A Chain Based Signature Scheme for Uplink and Downlink Communications in AMI Networks

  • Samer KhasawnehEmail author
  • Michel Kadoch
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 256)


Smart grid is an electric infrastructure that makes extensive use of communication and information technology making it a surface for numerous cyber-security threats. In this research, we propose an authentication scheme for downlink and uplink communications in the advanced metering infrastructure network. The proposal is based on chain based signature with some modifications to tackle its computation and storage overhead. Besides, the proposal integrates symmetric encryption with the signature scheme to ensure data privacy and confidentiality. Our analysis proves that the proposed scheme is resilient against numerous known attacks and is efficient in terms of computation cost and ciphertext size.


Smart grid AMI network Security Chain based signature 


  1. 1.
    Abdulrahman, Y., Saifur, R.: Smart grid networks: promises and challenges. JCM 7(6), 409–417 (2012)Google Scholar
  2. 2.
    Gungor, V.C., et al.: A survey on smart grid potential applications and communication requirements. IEEE Trans. Ind. Inform. 9(1), 28–43 (2013)CrossRefGoogle Scholar
  3. 3.
    NIST framework and roadmap for smart grid interoperability standards release 1.0 (2010)Google Scholar
  4. 4.
    Massoud, A.: A smart self-healing grid: in pursuit of a more reliable and resilient system [in my view]. IEEE Power Energy Mag. 12(1), 110–112 (2014)Google Scholar
  5. 5.
    Hayden, K.-H. S., Sammy, H.M.K., Edmund, Y.L., King-Shan, L.: Zero-configuration identity-based signcryption scheme for smart grid. In: IEEE International Conference on Smart Grid Communications, October 2010Google Scholar
  6. 6.
    Debiao, H., Huaqun, W., Muhammad, K.K., Lina, W.: Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun. 10(14), 1795–1802 (2016)CrossRefGoogle Scholar
  7. 7.
    Jia-Lun, T., Lo, N.-W.: Secure anonymous key distribution scheme for smart grid. IEEE Trans. SmartGrid 7, 906–914 (2015)Google Scholar
  8. 8.
    Saxena, N., Grijalva, S.: Efficient signature scheme for delivering authentic control commands and alert messages in the smart grid. IEEE Trans. Smart Grid 9, 4323–4334 (2017)CrossRefGoogle Scholar
  9. 9.
    Alharbi, K., Lin, X.: Efficient and privacy-preserving smart grid downlink communication using identity based signcryption. In: 2016 IEEE Global Communications Conference, Washington, DC, pp. 1–6 (2016)Google Scholar
  10. 10.
    Libert, B., Quisquater, J.J.: New identity based signcryption schemes from pairings. In: IEEE Information Theory Workshop, Paris, France (2003)Google Scholar
  11. 11.
    Lal, S., Kushwah, P.: ID based generalized signcryption, Cryptology ePrint Archive (2008)
  12. 12.
    Mahmood, K., Chaudhry, S.A., Naqvi, H., Kumari, S., Li, X., Sangaiah, A.K.: An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Gener. Comput. Syst. 81, 557–565 (2018). Scholar
  13. 13.
    SEC 2: Recommended Elliptic Curve Domain Parameters, Certicom Research, 20 September 2000Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.Department of Electrical Engineering, École de Technologie SupérieureUniversity of QuebecMontrealCanada

Personalised recommendations