Certificateless Authentication Scheme for Key Distribution in IEC 61850-90-5 PMU Communication Network

Research output: Contribution to journalArticlepeer-review

Abstract

Phasor Measurement Unit (PMU) data transmitted over public wide area networks and following standardized protocols becomes increasingly vulnerable to cyberattacks. The IEC 61850-90-5 standard introduces cryptographic measures like encryption algorithms and message authentication codes (MACs) for PMU data security. To facilitate the exchange of keys for these symmetric algorithms, the standard specifies a key distribution mechanism that includes the authentication of participating entities. Certificate-based authentication is recommended for key distribution, but this approach faces challenges, including complex certificate management and key escrow issues. To address these issues, this paper proposes a certificateless authentication protocol based on Elliptic Curve Cryptography (ECC) for IEC 61850-90-5 PMU communication. The proposed scheme eliminates reliance on Certificate Authorities and resolves key escrow issues while ensuring efficient mutual authentication. A formal security analysis using the Real-Or-Random (ROR) model and validation through the AVISPA tool confirm the scheme's robustness against impersonation, replay, and MITM attacks, demonstrating its superior security and efficiency compared to existing methods.

Original languageEnglish
JournalIEEE Transactions on Industry Applications
DOIs
StateAccepted/In press - 2025

Bibliographical note

Publisher Copyright:
© 1972-2012 IEEE.

Keywords

  • Authentication protocols
  • Elliptic Curve Cryptography (ECC)
  • PMU Communication Network (PMU-CN)
  • Phasor Measurement Unit (PMU)

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Industrial and Manufacturing Engineering
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Certificateless Authentication Scheme for Key Distribution in IEC 61850-90-5 PMU Communication Network'. Together they form a unique fingerprint.

Cite this