Research Article Open Access

A Secure Unicast/Multicast Authentication and Key Distribution Protocols for Smart Grid

Samah Mohamed Sayed1, Heba Kamal Aslan2,3 and Ayman Mohamed Hassan1
  • 1 Department of Electronics and Communication, Benha Engineering University, Egypt
  • 2 Department of Informatics Science, Faculty of Information Technology and Computer Science, Nile University, Egypt
  • 3 Department of Informatics, Electronics Research Institute, Egypt

Abstract

This study discusses the problem of key distribution protocol in IoT systems especially smart grids for two modes of communication: Unicast and multicast. In the present paper, we suggested two protocols for key distribution for both unicast and multicast communication. The proposed schemes are based on symmetric key encryption with cryptographic primitives: Hashes and nonces. In addition, the multicast key distribution protocol is based on a logical key hierarchy to reduce communication and computation overheads in case of any member change. The proposed solutions are compared to other protocols based on communication and computation overheads, and the ability to resist well-known attacks. The comparison shows that the proposed protocols have the lowest overheads while resisting known attacks. To ensure the correctness and security of the proposed protocol, it is analyzed using a logical tool (BAN logic). The analysis illustrates that the proposed protocols are free from bugs or redundancies.

American Journal of Engineering and Applied Sciences
Volume 15 No. 4, 2022, 331-343

DOI: https://doi.org/10.3844/ajeassp.2022.331.343

Submitted On: 14 October 2022 Published On: 4 January 2023

How to Cite: Sayed, S. M., Aslan, H. K. & Hassan, A. M. (2022). A Secure Unicast/Multicast Authentication and Key Distribution Protocols for Smart Grid. American Journal of Engineering and Applied Sciences, 15(4), 331-343. https://doi.org/10.3844/ajeassp.2022.331.343

  • 1,860 Views
  • 930 Downloads
  • 0 Citations

Download

Keywords

  • IoT Security
  • Key Management
  • Symmetric Key Distribution
  • SM Modes of Operations
  • Unicast Key Distribution
  • Multicast Key Distribution
  • Broadcast Key Distribution
  • BAN Logic