ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
Abstract
Two-way communication has been identified as the smart grid flagship feature that enables the smart grid to attain its outcomes over the legacy power grid. Integrating communication networks into the power grid will motivate malicious attackers to target information exchange. Therefore, achieving secure and authentic communication in the smart grid networks is an indispensable requirement. In this paper, we propose a sophisticated hybrid encryption scheme that incorporates public and symmetric key encryptions to secure smart metering network. Elliptic Curve Integrated Encryption Scheme (ECIES) and Advanced Encryption Scheme (AES) are chosen as the building blocks for the proposed scheme. In order to optimize the computation overhead of ECIES, a precomputation procedure is presented to provide faster encryption/decryption. The proposed technique provides data integrity, confidentiality and authenticity as well as it resists against false data injection and message reply attacks. Simulation results show that the proposed approach surpasses some of the existing schemes in terms of computation, communication and storage overhead.
7 Conclusion
In order to update the existing power grid into a smart grid, efficient integration of two-way communication must be achieved. Integrating distributed communication jeopardizes the smart grid network to countless number of security threats. We presented a hybrid encryption scheme that incorporates symmetric and public key encryption in order to benefit from the strengths of each one of them. We optimized the computation overhead of the elliptic curve encryption by precomputing the point-scalar multiplication in priori. We designed the message format to allow flexible level of security. Simulation results have shown that the proposed scheme requires acceptable computation, communication and storage overhead. Additionally, the proposed protocol can ensure message integrity, confidentiality and authenticity. Furthermore, it can protect against false data inject and reply attacks.