Authentication Mechanism for IoT Device in Micro Grid Environments

  • Jeong-Cheol Yeom
  • Qing Zhou
  • In-A Song
  • Young-Seok LeeEmail author
  • In-ho Ra
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 986)


Recently there is much interest in how to implement IoT/IoE-based Micro Grids (MG). But, privacy and security concerns inhibit the fast adaption of IoT technology for many applications. A number of authentication protocols that address these concerns have been proposed but real-world solutions that are secure, maintain low communication cost. We present a novel authentication protocol, which offers a high level of security through the combination of a random key scheme with a strong cryptography. The protocol is applicable to resource, power and computationally constraint platforms such as IoT devices. Our investigation shows that it can provide mutual authentication, untraceability, forward and backward security as well as resistance to replay, denial-of-service and man-in-the-middle attacks, while retaining a competitive communication cost. The protocol has been integrated into the device authentication protocol, which assures low implementation cost.


Microgrid device Access server Mutual authentication schemel 



This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No. 2018-0-00508, Development of blockchain-based embedded devices and platform for IOT security and operational efficiency).


  1. 1.
    Savry, O., Vacherand, F.: Security and privacy protection of contactless devices. The Internet of Things, pp. 409–419. Springer, New York (2010). Scholar
  2. 2.
    Seo, H., et al.: IOT security technical trend. Korean Inst. Electromagn. Eng. Soc. 24(4), 27–35 (2013)Google Scholar
  3. 3.
    de Leusse, P., Periorellis, P., Dimitrakos, T., Nair, S.K.: Self managed security cell, a security model for the internet of things and services. In: 2009 First International Conference on Advances in Future Internet, pp. 47–52 (2009)Google Scholar
  4. 4.
    Hong, D., et al.: HIGHT: a new block cipher suitable for low-resource device. In: Goubin, L., Matsui, M. (eds.) Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems (CHES 2006). LNCS, vol. 4249, pp. 46–59. Springer, Heidelberg., Accessed 21 Nov 2016Google Scholar
  5. 5.
    Shin, J., Park, Y.: An authentication protocol using the EXOR and the hash function in RFID/USN. In: Korea Society of Industrial Information Systems, vol. 12, no. 2, pp. 24–29, June 2007Google Scholar
  6. 6.
    Ahn, H.-S., Bu, K.-D.: Improved authentication protocol for RFID/USN environment. Inst. Electron. Inf. Eng. 46(CI-1), 1–10 (2009)Google Scholar
  7. 7.
    Savry, O., Vacherand, F.: Security and privacy protection of contactless devices. The Internet of Things, pp. 409–419. Springer, New York (2010). Scholar
  8. 8.
    Engels, D., Saarinen, M.-J.O., Schweitzer, P., Smith, E.M.: The hummingbird-2 lightweight authenticated encryption algorithm. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 19–31. Springer, Heidelberg (2012). Scholar
  9. 9.
    Eom, T., Yi, J.-H.: Performance evaluation of authentication protocol for mobile RFID privacy. Korean Inst. Commun. Inf. Sci. 36(6), 618–630 (2011)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Jeong-Cheol Yeom
    • 1
  • Qing Zhou
    • 1
  • In-A Song
    • 1
  • Young-Seok Lee
    • 1
    Email author
  • In-ho Ra
    • 1
  1. 1.Kunsan National UniversityKunsanSouth Korea

Personalised recommendations