The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


An Anonymous Identity-based With Bilateral Protocol for Smart Grid

Smart Grid (SG) is a modern digital metering system that was introduced by researchers to take over the traditional electricity infrastructure that existed before by gathering and putting in use the data generated by smart meters and ensure efficiency and reliability in the two directional flow of electricity and data for both the service providers and smart meters. Leakage of customers’ identity causes inconvenience to the customer because he is exposed to theft in his household. Secure anonymous key distribution scheme for SG has been proposed as solution to secure data transfer between service provider and customer. Existing secure anonymous key distribution scheme for SG brings challenge such as being inefficient, having traceability issues and do not stop replay attack hence vulnerable to DoS attacks. In this paper a Secure efficient anonymous identity-based with bilateral protocol is proposed to address the weakness in existing anonymous key distribution schemes. , With this protocol, both smart meter and service provider in (SG) identify each other anonymously in efficient way achieving un-traceability and restisting Replay and DoS attack.


[1] Aalamifar F. and Lampe L., “Cost-Efficient Qos- Aware Data Acquisition Point Placement for Advanced Metering Infrastructure,” IEEE Transactions on Communications, vol. 66, no. 12, pp. 6260-6274, 2018.

[2] Baimel D., Tapuchi S., and Baimel N., “Smart Grid Communication Technologies- Overview, Research Challenges and Opportunities,” in Proceedings of International Symposium on Power Electronics, Electrical Drives, Automation and Motion, SPEEDAM, Capri, pp. 116-120, 2016.

[3] Balode N., Gade S., Shinde M., and Kore K., “Optimized Identity-Based Encryption from Bilinear Pairing,” International Journal of Advance Scientific Research and Engineering Trends, vol. 3, no. 3, pp. 2456-0774, 2018.

[4] Batamuliza J. and Hanyurwimfura D., “A Secure and Efficient Anonymous Certificateless Signcryption for Key Distribution Scheme for Smart Grid,” in Proceedings of the 21st International Arab Conference on Information Technology, 6 of October, pp. 1-7, 2020.

[5] Binbin Y. and Hongtu L., “Anonymous Authentication Key Agreement Scheme with Pairing-Based Cryptography for Home-Based Multi-Sensor Internet of Things,” International Journal of Distributed Sensor Networks, vol. 15, no. 9, 2019.

[6] Debiao H., Huaqun W., Muhammad K., and Lina W., “Lightweight Anonymous Key Distribution Scheme for Smart Grid Using Elliptic Curve Cryptography,” IET Communications, vol. 10, no. 14, pp. 1795-1802, 2016.

[7] Erfaneh V., Majid B., Mohammad R., and Mohammad R., “A Secure ECC-Based Privacy Preserving Data Aggregation Scheme for Smart Grids,” Computer Networks, vol. 129, pp. 28-36, 2017.

[8] Gungor V., “Smart Grid Technologies: Communication Technologies and Standards,” IEEE Transactions on Industrial Informatics, vol. 7, no. 4, pp. 529-539, 2011.

[9] Gungor V., “Smart Grid Technologies: Communication Technologies and Standards,” IEEE Transactions on Industrial Informatics, vol. 7, no. 4, pp. 529-539, 2011.

[10] Jin J., Gubbi J., Marusic S., and Palaniswami M., “An Information Framework for Creating A Smart City Through Internet of Things,” IEEE Internet Things Journal, vol. 1, no. 2, pp. 112- 121, 2014.

[11] Kabalci Y., “A Survey on Smart Metering and Smart Grid Communication,” Renewable and Sustainable Energy Reviews, vol. 57, pp. 302- 318, 2016. 436 The International Arab Journal of Information Technology, Vol. 18, No. 3A, Special Issue 2021

[12] Kamto J., Qian L., Fuller J., and Attia J., “Light- Weight Key Distribution and Management for Advanced Metering Infrastructure,” in Proceedings of IEEE GLOBECOM Workshops, Houston, pp. 1216-1220, 2011.

[13] Karuppiah M., Das K., Li X., Kumari S., Wu F., Chaudhry S., and Niranchana R., “Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment,” Mobile Networks and Applications, vol. 24, no. 3, pp. 1-17, 2018.

[14] Lanjun D., Jie X., Xuefei C., Hui L., Jie C., Yueyu Z., and Xiaotong F., “Efficient Identity- Based Authenticated Key Agreement Protocol With Provable Security for Vehicular Ad Hoc Networks,” International Journal of Distributed Sensor Networks, vol. 14, no. 4, pp. 1-14, 2018.

[15] Li Q., Hsu C., Choo K., and He D., “A Provably Secure and Lightweight Identity-Based Two- Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks,” Security and Communication Networks, 2019.

[16] Liu N., Chen., Zhu L., Zhang J., and He Y., “A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid,” Transactions on Industrial Electronics, vol. 60, no. 10, pp. 4746- 4756, 2013.

[17] Mahmood K., Shehzad A., Husnain N., Saru K., Xiong L., and Arun K., “An Elliptic Curve Cryptography Based Lightweight Authentication Scheme for Smart Grid Communication,” Future Generation Computer Systems, vol. 81, pp. 557- 565, 2017.

[18] McHenry M. and Mark P., “Technical and Governance Considerations for Advanced Metering Infrastructure/Smart Meters: Technology, Security, Uncertainty, Costs, Benefits, and Risks.” Energy Policy, vol. 59, pp. 834-842, 2013.

[19] Mona M., Sahar G., and Magdy N., “Privacy- Preserving for Distributed Data Streams: Towards l-Diversity” The International Arab Journal of Information Technology, vol. 17, no. 1, pp. 52-64, 2020.

[20] Preeti C., Ankita S., and Rifaqat A., “Cryptanalysis and Improvement of a Secure Mutual Authentication Scheme for Remote Users,” International Conference on Electrical, Computer and Communication Technologies, Coimbatore, pp. 1-9, 2019.

[21] Singhal A., “Diffie Hellman Key Exchange” https://www.gatevidyalay.com/diffie-hellman- key-exchange-asymmetric-encryption, Last Visited, 2021.

[22] Thwe P. and Htet M., “Prevention of Man-In- The-Middle Attack in Diffie-Hellman Key Exchange Algorithm using Proposed Hash Function,” International Journal of Advances in Scientific Research and Engineering, vol. 5, no. 10, 2019.

[23] Tsai L. and Lo W., “Secure Anonymous Key Distribution Scheme for Smart Grid,” IEEE Transactions on Smart Grid, vol. 7, no. 2, pp. 906-914, 2016.

[24] Wang M., Dai G., Choo K, Jayaraman P., and Ranjan R., “Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures,” Plos, vol. 11, no. 8, 2016.

[25] Xia J. and Wang Y., “Secure key distribution for WKH VPDUW JULG´IEEE Transactions Smart Grid, vol. 3, no. 3, pp. 1437-1443, 2012.

[26] Yang Z., Ping S., Sun H., and Aghvami H., “Crb- Rpl: A Receiver-Based Routing Protocol for Communications in Cognitive Radio Enabled Smart Grid,” IEEE Transactions on Vehicular Technology, vol. 66, no. 7, pp. 5985-5994, 2017.

[27] Zhao Y., Li S., and Jiang L., “Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multi server Environment,” Security and Communication Networks, pp. 1-13, 2018. An Anonymous Identity-based With Bilateral Protocol for Smart Grid 437 Jennifer Batamuliza received her Bachelor degree of Engineering in Computer Engineering and Information Technology from University of Rwanda (Former KIST) in 2012. She received her Master degree of Engineering in Computer Science and Technology from the University of Electronic Science and Technology of China, China in 2016. She is a lecturer at Adventist University of Central Africa (AUCA) in Information Technology faculty and she is the associate director of research and consultancy at Adventist University of Central Africa (AUCA). She is currently Pursuing PhD in Data science in Data mining. Her research interest includes cryptographic protocols, Data mining, Machine learning, cloud computing and network security. Damien Hanyurwimfura received his Bachelor degree of Engineering in Computer Engineering and Information Technology from University of Rwanda (Former KIST) in 2005. He obtained his Master degree of Engineering in Computer Science and Technology and Ph.D. degree in Computer Science and Technology from Hunan University, China in 2010 and 2015 respectively. He is currently working as the Acting Director and Head of PhD Studies and Research at the African Center of Excellence in Internet of Things (ACEIoT), College of Science and Technology, University of Rwanda. He has been selected to participate in Postdoctoral Researchers’ Networking Tour 2018 organized by DAAD, Germany on the theme: Artificial Intelligence Coming of Age – Research and Development in Germany, September 23rd to 29th 2018. He is a member of Rwanda Academy of Sciences (RAS), Rwanda China Alumni Organization (RCAO) and University of Rwanda Alumni. He is a Technical Program Committee member for many international peer reviewed conferences. He has published and co-authored more than 25 research papers in leading international journals and conferences. His research interests covers most aspect of data mining, machine learning, Computer security, watermarking, Internet of Things, hate speech detection and recommender systems.