Szerző dc.contributor.author | Nadeem Muhammad | |
Szerző dc.contributor.author | Arshad Ali | |
Szerző dc.contributor.author | Riaz Saman | |
Szerző dc.contributor.author | Wajiha Zahra Syeda | |
Szerző dc.contributor.author | S. Band Shahab | |
Szerző dc.contributor.author | Mosavi Amir | |
Elérhetőség dátuma dc.date.accessioned | 2023-02-16T12:05:14Z | |
Rendelkezésre állás dátuma dc.date.available | 2023-02-16T12:05:14Z | |
Kiadás dc.date.issued | 2023 | |
Issn dc.identifier.issn | 1546-2226 | |
Issn dc.identifier.issn | 1546-2218 | |
Uri dc.identifier.uri | http://hdl.handle.net/20.500.12944/19977 | |
Kivonat dc.description.abstract | Authentication protocols are often used in smart grids to deliver the necessary level of security. A huge number of clients in such a system, however, provides the attacker with the ability to clone them, for example. Device fingerprints, or Physically Unclonable Functions (PUF), have been investigated as an authentication feature to thwart such attacks. In order to accomplish the necessary security in smart grid neighborhood area network communications and to prevent unwanted physical access to smart meters, a former study designed a lightweight authentication system in this way. The suggested protocol uses PUFs to reduce physical attacks. As a consequence, the server/meter impersonation attack is one of the many assaults that this protocol is thought to be secure against. On the other hand, it is generally acknowledged that no security solution should be trusted unless its security has been verified by independent researchers. As a result, this paper assesses the security of this protocol against a typical adversary who has access to or influences over the messages carried over the public channel. This study demonstrates that the attacker is simply capable of impersonating the server for the meter and vice versa. In addition, the suggested attacks desynchronize them, making the adversary the only one capable of interacting with the meter in the role of the legal server rather than the latter. Each of the proposed attacks is extremely effective, and their success probability is almost 1. Finally, a modification is suggested that successfully fixes the protocol’s security weaknesses. The security proof of the improved protocol has been done through the Scyther tool. The computational cost comparison shows that the overhead of the proposed protocol compared to the former scheme is 4.85%, while it withstands various attacks, including traceability, desynchronization, impersonation, man-in-the-middle, and secret disclosure attacks. | |
Nyelv dc.language | en | |
Kulcsszó dc.subject | cryptography | |
Kulcsszó dc.subject | symmetric algorithm | |
Kulcsszó dc.subject | encryption | |
Kulcsszó dc.subject | decryption | |
Kulcsszó dc.subject | cipher text | |
Kulcsszó dc.subject | cloud security | |
Kulcsszó dc.subject | asymmetric algorithm | |
Cím dc.title | Two layer symmetric cryptography algorithm for protecting data from attacks | |
Típus dc.type | folyóiratcikk | |
Változtatás dátuma dc.date.updated | 2023-02-14T14:38:12Z | |
Változat dc.description.version | kiadói | |
Hozzáférés dc.rights.accessRights | nyílt hozzáférésű | |
Doi azonosító dc.identifier.doi | 10.32604/cmc.2023.030899 | |
Tudományág dc.subject.discipline | Műszaki tudományok | |
Tudományterület dc.subject.sciencebranch | Informatikai tudományok | |
Mtmt azonosító dc.identifier.mtmt | 33200314 | |
Folyóirat dc.identifier.journalTitle | CMC-Computers, Materials & Continua | |
Évfolyam dc.identifier.journalVolume | 74 | |
Füzetszám dc.identifier.journalIssueNumber | 2 | |
Terjedelem dc.format.page | 2625-2640 | |
Scopus azonosító dc.identifier.scopus | 85141891221 | |
Folyóiratcím rövidítve dc.identifier.journalAbbreviatedTitle | CMC-COMPUT MATER CON | |
Kiadás éve dc.description.issuedate | 2023 | |
Szerző intézménye dc.contributor.department | Szoftvertervezés- és Fejlesztés Intézet | |
Szerző intézménye dc.contributor.department | Információs Társadalom Kutatóintézet | |
Szerző intézménye dc.contributor.department | Informatikai Tudományok Doktori Iskola | |
Szerző intézménye dc.contributor.department | Biztonságtudományi Doktori Iskola | |
Szerző intézménye dc.contributor.department | Felsőbbfokú Tanulmányok Intézete |