Visible to the public Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet

TitleUniversally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet
Publication TypeJournal Article
Year of Publication2019
AuthorsSani, Abubakar Sadiq, Yuan, Dong, Bao, Wei, Dong, Zhao Yang, Vucetic, Branka, Bertino, Elisa
JournalIEEE Transactions on Information Forensics and Security
Volume14
Pagination2113–2127
ISSN1556-6021
Keywordscommunication, composability, Computational modeling, cryptographic protocols, cryptography, Energy efficiency, energy internet, energy resources, ideal functionality, Internet, key bootstrapping, multicast communication, multicast communications, multiple energy resources, power engineering computing, practical key bootstrapping protocol, Protocols, pubcrawl, secure communication protocol, secure key bootstrapping protocol, security, session keys, Smart grids, smart power grids, strong security notion, telecommunication security, universal composability, universal composability model, universally composable key bootstrapping
AbstractThe Energy Internet is an advanced smart grid solution to increase energy efficiency by jointly operating multiple energy resources via the Internet. However, such an increasing integration of energy resources requires secure and efficient communication in the Energy Internet. To address such a requirement, we propose a new secure key bootstrapping protocol to support the integration and operation of energy resources. By using a universal composability model that provides a strong security notion for designing and analyzing cryptographic protocols, we define an ideal functionality that supports several cryptographic primitives used in this paper. Furthermore, we provide an ideal functionality for key bootstrapping and secure communication, which allows exchanged session keys to be used for secure communication in an ideal manner. We propose the first secure key bootstrapping protocol that enables a user to verify the identities of other users before key bootstrapping. We also present a secure communication protocol for unicast and multicast communications. The ideal functionalities help in the design and analysis of the proposed protocols. We perform some experiments to validate the performance of our protocols, and the results show that our protocols are superior to the existing related protocols and are suitable for the Energy Internet. As a proof of concept, we apply our functionalities to a practical key bootstrapping protocol, namely generic bootstrapping architecture.
DOI10.1109/TIFS.2019.2892005
Citation Keysani_universally_2019