https://doi.org/10.3390/s24103085
Submission received: 15 April 2024 / Revised: 4 May 2024 / Accepted: 9 May 2024 / Published: 13 May 2024

Abstract

Smart grids integrate information and communications technology into the processes of electricity production, transportation, and consumption, thereby enabling interactions between power suppliers and consumers to increase the efficiency of the power grid. To achieve this, smart meters (SMs) are installed in households or buildings to measure electricity usage and allow power suppliers or consumers to monitor and manage it in real time. However, SMs require a secure service to address malicious attacks during memory protection and communication processes and a lightweight communication protocol suitable for devices with computational and communication constraints. This paper proposes an authentication protocol based on a one-way hash function to address these issues. This protocol includes message authentication functions to address message tampering and uses a changing encryption key for secure communication during each transmission. The security and performance analysis of this protocol shows that it can address existing attacks and provides 105,281.67% better computational efficiency than previous methods.
Keywords: smart grid authentication; lightweight user authentication; hash-based authentication smart grid authentication; lightweight user authentication; hash-based authentication

Share and Cite

MDPI and ACS Style

Kook, S.; Kim, K.; Ryu, J.; Lee, Y.; Won, D. Lightweight Hash-Based Authentication Protocol for Smart Grids. Sensors 2024, 24, 3085. https://doi.org/10.3390/s24103085

AMA Style

Kook S, Kim K, Ryu J, Lee Y, Won D. Lightweight Hash-Based Authentication Protocol for Smart Grids. Sensors. 2024; 24(10):3085. https://doi.org/10.3390/s24103085

Chicago/Turabian Style

Kook, Sangjin, Keunok Kim, Jihyeon Ryu, Youngsook Lee, and Dongho Won. 2024. "Lightweight Hash-Based Authentication Protocol for Smart Grids" Sensors 24, no. 10: 3085. https://doi.org/10.3390/s24103085

APA Style

Kook, S., Kim, K., Ryu, J., Lee, Y., & Won, D. (2024). Lightweight Hash-Based Authentication Protocol for Smart Grids. Sensors, 24(10), 3085. https://doi.org/10.3390/s24103085

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop