Authentication Mechanism for IoT Device in Micro Grid Environments
Recently there is much interest in how to implement IoT/IoE-based Micro Grids (MG). But, privacy and security concerns inhibit the fast adaption of IoT technology for many applications. A number of authentication protocols that address these concerns have been proposed but real-world solutions that are secure, maintain low communication cost. We present a novel authentication protocol, which offers a high level of security through the combination of a random key scheme with a strong cryptography. The protocol is applicable to resource, power and computationally constraint platforms such as IoT devices. Our investigation shows that it can provide mutual authentication, untraceability, forward and backward security as well as resistance to replay, denial-of-service and man-in-the-middle attacks, while retaining a competitive communication cost. The protocol has been integrated into the device authentication protocol, which assures low implementation cost.
KeywordsMicrogrid device Access server Mutual authentication schemel
This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No. 2018-0-00508, Development of blockchain-based embedded devices and platform for IOT security and operational efficiency).
- 2.Seo, H., et al.: IOT security technical trend. Korean Inst. Electromagn. Eng. Soc. 24(4), 27–35 (2013)Google Scholar
- 3.de Leusse, P., Periorellis, P., Dimitrakos, T., Nair, S.K.: Self managed security cell, a security model for the internet of things and services. In: 2009 First International Conference on Advances in Future Internet, pp. 47–52 (2009)Google Scholar
- 4.Hong, D., et al.: HIGHT: a new block cipher suitable for low-resource device. In: Goubin, L., Matsui, M. (eds.) Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems (CHES 2006). LNCS, vol. 4249, pp. 46–59. Springer, Heidelberg. https://doi.org/10.1007/11894063_4, http://www.springer.com/lncs. Accessed 21 Nov 2016Google Scholar
- 5.Shin, J., Park, Y.: An authentication protocol using the EXOR and the hash function in RFID/USN. In: Korea Society of Industrial Information Systems, vol. 12, no. 2, pp. 24–29, June 2007Google Scholar
- 6.Ahn, H.-S., Bu, K.-D.: Improved authentication protocol for RFID/USN environment. Inst. Electron. Inf. Eng. 46(CI-1), 1–10 (2009)Google Scholar
- 9.Eom, T., Yi, J.-H.: Performance evaluation of authentication protocol for mobile RFID privacy. Korean Inst. Commun. Inf. Sci. 36(6), 618–630 (2011)Google Scholar