본문 바로가기 주메뉴 바로가기
검색 검색영역닫기 검색 검색영역닫기 ENGLISH 메뉴 전체보기 메뉴 전체보기

논문

Secure and Efficient Report Protocol for Networked Smart Grid Systems Using Linear Map

https://doi.org/10.1587/transfun.E96.A.886

  • 저자Youngsam KIM , Joon HEO
  • 학술지IEICE TRANSACTIONS on Fundamentals of Electronics E96.A
  • 등재유형
  • 게재일자(2013)


A smart meter, a component of smart grid systems, has low computational capability. This is in contrast to data collection units (DCUs) and meter data management servers (MDMSs). In this study, we propose a lightweight signature scheme and an authentication and report protocol that can reduce computational overhead and facilitate efficient operation of these three components in smart grid systems. The proposed signature scheme, called the linear map digital signature scheme (LMDSS), uses properties of linear maps and matrix operations; hence, it has low computational requirements. The proposed protocol is a delegation-based authentication protocol that uses an intermediate node, DCU. Using the proposed protocol, authentication of a DCU can be completed by a hash function. To evaluate the performance of the scheme and protocol, we implemented signature schemes, ours and others, and simulated the proposed protocol to obtain analytical results. We also proved that the scheme is secure by using a random oracle and analyzing the security of the protocol based on possible attack scenarios.


A smart meter, a component of smart grid systems, has low computational capability. This is in contrast to data collection units (DCUs) and meter data management servers (MDMSs). In this study, we propose a lightweight signature scheme and an authentication and report protocol that can reduce computational overhead and facilitate efficient operation of these three components in smart grid systems. The proposed signature scheme, called the linear map digital signature scheme (LMDSS), uses properties of linear maps and matrix operations; hence, it has low computational requirements. The proposed protocol is a delegation-based authentication protocol that uses an intermediate node, DCU. Using the proposed protocol, authentication of a DCU can be completed by a hash function. To evaluate the performance of the scheme and protocol, we implemented signature schemes, ours and others, and simulated the proposed protocol to obtain analytical results. We also proved that the scheme is secure by using a random oracle and analyzing the security of the protocol based on possible attack scenarios.

이 페이지에서 제공하는 정보에 대해 만족하십니까?