Yazar "Shah, Habib" seçeneğine göre listele
Listeleniyor 1 - 2 / 2
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2021) Tanveer, Muhammad; Khan, Abd Ullah; Shah, Habib; Alkhayyat, Ahmed; Chaudhry, Shehzad Ashraf; Ahmad, MusheerInternet of Things-enabled smart grid (SG) technology provides ample advantages to traditional power grids. In an SG system, the smart meter (SM) is the critical component that collects the power usage information related to users and delivers the accumulated vital information to the central service provider (CSP) via the Internet. The information is exposed to numerous pernicious security threats. Consequently, it is crucial to preserve the integrity of the communication between SMs and CSP for the smooth running of the SG system. Authentication protocol effectively enables SM and CSP to communicate securely by establishing a secure channel. Therefore, this paper presents an anonymous and reliable authentication protocol for SG (ARAP-SG) to enable secure and reliable information exchange between SM and CSP. The proposed ARAP-SG uses the hash function, elliptic curve cryptography, and symmetric encryption to complete the authentication phase. Consequently, ARAP-SG guarantees reliable information exchange during the authentication phase while conserving the anonymity of both SP and SM. Additionally, ARAP-SG authorizes CSP and SM to construct a session key (SK) after accomplishing the authentication phase for undecipherable information exchange in the future. We utilize the random oracle model to corroborate the security of the constructed SK in ARAP-SG. Moreover, by effectuating informal security analysis, it is manifested that ARAP-SG is proficient in thwarting covert security attacks. Furthermore, Scyther-based analysis is conducted to manifest that ARAP-SG is secure. Finally, through a comparative analysis with relevant authentication protocols, it is explained and shown that ARAP-SG entails 25.5-56.76% and 7.69- 49.47% low computational and communication overheads, respectively, with improved security properties.Öğe PASKE-IoD: Privacy-Protecting Authenticated Key Establishment for Internet of Drones(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2021) Tanveer, Muhammad; Khan, Abd Ullah; Shah, Habib; Chaudhry, Shehzad Ashraf; Naushad, AlamgirUnmanned aerial vehicles/drones are considered an essential ingredient of traffic motoring systems in smart cities. Interconnected drones, also called the Internet of Drones (IoD), gather critical data from the environmental area of interest and transmit the data to a server located at the control room for further processing. This transmission occurs via wireless communication channels, which are exposed to various security risks. Besides this, an External User (EU) occasionally demands access to real-time information stored at a specific drone rather than retrieving data from the server, which requires an efficient Authenticated Session Key Establishment (ASKE) approach to ensure a reliable communication in IoD environment. In this article, we present a Privacy-Protecting ASKE scheme for IoD (PASKE-IoD). PASKE-IoD utilizes Authenticated Encryption (AE) primitive ‘‘ASCON,’’ and hash function ‘‘ASCON-hash,’’ to accomplish the ASKE phase. PASKE-IoD checks the EU’s authenticity before allowing him to access the IoD environment resources. Moreover, PASKE-IoD enables EUs and drones to communicate securely after establishing a session key. Meticulous informal security analysis and security verification are carried out using Scyther to demonstrate that PASKE-IoD is immune to numerous covert security attacks. In addition, BurrowsAbadi-Needham logic is utilized to corroborate the logical exactitude of PASKE-IoD. A comparative analysis is presented to illustrate that PASKE-IoD is efficient and renders more security features than the eminent ASKE scheme.