A lightweight SM2-based security authentication scheme for smart grids

Kehe Wu,Rui Cheng,Wenchao Cui,Wei Li
DOI: https://doi.org/10.1016/j.aej.2020.09.008
IF: 6.626
2021-02-01
Alexandria Engineering Journal
Abstract:With the increasing openness of smart grids, a large quantity of power terminals will be widely applied in systems of smart grids by various access modes (wired, wireless, satellite). In order to ensure the integrity and confidentiality of the data and the security of the communications between power terminals and the smart grid intranet, a lightweight security authentication and key agreement scheme is proposed in this article. The scheme provides mutual authentication based on the SM2 algorithm and key agreement which can prevent various attacks. Furthermore experimental evaluation and comparative analysis is conducted to indicate that the proposed scheme can resist many types of attacks with lower amounts of total computational resources and lower communications bandwidth. The analysis shows that the proposed scheme is suitable for smart grid.
engineering, multidisciplinary
What problem does this paper attempt to address?
This paper proposes a lightweight solution to address the security authentication and key agreement issues in smart grid. With the development of smart grid, a large number of power terminals are widely deployed through various access methods (e.g. wired, wireless, satellite), making the data integrity, confidentiality, and communication security between power terminals and the internal network of smart grid vital. The paper presents a lightweight security authentication and key agreement scheme based on the SM2 algorithm, aiming to prevent various attacks. Experimental evaluation and comparative analysis demonstrate that this scheme can resist multiple attacks with lower total computational resources and communication bandwidth, making it suitable for application in smart grid. The scheme primarily focuses on terminal identity verification and communication channel security, achieving bi-directional authentication and key agreement through the SM2 algorithm to ensure data confidentiality and integrity.