Search or add a thesis

Advanced Search (Beta)
Home > Secure Authenticated Key Agreement Schemes for Smart Grid Communications in Power Sector

Secure Authenticated Key Agreement Schemes for Smart Grid Communications in Power Sector

Thesis Info

Access Option

External Link

Author

Mahmood, Khalid

Program

PhD

Institute

International Islamic University

City

Islamabad

Province

Islamabad.

Country

Pakistan

Thesis Completing Year

2018

Thesis Completion Status

Completed

Subject

Computer Science

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/10677/1/Khalid%20Mahmood_CS_2018_IIU_PRR.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676727829634

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


The Internet of Things (IoT) has abundant non-trivial applications and Smart Grid is one of them. The IoT capacitate effortless and adept adoption of Smart Grid. Currently, it is anticipated as the mostprevalentmanifestationoftheIoT.SmartGridisemergingasthenextgenerationpowergrid due to its reliability, flexibility, and efficiency. It is a state-of-the-art distributed power generation and supply infrastructure with significant auxiliary traits of intelligence and two-way communication. The utility can monitor and control power consumption of the consumer for load balancing, in real time. Similarly, the consumer can keep a trail of his power usage to plan it as per his affordability or budget. The Smart Grid also furnishes an adequacy to integrate renewable energy sources. Despite the ample amelioration, Smart Grid faces some critical security challenges such as the denial-of-service, message injection, man-in-the-middle and replay attacks etc. Moreover, provision of an IP-based communication system in this very grid has made it more vulnerable to stern securityattacks. Iftheseattacksarenotproperlyaddressed,anadversarycanmaliciouslycompromise the user/device to degrade the performance of the Smart Grid. Itisstrenuoustoemployclassicaltechniquesinordertopreventabove-mentionedsecurityattacks due to soaring communication and computation overhead. Since the Smart Grid is delay sensitive and traffic intensive environment, it is therefore inevitable to concoct and realize security techniquesinsuchawaysothattheydonotpersuadedelayduetocomplexandcomputationintensive cryptographic operations. Theperplexingarchitectureandassortedsecuritydesideratumisthemajorhindrancetoofferaprevailing solution for Smart Grid security. This research work has undertaken to design and develop lightweight authentication protocols for insuring the Smart Grid. The optimal authentication protocolsforSmartGriddelaycriticalenvironmentnotonlywithstandpotentialsecurityattacksbutit also experiences scanty communication and computation overhead due to primitive cryptographic operations. In this research, we have embellished lightweight authentication protocols for endowing secure andreliableenvironmentattheexpenseofinsignificantcommunicationandcomputationoverhead. These protocols are capable of impeding well-nigh all sorts of trivial and non-trivial attacks. The first authentication protocol is based on a hybrid Diffie-Hellman algorithm. This lightweight protocol exploits typical cryptosystems of Advanced Encryption Standard (AES) and Rivest, Shamir and Adleman (RSA) to engender a session key. Additionally, Hash-based Message Authentication Code (HMAC) is also employed in it to perpetuate data integrity. Moreover, this authentication protocol promises to commence mutual authentication by averting major attacks such as man-inthe-middle and replay attack. The second authentication protocol is an Elliptic Curve Cryptography (ECC)-based solution for retaining Smart Grid security. Since ECC promises to offer analogous security clout with significantly reduced key size as compared to other cryptographic security solutions e.g. Diffie-Hellman (D-H), Digital Signature Algorithm (DSA) and RSA. This proposed protocol realizes mutual authentication with meager resource utilization. It is also verified that the proposed scheme can relentless the security attacks. Keeping in mind the complex and delay sensitive nature of the Smart Grid, a lightweight ECC-based authentication scheme is proposed. This ECC-based protocol not only provides mutual authentication with low computation and communication cost but also withstand absolute familiar security attacks. The third security solution is realized through bilinear pairing. This protocol enables the smart meters to get connected with utility control anonymously to avail the services provided by them. The smart meters realize this objective with the private key in the absence of trusted authority. The trusted authority is involved only during the registration phase. Thereafter, the fourth scheme presented in this research work is actually an enhanced identity-based key establishment protocol. This enhanced scheme is introduced after identifying the weaknesses in the protocol presented by Mohammadali et al. (published in IEEE Trans on Smart Grid, 2018). The formal and informal security analysis is carried out under predefined adversarial threat model to verify the robustness of the proposed authentication protocols against stern attacks. BurrowsAbadi-Needham logic (BAN logic) is utilized to evaluate the integrity of the exchanged information. In the end, the performance of the proposed authentication protocols is compared with recently presented related protocols in the literature. Performance comparisons reveal the computation and communication requirements of the proposed protocols as compared to homologous protocols.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

شفیق آصف

آؤ خود کو ڈھونڈتے ہیں،،

جانے کب سے کھو چکا ہوں شہر میں

جانے کب سے اپنا چہرہ ڈھونڈتا پھرتا ہوں میں

شہر کے ان راستوں میں

کس قدر تنہائی ہے

ہر کوئی تنہائیوں کی

بھیڑ میں کھویا ہوا ہے

یوں تو سورج کا اجالا ضوفشاں ہے

پھر بھی گلیوں میں ابھی تک

تیرگی سی ہے رواں

ایسے عالم میں بھلا ہم

کیسے ڈھونڈیں خود کو اپنے شہر میں

شہر اپنا ہےمگر ہم

ڈھونڈتے پھرتے ہیں خود کو

جانے کب دیکھیں گے ہم اک آشنا چہرہ کوئی

گر یہاں کوئی ہمارا آشنا چہرہ نہیں تو

آؤ خود کو ڈھونڈ لیں

آؤ خود کو دیکھ لیں

شہر کی اس بھیڑ میں

سیرت النبی اور ذرائع ابلاغ

"The word "Ablagh" means to convey, to transfer, to communicate the term "Tableegh "is derived from this word. In the Holy Quran the words like "Tableegh" "Da’wa" "Inzar" and "Tabsheer" have been used for communication purpose. "Tableegh" means to persuade someone for the good deeds and prohibit him from the bad forbidden things. Tableegh is a process in which someone is invited sincerely towards an noble cause. In the Holy Quran Tableegh has been declared "Farz"(something which all the followers are supposed to do as binding) for all the Muslims. In the modern era the ways of communication are enormous and varied. The most important are the electronic and print media. Television, computer and radio, on the one hand and books, magazines and the newspapers on the other hand, play their respective role. Recently internet has emerged as the most important organ to address the people. Hence these current modes of communication should be reviewed according to the Seerah ofthe Holy Prophet (P. B. U. H) .

Facilitating Social Studies Teachers in Enriching the Curriculum: Possibilities and Challenges

This small-scale action research project explores the possibilities and challenges involved in facilitating Social Studies Teachers in understanding the notion and practices of the curricular enrichment process in their classroom contexts. The effort is based on the rationale that the curriculum needs to be enriched in order to maximize the attainment of set curricular goals and objectives. However, the assumption is that in most cases the curricular goals and objectives are not satisfactorily met due to the teachers: a) limited access to and understanding of curricular goals and objectives, and b) limited knowledge and expertise in effective implementation of the curriculum. In this background, the project sees, curriculum enrichment, as one of the important ways in assuring the attainment of goals and objectives of the curriculum. To realize this aim, the action researcher worked with two secondary level Social Studies teachers in a private school of Karachi, Pakistan. In this regard, the project studies the existing perceptions and practices of curriculum enrichment of the teachers. Subsequently, a strategic action plan was prepared and implemented to facilitate the teachers' understanding and practice of curriculum enrichment. Subsequent planning and action remained responsive to any need for change arising out of the experiences of implementing the previous one. The data for the action process was collected through semi-structured interviews, lesson observations notes, researcher's and teachers' reflective journals and tape recordings of input sessions. The gathered data was analyzed soon after each action step for reflection and further action. The study reports some possible strategies to facilitate teachers in gaining understanding about the notion of curriculum and curriculum enrichment. These are: 1) Using input/training sessions about definition and theory of curriculum and curriculum enrichment. 2) Sharing strategies for content, pedagogical and organizational enrichment. For example, adding supplementary reading materials from sources other than the prescribed textbooks, use of newspapers, audio-visual aids, inquiry and project work, organizing field trips and inviting guest speakers. In the same vein, the study also reports the challenges faced Dissertation Abstracts MEd V Class of 2002 33 in the process; such as: striking a balance between facilitating in joint and ;individual input sessions, time availability for action and its research and overemphasis on theoretical input. The report concludes by presenting key learnings experienced as a teacher educator and action researcher and suggests a focus for further action research.