2022
DOI: 10.1109/tdsc.2020.2992801
|View full text |Cite
|
Sign up to set email alerts
|

Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters

Abstract: In the energy sector, IoT manifests in the form of next-generation power grids that provide enhanced electrical stability, efficient power distribution, and utilization. The primary feature of a Smart Grid is the presence of an advanced bi-directional communication network between the Smart meters at the consumer end and the servers at the Utility Operators. Smart meters are broadly vulnerable to attacks on communication and physical systems. We propose a secure and operationally asymmetric mutual authenticati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
32
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(33 citation statements)
references
References 45 publications
1
32
0
Order By: Relevance
“…But the scheme needs multiple interactions to ensure the security of authentication, resulting in huge computation and communication costs. Aiming at the low efficiency of authentication and resisting load modification attacks on the smart meter, Boyapally et al 25 proposed an authentication scheme based on physically unclonable functions(PUF). The scheme uses lightweight cryptographic primitives, which makes the scheme feasible in resource-constrained IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…But the scheme needs multiple interactions to ensure the security of authentication, resulting in huge computation and communication costs. Aiming at the low efficiency of authentication and resisting load modification attacks on the smart meter, Boyapally et al 25 proposed an authentication scheme based on physically unclonable functions(PUF). The scheme uses lightweight cryptographic primitives, which makes the scheme feasible in resource-constrained IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…In [11], Boyapally et al, proposed a PUF-based authentication protocol for smart meters in the context of smart grid applications. The protocol allows a smart meter to be authenticated to a server using PUFs.…”
Section: Pufs (Physical Unclonable Functions)mentioning
confidence: 99%
“…The protocol, as well as the firmware, are then uploaded and written into the flash memory of the board (i.e., flashing the board). TABLE 4 reports the size, in KB, of the sketch (code) of the protocol for each Arduino development board, node (Thing T 1 , Thing T 2 , and Gateway), and for different size of the variables, i.e., challenges, responses, nonces, and message integrity codes 11 . We have noticed that code of the gateway is larger than the code of Things (T 1 and T 2 ).…”
Section: A Protocol Implementationmentioning
confidence: 99%
See 2 more Smart Citations