Efficient mutual authentication using kerberos for resource constraint smart meter in advanced metering infrastructure

The continuous development of information communication technology facilitates the conventional grid in transforming into an automated modern system. Internet-of-Things solutions are used along with the evolving services of end-users to the electricity service provider for smart grid applications. I...

Full description

Saved in:
Bibliographic Details
Main Authors: Hasan, Md Mehedi, Mohd Ariffin, Noor Afiza, Mohd Sani, Nor Fazlida
Format: Article
Published: Walter de Gruyter GmbH 2023
Online Access:http://psasir.upm.edu.my/id/eprint/107630/
https://www.degruyter.com/document/doi/10.1515/jisys-2021-0095/html
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The continuous development of information communication technology facilitates the conventional grid in transforming into an automated modern system. Internet-of-Things solutions are used along with the evolving services of end-users to the electricity service provider for smart grid applications. In terms of various devices and machine integration, adequate authentication is the key to an accurate source and destination in advanced metering infrastructure (AMI). Various protocols are deployed to lead the identification between two parties, which require high computation time and communicational bit operations for system development. Therefore, Kerberos-based authentication protocols were designed in this study with the assistance of elliptic curve cryptography to manage the mutual authentication between two parties and reduce the time and bit operations. The protocols were evaluated in a widely adopted tool, AVISPA, which builds an understanding of the proposed protocol and ensures mutual authentication without unauthorized knowledge. In addition, upon comparing security and performance assessments to the current schemes, it was found that the protocol in this study required less time and bits to transmit information. Consequently, it effectively provides multiple security features making it suitable for resource constraint smart meters in AMI.