Authentication Mechanism for Smart Grid Network
Priti V. Jasud1, Manish D. Katkar2, S. D. Kamble3
1Priti V. Jasud Mtech Scholar, Department of computer science and engineering, G.H.Raisoni Institute of Engineering and technology for Womens Nagpur, India
2Professor Manish D. Katkar Asst. Professor Department of computer science and engineering, G.H.Raisoni Institute of Engineering and Technology for Womens Nagpur, India.
3Professor S. D. Kamble Asst. Professor Department of computer science and engineering, Yashvantrao Chavhan College of Engineering, Nagpur, India.

Manuscript received on March 02, 2014. | Revised Manuscript received on March 04, 2014. | Manuscript published on March 05, 2014. | PP: 212-215 | Volume-4 Issue-1, March 2014. | Retrieval Number: A2159034114/2014©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: The Smart Grid is formed by many sub-networks such as the Home Area Network (HAN), service providers, transmission, distribution, and bulk generation, operations and market which are at risk and can be attacked remotely. Smart grids that is supports data aggregation and access control. Data can be aggregated by home area network (HAN), building area network (BAN), and neighboring area network (NAN) in such a way that the privacy of customers is protected. Smart grid designing a mutual authentication scheme and a key management protocol. This paper proposes an efficient scheme that mutually authenticates a smart grid and an authentication server in SG by decreasing the number of steps in the secure remote password protocol. In this paper we propose an efficient key management protocol based on our enhanced identity-based cryptography for secure SG communications using the public key infrastructure. The improved efficiency for key management is realized by periodically refreshing all public/ private key pairs as well as any multicast keys in all the nodes using only one newly generated function broadcasted by the key generator entity. We show that the proposed mechanisms are resilient against insider attackers performing serious attacks such as man-in-the-middle or impersonation during device authentication. Further, the proposed authentication mechanisms are intuitive and require no (or minimum) user effort.
Keywords: Enhanced identity-based, key management, cryptography (EIBC), smart grid (SG) mutual authentication, and secure remote password (SRP).