• English
    • العربية
  • العربية
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
  • Help
    • Item Submission
    • Publisher policies
    • User guides
    • FAQs
  • About QSpace
    • Vision & Mission
View Item 
  •   Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Electrical Engineering
  • View Item
  • Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Electrical Engineering
  • View Item
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Using ID-Based Authentication and Key Agreement Mechanism for Securing Communication in Advanced Metering Infrastructure

    Thumbnail
    View/Open
    Using ID-Based Authentication and Key Agreement Mechanism for Securing Communication in Advanced Metering Infrastructure.pdf (1.373Mb)
    Date
    2020
    Author
    Farooq, Shaik Mullapathi
    Hussain, S. M. Suhail
    Ustun, Taha Selim
    Iqbal, Atif
    Metadata
    Show full item record
    Abstract
    Smart metering technology plays a key role in Advanced Metering Infrastructure (AMI) in Smart Grid (SG). Smart Meters (SM) measure Power Consumption Data (PCD) of household devices and send it to DSO (Distributed System Operator) for further processing. DSO utilizes PCD for different applications such as monthly billing, demand response and other applications related to power system operation and energy markets. Secure communication between SM and DSO is of paramount importance. Certificate-based authentication is a de facto mechanism in ensuring legitimacy of communicating parties. But it incurs more computational delay as it involves intensive processes such as certificate management, revocation, and verification. ID-based authentication eliminates the risks associated with certificate management. A key agreement protocol based on ID-based authentication mechanism is proposed and analyzed for computational performance. This paper analyzes and evaluates both authentication mechanisms: certificate and ID-based mechanism based on computational times for suitability in AMI network. The experimental results show that ID-based authentication and key agreement mechanism are suitable for securing communication in AMI network.
    DOI/handle
    http://dx.doi.org/10.1109/ACCESS.2020.3038813
    http://hdl.handle.net/10576/29148
    Collections
    • Electrical Engineering [‎2840‎ items ]

    entitlement


    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Home

    Submit your QU affiliated work

    Browse

    All of Digital Hub
      Communities & Collections Publication Date Author Title Subject Type Language Publisher
    This Collection
      Publication Date Author Title Subject Type Language Publisher

    My Account

    Login

    Statistics

    View Usage Statistics

    About QSpace

    Vision & Mission

    Help

    Item Submission Publisher policiesUser guides FAQs

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Video