Skip to main content

Authentication Mechanism for IoT Device in Micro Grid Environments

  • Conference paper
  • First Online:
Computational Intelligence and Intelligent Systems (ISICA 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 986))

Included in the following conference series:

  • 503 Accesses

Abstract

Recently there is much interest in how to implement IoT/IoE-based Micro Grids (MG). But, privacy and security concerns inhibit the fast adaption of IoT technology for many applications. A number of authentication protocols that address these concerns have been proposed but real-world solutions that are secure, maintain low communication cost. We present a novel authentication protocol, which offers a high level of security through the combination of a random key scheme with a strong cryptography. The protocol is applicable to resource, power and computationally constraint platforms such as IoT devices. Our investigation shows that it can provide mutual authentication, untraceability, forward and backward security as well as resistance to replay, denial-of-service and man-in-the-middle attacks, while retaining a competitive communication cost. The protocol has been integrated into the device authentication protocol, which assures low implementation cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Savry, O., Vacherand, F.: Security and privacy protection of contactless devices. The Internet of Things, pp. 409–419. Springer, New York (2010). https://doi.org/10.1007/978-1-4419-1674-7_40

    Chapter  Google Scholar 

  2. Seo, H., et al.: IOT security technical trend. Korean Inst. Electromagn. Eng. Soc. 24(4), 27–35 (2013)

    Google Scholar 

  3. de Leusse, P., Periorellis, P., Dimitrakos, T., Nair, S.K.: Self managed security cell, a security model for the internet of things and services. In: 2009 First International Conference on Advances in Future Internet, pp. 47–52 (2009)

    Google Scholar 

  4. Hong, D., et al.: HIGHT: a new block cipher suitable for low-resource device. In: Goubin, L., Matsui, M. (eds.) Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems (CHES 2006). LNCS, vol. 4249, pp. 46–59. Springer, Heidelberg. https://doi.org/10.1007/11894063_4, http://www.springer.com/lncs. Accessed 21 Nov 2016

    Google Scholar 

  5. Shin, J., Park, Y.: An authentication protocol using the EXOR and the hash function in RFID/USN. In: Korea Society of Industrial Information Systems, vol. 12, no. 2, pp. 24–29, June 2007

    Google Scholar 

  6. Ahn, H.-S., Bu, K.-D.: Improved authentication protocol for RFID/USN environment. Inst. Electron. Inf. Eng. 46(CI-1), 1–10 (2009)

    Google Scholar 

  7. Savry, O., Vacherand, F.: Security and privacy protection of contactless devices. The Internet of Things, pp. 409–419. Springer, New York (2010). https://doi.org/10.1007/978-1-4419-1674-7_40

    Chapter  Google Scholar 

  8. Engels, D., Saarinen, M.-J.O., Schweitzer, P., Smith, E.M.: The hummingbird-2 lightweight authenticated encryption algorithm. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 19–31. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-25286-0_2

    Chapter  Google Scholar 

  9. Eom, T., Yi, J.-H.: Performance evaluation of authentication protocol for mobile RFID privacy. Korean Inst. Commun. Inf. Sci. 36(6), 618–630 (2011)

    Google Scholar 

Download references

Acknowledgment

This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No. 2018-0-00508, Development of blockchain-based embedded devices and platform for IOT security and operational efficiency).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Young-Seok Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yeom, JC., Zhou, Q., Song, IA., Lee, YS., Ra, Ih. (2019). Authentication Mechanism for IoT Device in Micro Grid Environments. In: Peng, H., Deng, C., Wu, Z., Liu, Y. (eds) Computational Intelligence and Intelligent Systems. ISICA 2018. Communications in Computer and Information Science, vol 986. Springer, Singapore. https://doi.org/10.1007/978-981-13-6473-0_25

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-6473-0_25

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-6472-3

  • Online ISBN: 978-981-13-6473-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics