Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2017, Article ID 3194845, 11 pages
https://doi.org/10.1155/2017/3194845
Research Article

Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography

1State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China
2Co-Innovation Center for Information Supply & Assurance Technology, Anhui University, Hefei, China
3College of Communication and Information, University of Kentucky, Lexington, KY, USA
4Jiangsu Key Laboratory of Big Data Security & Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China

Correspondence should be addressed to Qin Liu; nc.ude.uhw@uilniq

Received 17 February 2017; Accepted 30 March 2017; Published 9 May 2017

Academic Editor: Jaime Lloret

Copyright © 2017 Debiao He et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Z. M. Fadlullah, M. M. Fouda, N. Kato, A. Takeuchi, N. Iwasaki, and Y. Nozaki, “Toward intelligent machine-to-machine communications in smart grid,” IEEE Communications Magazine, vol. 49, no. 4, pp. 60–65, 2011. View at Publisher · View at Google Scholar · View at Scopus
  2. Y. Zhang, R. Yu, M. Nekovee, Y. Liu, S. Xie, and S. Gjessing, “Cognitive machine-to-machine communications: visions and potentials for the smart grid,” IEEE Network, vol. 26, no. 3, pp. 6–13, 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. C. Greer, D. A. Wollman, D. E. Prochaska et al., “Nist framework and roadmap for smart grid interoperability standards, release 3.0”. View at Publisher · View at Google Scholar
  4. D. He, N. Kumar, and J.-H. Lee, “Privacy-preserving data aggregation scheme against internal attackers in smart grids,” Wireless Networks, vol. 22, no. 2, pp. 491–502, 2016. View at Publisher · View at Google Scholar · View at Scopus
  5. J. Gao, Y. Xiao, J. Liu, W. Liang, and C. L. P. Chen, “A survey of communication/networking in smart grids,” Future Generation Computer Systems, vol. 28, no. 2, pp. 391–404, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. N. Saputro, K. Akkaya, and S. Uludag, “A survey of routing protocols for smart grid communications,” Computer Networks, vol. 56, no. 11, pp. 2741–2771, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. V. C. Güngör, D. Sahin, T. Kocak et al., “Smart grid technologies: communication technologies and standards,” IEEE Transactions on Industrial Informatics, vol. 7, no. 4, pp. 529–539, 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. W. Su, H. Eichi, W. Zeng, and M.-Y. Chow, “A survey on the electrification of transportation in a smart grid environment,” IEEE Transactions on Industrial Informatics, vol. 8, no. 1, pp. 1–10, 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. D. Wu and C. Zhou, “Fault-tolerant and scalable key management for smart grid,” IEEE Transactions on Smart Grid, vol. 2, no. 2, pp. 375–381, 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. Z. Wan, G. Wang, Y. Yang, and S. Shi, “SKM: scalable key management for advanced metering infrastructure in smart grids,” IEEE Transactions on Industrial Electronics, vol. 61, no. 12, pp. 7055–7066, 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. K. Yu, M. Arifuzzaman, Z. Wen, D. Zhang, and T. Sato, “A key management scheme for secure communications of information centric advanced metering infrastructure in smart grid,” IEEE Transactions on Instrumentation and Measurement, vol. 64, no. 8, pp. 2072–2085, 2015. View at Publisher · View at Google Scholar · View at Scopus
  12. J. H. Park, M. Kim, and D. Kwon, “Security weakness in the smart grid key distribution scheme proposed by xia and wang,” IEEE Transactions on Smart Grid, vol. 4, no. 3, pp. 1613–1614, 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. J.-L. Tsai and N.-W. Lo, “Secure Anonymous Key Distribution Scheme for Smart Grid,” IEEE Transactions on Smart Grid, vol. 7, no. 2, pp. 906–914, 2016. View at Publisher · View at Google Scholar · View at Scopus
  14. D. He, H. Wang, M. K. Khan, and L. Wang, “Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography,” IET Communications, vol. 10, no. 14, pp. 1795–1802, 2016. View at Publisher · View at Google Scholar
  15. H. Liu, H. Ning, Y. Zhang, and M. Guizani, “Battery status-aware authentication scheme for V2G networks in smart grid,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 99–110, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. H. Li, R. Lu, L. Zhou, B. Yang, and X. Shen, “An efficient Merkle-tree-based authentication scheme for smart grid,” IEEE Systems Journal, vol. 8, no. 2, pp. 655–663, 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. N. Saxena, B. J. Choi, and R. Lu, “Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 5, pp. 907–921, 2016. View at Publisher · View at Google Scholar · View at Scopus
  18. N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987. View at Publisher · View at Google Scholar · View at MathSciNet
  19. V. S. Miller, “Use of elliptic curves in cryptography,” in Proceedings of the Conference on the Theory and Application of Cryptographic Techniques, pp. 417–426, Springer, 1985. View at Publisher · View at Google Scholar · View at MathSciNet
  20. X. Huang, Y. Xiang, E. Bertino, J. Zhou, and L. Xu, “Robust multi-factor authentication for fragile communications,” IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 6, pp. 568–581, 2014. View at Publisher · View at Google Scholar · View at Scopus
  21. X. Huang, Y. Xiang, A. Chonka, J. Zhou, and R. H. Deng, “A generic framework for three-factor authentication: Preserving security and privacy in distributed systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 8, pp. 1390–1397, 2011. View at Publisher · View at Google Scholar · View at Scopus
  22. D. He, S. Zeadally, N. Kumar, and J.-H. Lee, “Anonymous authentication for wireless body area networks with provable security,” IEEE Systems Journal, 2016. View at Publisher · View at Google Scholar · View at Scopus
  23. Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, “Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, vol. E98B, no. 1, pp. 190–200, 2015. View at Publisher · View at Google Scholar · View at Scopus
  24. Z. Fu, X. Wu, C. Guan, X. Sun, and K. Ren, “Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 12, pp. 2706–2716, 2016. View at Publisher · View at Google Scholar
  25. Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Transactions on Parallel and Distributed Systems, vol. 9, no. 27, pp. 2546–2559, 2015. View at Publisher · View at Google Scholar
  26. Z. Xia, X. Wang, X. Sun, Q. Liu, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, vol. 2, no. 27, pp. 340–352, 2015. View at Publisher · View at Google Scholar
  27. X. F. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, “New algorithms for secure outsourcing of modular exponentiations,” IEEE Transactions On Parallel And Distributed Systems, vol. 25, no. 9, pp. 2386–2396, 2014. View at Publisher · View at Google Scholar
  28. X. Chen, J. Li, X. Huang, J. Ma, and W. Lou, “New Publicly Verifiable Databases with Efficient Updates,” IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 5, pp. 546–556, 2015. View at Publisher · View at Google Scholar · View at Scopus
  29. F. Li, B. Luo, and P. Liu, “Secure information aggregation for smart grids using homomorphic encryption,,” in Proceedings of the 1st IEEE International Conference on Smart Grid Communications (SmartGridComm '10), pp. 327–332, 2010. View at Publisher · View at Google Scholar
  30. F. D. Garcia and B. Jacobs, “Privacy-friendly energy-metering via homomorphic encryption,” in Preceedings of the International Workshop on Security and Trust Management, pp. 226–238, Springer, 2010. View at Publisher · View at Google Scholar
  31. P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” vol. 1592, pp. 223–238, Springer, Berlin, Germany, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. View at Publisher · View at Google Scholar · View at MathSciNet
  32. R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, “EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 9, pp. 1621–1632, 2012. View at Publisher · View at Google Scholar · View at Scopus
  33. J. Zhang, L. Liu, Y. Cui, and Z. Chen, “SP2DAS: self-certified PKC-based privacy-preserving data aggregation scheme in smart grid,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 457325, 11 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  34. L. Chen, R. Lu, and Z. Cao, “PDAFT: a privacy-preserving data aggregation scheme with fault tolerance for smart grid communications,” Peer-to-Peer Networking and Applications, vol. 8, no. 6, pp. 1122–1132, 2014. View at Publisher · View at Google Scholar · View at Scopus
  35. C.-I. Fan, S.-Y. Huang, and Y.-L. Lai, “Privacy-enhanced data aggregation scheme against internal attackers in smart grid,” IEEE Transactions on Industrial Informatics, vol. 10, no. 1, pp. 666–675, 2014. View at Publisher · View at Google Scholar · View at Scopus
  36. H. Bao and R. Lu, “Comment on 'Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid',” IEEE Transactions on Industrial Informatics, vol. 12, no. 1, pp. 2–5, 2016. View at Publisher · View at Google Scholar · View at Scopus
  37. D. Boneh, E.-J. Goh, and K. Nissim, “Evaluating 2-dnf formulas on ciphertexts,” in Proceedings of the Theory of Cryptography Conference, vol. 3378 of Lecture Notes in Comput. Sci., pp. 325–341, Springer, Berlin, Gremany, 2005. View at Publisher · View at Google Scholar · View at MathSciNet
  38. H. Cohen, G. Frey, R. Avanzi et al., Handbook of Elliptic and Hyperelliptic Curve Cryptography, CRC Press, 2005. View at MathSciNet
  39. J. K. Liu, T. H. Yuen, M. H. Au, and W. Susilo, “Improvements on an authentication scheme for vehicular sensor networks,” Expert Systems with Applications, vol. 41, no. 5, pp. 2559–2564, 2014. View at Publisher · View at Google Scholar · View at Scopus
  40. M. Barbosa and P. Farshim, “Certificateless signcryption,” in Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS '08), pp. 369–372, ACM, March 2008. View at Publisher · View at Google Scholar · View at Scopus
  41. D. Pointcheval and J. Stern, “Security arguments for digital signatures and blind signatures,” Journal of Cryptology, vol. 13, no. 3, pp. 361–396, 2000. View at Publisher · View at Google Scholar · View at Scopus
  42. M. Scott, Miracl library, 2011, http://www.shamus.ie.