Next Article in Journal
An Optimized DNN Model for Real-Time Inferencing on an Embedded Device
Previous Article in Journal
Resource Management for Collaborative 5G-NR-V2X RSUs to Enhance V2I/N Link Reliability
Previous Article in Special Issue
Dynamic Feature Dataset for Ransomware Detection Using Machine Learning Algorithms
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Lightweight Authentication and Key Agreement Protocol for IoT-Enabled Smart Grid System

1
School of Cyber Science and Technology, Beihang University, Beijing 100191, China
2
State Key Laboratory of Cryptology, Beijing 100878, China
3
State Key Laboratory of Software Development Environment, Beihang University, Beijing 100191, China
4
Sino-French Engineer School, Beihang University, Beijing 100191, China
*
Author to whom correspondence should be addressed.
Submission received: 8 March 2023 / Revised: 11 April 2023 / Accepted: 12 April 2023 / Published: 14 April 2023
(This article belongs to the Special Issue Security and Privacy in Large-Scale Data Networks)

Abstract

:
The IoT-enabled Smart Grid uses IoT smart devices to collect the private electricity data of consumers and send it to service providers over the public network, which leads to some new security problems. To ensure the communication security in a smart grid, many researches are focusing on using authentication and key agreement protocols to protect against cyber attacks. Unfortunately, most of them are vulnerable to various attacks. In this paper, we analyze the security of an existent protocol by introducing an insider attacker, and show that their scheme cannot guarantee the claimed security requirements under their adversary model. Then, we present an improved lightweight authentication and key agreement protocol, which aims to enhance the security of IoT-enabled smart grid systems. Furthermore, we proved the security of the scheme under the real-or-random oracle model. The result shown that the improved scheme is secure in the presence of both internal attackers and external attackers. Compared with the original protocol, the new protocol is more secure, while keeping the same computation efficiency. Both of them are 0.0552 ms. The communication of the new protocol is 236 bytes, which is acceptable in smart grids. In other words, with similar communication and computation cost, we proposed a more secure protocol for smart grids.

1. Introduction

With the rapid growth of Internet of Things (IoT), the IoT-enabled smart grid is gradually replacing the traditional power grid and becoming one of the important infrastructures in real society [1,2,3,4]. The IoT-enabled smart grid integrates wireless sensor networks into the power system, and obtains physical information such as grid operation status and parameters through wireless sensor networks. In smart grids, the wireless sensor network has become a useful supplement to the production, transmission, distribution and consumption of electric energy.
According to the latest NIST Framework and Roadmap for Smart Grid Interoperability Standards 4.0 [5], released in 2021, the smart grid model can be roughly abstracted into seven domains: customer, markets, service provider (SP), operations, generation (including DER), transmission and distribution, as shown in Figure 1. The solid blue line indicates secure communication flows and the dotted yellow line indicates electrical flows. The Customer is the end user of electricity, who may also generate, store, and manage the use of energy, which relies on smart meters (SMs) to access the smart grid. The Markets are the facilitators and participants in electricity markets and other economic mechanisms used to drive action and optimize system outcomes.The Service Provider is the organization providing services to electrical customers and to utilities.The Operations are the managers of the movement of electricity. The Generation Including DER is the producer of electricity, and may also store energy for later distribution. Transmission refers to the carriers of high voltage electricity over long distances. Distribution is the distributor of electricity to and from customers.
The smart grid (SG) is superior to the traditional grid in several aspects [6], such as flexible control, efficient operation, convenient use, etc.. However, as mentioned above, the SM is deployed on the side of consumers, so it is easy for most people to contact the SM, which gives a great opportunity to malicious attackers [7,8]. On the contrary, due to the large number of SMs, it may be difficult for service providers to carry out effective security monitoring and physical protection. In other words, the security of the smart grid relies on the security of the communication protocol used in the communication between SMs and SPs in the power grid, and whether the identity authentication and information transmission can be carried out securely. On 23 December 2015, some attackers successfully forged identity authentication and attacked the control system of the smart grid by taking advantage of the loopholes in the smart grid of Ukraine’s energy supply company, which resulted in unexpected hours of large-scale blackout and great damage to the normal management of the society [9].

1.1. Related Work

Many researchers have paid attention to the authentication and key agreement protocols under smart grid circumstances. In 2011, Wu and Zhou et al. presented an authentication protocol [10] which applied elliptic curve cryptography (ECC) into a smart grid to provide fault tolerance and scalability. However, it was soon pointed out that the scheme could not resist the man-in-the-middle attack. In 2012, Xia and Wang et al. proposed a new key distribution protocol [11] combined with the lightweight directory access protocol (LDAP), which improved both the security and the efficiency. Unfortunately, their scheme cannot resist impersonation attack and cannot guarantee the anonymity of users [12]. Also in 2012, Wang et al. presented an authentication protocol in identity [13], which ignores that smart meters need to be anonymous. Afterwards, Tsai and Lo [14] proposed a new smart grid authentication protocol using identity based encryption technology. However, their scheme was pointed out to be unable to guarantee the privacy of smart meter credentials [15], and cannot provide session key security under the widely accepted Canetti–Krawczyk adversary (CK-adversary) model [16,17]. In 2014, Nicanfar et al. suggested a security protocol [18] for authentication, with a key generator to update the grid’s key. However, his scheme’s computation cost is expensive, thus is not suitable for smart grids.
With the development of sensor equipment, lightweight authentication and key agreement schemes in smart grids have become popular. In 2018, Mohammadali et al. presented an identity-based authentication with light burden and key agreement scheme, where elliptic curve cryptography is used to establish a session key [19]. In the same year, Mahmood et al. also paid attention to the efficiency of the authentication scheme in a smart grid and designed a lightweight user authentication protocol [20] based on ECC. Unfortunately, although these two schemes are designed cleverly, they are not anonymous enough. Therefore, Kumar et al. [21] proposed a lightweight security protocol for anonymity in smart grids, but a synchronization problem was also pointed out. In 2019, Zhang et al. proposed an identity authentication communication scheme [22] in smart grids, which uses a novel dynamic verification table to protect the anonymous data, either in authentication or in the smart meters. Meanwhile, this new protocol is a fault-tolerant mechanism, and also ensures the untraceability of the user’s identity. In 2020, Ferrag et al. [23] pointed out that Zhang et al.’s scheme cannot ensure authentication of all nodes, but they did not give a detailed explanation. Sadhukhan et al. [24] showed the potential performance problems of Zhang et al.’s scheme. However, there are few articles on the security analysis of Zhang et al.’s scheme. In the same year, Abbasinezhad-Mood et al. proposed an anonymous ECC-based self-certified key distribution scheme [25], the scheme is not only free from the overhead of the certificate management and the key escrow issue, but is also more efficient than anonymous schemes in terms of both communication and computational costs.
In 2020, Khan et al. [26] suggested a novel system for smart grids PALK as a means for authenticating communication between two SG entities. Additionally, they analyzed many of PALK’s security characteristics and attack resilience. However, in 2022, Mohammed Taqi et al. [27] revealed that Khan et al.’s [26] scheme is vulnerable to well-known security threats, such as user anonymity and password guessing attack. They also proposed a new protocol LSPA-SG that they claimed would withstand every known attack. In 2022, Deebak et al. proposed a seamless authentication framework with privacy-preserving (SAF-PP) protocol [28] to deal with the security and privacy issues of smart eHealth intelligence. The formal analysis proves that SAF-PP can adhere to significant security properties while improving the system efficiency rate.
In a smart grid, where communication information is vulnerable to various attack threats, a secure authentication and key agreement protocol is essential for secure communication. We present a summary of the security problems and limitations of the recently available AKE schemes in Table 1. Meanwhile, most of the existing protocols [29,30,31] do not take into account the presence of insider attackers. In conjunction with the actual deployment environment of the smart grid, it is essential to consider how the protocol can guarantee the security of communication in the presence of insider attackers. In addition, it is necessary to consider a secure authentication protocol for IoT smart devices in resource-constrained scenarios in the smart grid.

1.2. Motivation

In the smart grid environment, it is critical to realize anonymity and untraceability for the smart meter with the presence of internal attackers during the authentication process. Zhang et al. [22] presented a practical authentication and key agreement scheme, and claimed that their proposal can satisfy security requirements and outperform the current solutions. This paper analyzes the security of Zhang et al.’s protocol [22], and points out that their scheme cannot really guarantee the claimed security requirements under their adversary model. More precisely, they regard the attacker as a third party, but ignore that the attacker may also be a legitimate consumer of the smart grid, who can obtain a legal identity of a smart meter.
Based on above assumption, we review and analyze Zhang et al.’s protocol [22] and point out that their work is not secure enough to prevent an impersonation attack from an insider attacker. We then improved Zhang et al.’s protocol so that it can resist against various attacks from both outsider and insider attackers.

1.3. Contribution

The contribution of this paper is as follows:
  • We introduce an insider attack and take Zhang et al.’s protocol [22] as an example to improve the security. We first analyze the security of Zhang et al.’s protocol [22] and point out the reasons why their protocol cannot resist insider attack. Then, we describe the detailed steps of an insider attack, and show the potential threats of insider attack. In addition, we have made improvements to Zhang et al.’s protocol to resist insider attack.
  • We analyze the security and performance of our proposed protocol and the results show that the protocol has strong security and efficiency. We analyze the security of the improved protocol in detail and prove the security of the protocol under the real-or-random oracle model. Through informal analysis, it has been shown that this protocol can resist common attacks, including insider attack. After that, we compare the proposed protocol with other schemes, indicating that the improved protocol is still lightweight.
The rest of the paper is introduced as follows. Section 3 analyzes the security of Zhang et al.’s scheme. In Section 3, an improved lightweight authentication and key agreement protocol is presented in details. Section 4 introduces the secure analysis of the improved scheme. In Section 5, a detailed comparison of the security and computational cost is conducted between the improved protocol and several other schemes. Section 7 concludes the whole paper.

2. Preliminaries

2.1. Communication Model

This paper focuses on the authentication between Service Provider and Customer, and thus it is based on the sub-network, which consists of the service provider and the smart meters. A smart meter is a hardware device deployed on the legitimate user side of the power grid, which can be used to transmit information in the power grid, undertake power consumption monitoring, electricity price information and other sensing functions [32,33,34]. Service providers provide power services for consumers, i.e., receive power information through SMs, charge the users, analyze the consumer’s data, and so on [35,36,37].
A secure protocol is used between SMs and SPs to provide identity authentication and key agreement. A smart meter usually registers a legal identity through a secret channel before communication. After that, the SM and SP authenticate each other through the public network and generate a secret session key at the same time. The session key is used for SM and SP subsequent session encryption, as shown in Figure 2. From a practical point of view, a smart meter is easy to be access by anyone, and is thus vulnerable to eavesdropping, modification or physical attacks. Note that it is also a tamper resistant device so that the information stored in it is difficult to be stolen, changed or destroyed.

2.2. Threat Model

Assume an attacker is a probability polynomial time (PPT) attacker, which means he can obtain all the messages transmitted in the public channel, i.e., can intercept, modify or replay all the messages, can obtain access to all the normal released information in the grid, and can access and control smart meters, but cannot obtain sensitive data stored in the tamper-resistant devices. Moreover, according to Zhang et al. [22], an attacker can acquire SPs’ master keys or IDs, but not both. An attacker can also obtain the validation table used in the scheme from the providers’ servers.

2.3. Security Goals

The security scheme in smart grid should meet the following security objectives:
  • Mutual authentication: Each session between the smart meter and service provider requires complete mutual authentication. This is to ensure that both sides of the communication are credible.
  • Generate security session key: The security scheme should generate a temporary session key, which is confidential and unpredictable to any third party.
  • Resist known security attacks: The security scheme should resist common attacks, such as man in the middle attack, replay attack, and so on.
  • Provide SM’s anonymity: The scheme usually only needs to ensure that the third party cannot obtain the identity information of the smart meter. However, a good security protocol should make the service provider unable to figure out whether two sessions are possessed by the same SM or not.

3. Some Flaws of Zhang et al.’s Scheme

This section firstly exhibits Zhang et al.’s scheme, then shows how to mount an insider attack on Zhang et al.’s scheme.

3.1. Review of Zhang et al.’s Scheme

Zhang et al.’s scheme involves a registration phase and key agreement phase with authentication, which are executed by the smart meter S M i and the service provider S P j .

3.1.1. Registration Phase

  • The smart meter S M i firstly chooses a random value with high entropy r 1 . Then, S M i sends its identification I D i and r 1 to the service provider S P j securely.
  • After receiving the messages from S M i , S P j computes Q i = h ( s     r 1     ( I D j | | I D i ) ) , where I D j means the identification of S P j and s means the master key of S P j . Then, S P j calculates M i = E s ( ( I D i     r 1 ) | | ( h ( I D j | | s )         I D i ) ) where E s ( ) means the secure symmetric encryption with secret key s. Finally, S P j stores Q i into its dynamic verification table and returns M i to S M i via a secure channel.
  • S M i receives M i from S P j , and stores { I D i , r 1 , M i } into its own tamper-resistant device.

3.1.2. Authentication and Key Agreement Phase

  • When the smart meter S M i attempts to start the communication with the service provider S P j , S M i produces a random value with high entropy r 2 temporarily. After that, S M i calculates X i = h ( I D i | | r 1 )     r 2 and sends { X i , M i } to S P j through a public channel.
  • S P j decrypts M i with its master key s where D s ( M i ) = ( I D i     r 1 ) | | ( h ( I D j | | s )     I D i ) . Then, S P j calculates I D i * = h ( I D j | | s )     h ( I D j | | s )     I D i , r 1 * = I D i *         I D i     r 1 and Q i * = h ( r 1 *     s     ( I D j | | I D i * ) ) , and checks whether Q i * is in its dynamic verification table or not. There are two columns, Q i and Q i o , in the table, and the values of both columns are blank at the beginning. When S M i is successfully registered, the generated Q i would be stored in column Q i . If Q i * is found in Q i o , S P j fills in the value of Q i o to Q i . Once the value of Q i * can be found in the table, S P j obtains N 2 * = h ( I D i * | | r 1 * )     X i and computes M i * = E s ( ( I D i *     r 2 * ) | | ( h ( I D j | | s )         I D i * ) ) . Next, S P j chooses a random value with high entropy r 3 and generates a temporary key k = h ( r 1 *         r 2 *     I D i * ) . After this, S P j gets the session key S K = h ( r 1 *         r 2 *         r 3     I D i * ) . To authenticate S M i , S P j calculates M 2 = E k ( M i * | | h ( I D i * | | r 1 * | | r 2 * ) | | ( h ( ( I D i *     r 2 * ) | | r 1 * )     r 3 ) ) with the secret key k and returns { r 2 } to S M i .
  • S M i calculates k * = h ( r 1     r 2     I D i ) and uses k * to decrypt { M 2 } that D k * ( M 2 ) = M i * * | | h ( I D i * * | | r 1 * * | | r 2 * * ) | | ( h ( ( I D i * *     r 2 * * ) | | r 1 * * )     r 3 * ) . Then, S M i checks whether h ( I D i * * | | r 1 * * | | r 2 * * ) = h ( I D i | | r 1 | | r 2 ) or not. If this verification is valid, S M i computes r 3 * = ( h ( ( I D i     r 2 ) | | r 1 )     ( h ( ( I D i * *     r 2 * * ) | | r 1 * * )     r 3 * . Next, S M i computes S K * = h ( r 1     r 2     r 3 *     I D i ) and sends M 3 = h ( S K * | | r 3 * ) to S P j .
  • After receiving M 3 from S M i , S P j checks whether h ( S K | | r 3 ) matches with M 3 . If it holds, S P j displaces ( Q i , Q i o ) with ( Q i n e w , Q i ) where Q i n e w = h ( s     r 2     ( I D j | | I D i * ) ) . Then, S P j calculates M 4 = h ( r 1 * | | ( r 2 *     r 3 ) ) and returns { M 4 } to S M i .
  • S M i checks whether h ( r 1 | | ( r 2     r 3 * ) = M 4 ) . If this verification is valid, S M i replaces ( r 1 , M i ) with ( r 2 , M i * * ) . After that, S M i and S P j apply the session key S K = S K * into the communication.

3.2. Security Flaws of Zhang et al.’s Scheme

Under the assumption of the threat model in Zhang et al.’s scheme [22], an adversary is able to obtain either the service providers’ master key or ID, but not both. Unfortunately, in the smart grid, the attacker is likely to be a insider attack, which is introduced by Kumar et al. [4] in 2019. An insider attacker A can not only intercept messages through the channel, but also register as a legitimate user.
Next, we look into Zhang et al.’s scheme and show how an insider attacker attacks the scheme step by step using the identity of consumers and the master key s.
  • Step 1. The attacker firstly registers to S P j as a legitimate user, and obtains his identity information I D A , r 1 A and M A after successful registration. He/she can decrypt M A with key s to obtain ( h ( I D j | | s )     I D A ) , where I D A = I D A . The phase is shown in Figure 3.
  • Step 2. During the protocol process between a registered smart meter S M i and S P j , the attacker intercepts { X i , M i } sent by S M i to S P j . Then, he/she decrypts the information M i with key s to obtain ( I D i     r 1 ) and ( h ( I D j | | s )     I D i ) , where I D i = I D i generally.
  • Step 3. The attacker computes I D i = ( h ( I D j | | s )     I D i )     ( h ( I D j | | s )     I D A )     I D A , where ( h ( I D j | | s )     I D i ) comes from step 2 and ( h ( I D j | | s )     I D A ) comes from step 1. This phase is shown in Figure 4.
At this time, the attacker has successfully attacked the legitimate S M i . The attacker may then use, but is not limited to, the following means of attacks.
  • The loss of smart meter anonymity: Through Step 3 above, the attacker obtains I D i of legitimate S M i , which directly leads to the loss of the user’s anonymity.
  • Impersonate attack: The attacker can also obtain r 1 stored in S M i by calculating r 1 = ( I D i     r 1 )     I D i and M i from the intercepted message. This means that all information { I D i , r 1 , M i } stored by S M i is obtained by the attacker. The attacker can impersonate S M i and communicate with S P j .
  • Session key compromise attack: If the attacker knows the information { I D i , r 1 , M i } , he/she can compute X i = h ( I D i | | r 1 )     r 2 and fake S M i by sending { X i , M i } to S P j . After receiving the message { M 2 } from S P j , the attacker is able to execute all operations performed by S M i step by step, and gets the correct S K * and returns correct M 3 to S P j .
  • Permanent denial of service attack: Because the scheme uses a dynamic authentication table to verify S M i ’s identity, S M i will lose the ability of communication with S P j permanently when the attacker disguises S M i twice in succession. In abstract, this scheme only retains the current and last session credentials of S M i in the verification table of S P j . Once the attacker successfully disguises S M i more than two times, the session credentials of S M i will expire, and this process is irreversible.

3.3. Reasons for the Weakness

The direct reason for the weakness of Zhang et al.’s scheme [22] is that S P j assigns the same information for all smart meters, which is used to meet the untraceability and the anonymity of smart meters. However, this also results in the consequence that S P j is unable to store the identity credentials used to distinguish different smart meters. To authenticate the smart meter S M i successfully, S P j has to know s and h ( I D j | | s ) for obtaining I D i . Unfortunately, the insider attacker can also take advantage of this to obtain S M i ’s identity information, i.e., an attacker A obtains the certificate h ( I D j | | s ) at the time of his registration through his legal identity, and then uses h ( I D j | | s ) to obtain the authentication information of other SMs, and finally realizes the insider attack.

4. The Improved Scheme

To avoid the above insider attack, different SMs should have different authentication information. Note that the anonymity of the SM cannot be destroyed when distinguishing different SMs. Based on this analysis, this section presents an improved protocol, which involves two phases: a registration phase, and an authentication and key agreement phase. Table 2 lists the notations used in the improved scheme.

4.1. Registration Phase

Before S M i communicates with S P j , S M i firstly applies to S P j for registration, as shown in Figure 5.
  • The smart meter S M i firstly generates a random integer N 1 . Then, S M i sends its identification I D i and N 1 to S P j via a secure channel.
  • After receiving the message from S M i , S P j computes S i = h ( N 1     ( I D j | | I D i )     K ) , where K means the master key of the service providers. Next, S P j calculates X i = E K ( ( I D i     N 1 ) | | N S M | | ( ( h ( I D j | | K | | N S M ) )     I D i ) ) , where N S M is a high entropy random number generated for S M i . Then, S P j stores S i into its dynamic verification table. The dynamic verification table is shown in Figure 6. There are two columns S 1 and S 2 in the table, and the values of both columns are blank at the beginning. When S M i is successfully registered, the generated S i will be stored in a new blank of column S 1 . Each row in the table represents a registered smart meter. Finally, S P j returns X i to S M i securely.
  • S M i receives X i from S P j , and stores { I D i , N 1 , X i } into its own tamper-resistant device.

4.2. Authentication and Key Agreement Phase

When S M i attempts to set up a new session with S P j , it needs to perform the following steps. The details of the whole session are shown in Figure 7.
  • When S M i is willing to build the communication with the S P j , S M i needs to produce a high entropy random number N 2 temporarily. After that, S M i calculates Y i = h ( I D i | | N 1 )     N 2 and sends { X i , Y i } to S P j through a public channel.
  • S P j decrypts M i with its master key K where D K ( X i ) = ( I D i     N 1 ) | | N S M | | ( h ( I D j | | K | | N S M )     I D i ) . Then, S P j can calculate I D i * = h ( I D j | | K | | N S M )     h ( I D j | | K | | N S M )     I D i , N 1 * = I D i *     I D i     N 1 and S i * = h ( N 1 *     K     ( I D j | | I D i * ) ) , and checks whether S i * can be found in its dynamic verification table or not. If S i * is found in S 2 , S P j fills in the value of S 2 to S 1 . Once the value of S i * can be found in the table, S P j can obtain N 2 * = h ( I D i * | | N 1 * )     Y i . Next, S P j chooses high entropy random numbers N 3 and N S M * . It can compute X i * = E K ( ( I D i *     N 2 * ) | | N S M * | | ( h ( I D j | | K | | N S M * )     I D i * ) ) and generate a temporary key t k = h ( N 1 *     N 2 *     I D i * ) . After this, S P j can obtain the session key S K = h ( N 1 *     N 2 *     N 3     I D i * ) . To authenticate S M i , S P j calculates Z i = E t k ( X i * | | h ( I D i * | | N 1 * | | N 2 * ) | | ( h ( ( I D i *     N 2 * ) | | N 1 * )     N 3 ) ) with secret key t k and returns { Z i } to S M i .
  • S M i calculates t k = h ( N 1     N 2     I D i ) and uses t k to decrypt { Z i } that D t k ( Z i ) = X i * * | | h ( I D i * * | | N 1 * * | | N 2 * * ) | | ( h ( ( I D i * *     N 2 * * ) | | N 1 * * )     N 3 * ) . Then, S M i checks whether h ( I D i * * | | N 1 * * | | N 2 * * ) = h ( I D i | | N 1 | | N 2 ) or not. If this verification is valid, S M i can compute N 3 * = ( h ( ( I D i     N 2 ) | | N 1 )     ( h ( ( I D i * *     N 2 * * ) | | N 1 * * )     N 3 * . Next, S M i computes S K * = h ( N 1     N 2     N 3 *     I D i ) and sends P i = h ( S K * | | N 3 * ) to S P j .
  • After receiving message P i from S M i , S P j makes a check on whether h ( S K | | N 3 ) matches with P i . If it holds, S P j displaces ( S 1 , S 2 ) with ( S i n e w , S 1 ) where S i n e w = h ( K     N 2     ( I D j | | I D i * ) ) . Then, S P j calculates Q i = h ( N 1 * | | ( N 2 *     N 3 ) ) and returns { Q i } to S M i .
  • S M i checks whether h ( N 1 | | ( N 2     N 3 * ) = Q i ) . If this verification is valid, S M i replaces ( N 1 , X i ) with ( N 2 , X i * * ) . After that, S M i and S P j apply the session key S K = S K * in the communication.

5. Security Analysis of the Improved Scheme

5.1. Formal Security Analysis

This section presents the rigorous security analysis of the improved scheme in formal. First, the security model of the protocol is proposed.

Security Model

Suppose the attacker can control the messages transmitted on all public channels and obtain all public parameters. An attacker cannot obtain secret information (for example, information in the tamper-resistant device), but can obtain some leaked information (for example, either the SP’s master key or the SP’s identity). There are two kinds of identity, i.e., the smart meters’ identities and the service providers’ identities, where S M i is for a smart meter’s identity and S P j is for a service provider’s identity. The improved protocol’s security is proved in the real-or-random oracle model, and the details are represented by O. E is used to represent S M i or S P j .
  • Execute ( S M i , S P j ): This module is built to simulate a passive attack. An attacker can obtain all messages sent by S M i and S P j through this operation.
  • Send (E, M): This operation aims at simulating an active attack. An attacker can send message M to any S M i or S P j , and S M i or S P j would perform corresponding steps according to the protocol. The corresponding information would also be returned to the attacker.
  • Corrupt (E): This operation is applied to simulate the forward security. The attacker can obtain the leaked long-term secret information, such as S P j ’s master key or S P j ’s identity (but not both).
  • Test (E): This operation is used to return the session key or a randomly generated key. This response depends on a random bit b. If b is equal to 1, the query returns the session key; if b equals 0, the query returns a random key.
Semantic security: An attacker A can perform several test (E) operations. Each time, a key is obtained based on the result of b. This process indicates that the attacker distinguishes between the session key and the random key. P r [ S u c c e s s ] is the probability of the attacker to be the game winner, which is expressed as follows:
A d v A a k e = | 2 P r [ S u c c ] 1 |
Now we will prove that in the improved protocol, the attacker’s advantage is non-negligible. We first show the difference lemma [38].
Lemma 1 
(Difference Lemma). Let X, Y and Z represent the events defined in some probability distribution. If X ¬ Z Y ¬ Z , | P r [ X ] P r [ Y ] | P r [ Z ] .
Theorem 1. 
Let A d v A s e represent the advantage of A in breaking the symmetric cipher algorithm, and l represent a security parameter. Let q s e n d and q c represent the upper limit of hash queries when simulating an active attack and guessing key t k , respectively. The advantage of A breaking the semantic security is
A d v A a k e 2 A d v A s e + ( q c 2 + 3 q s e n d 2 ) / 2 l
Proof. 
We define the sequence of games G M 0 to G M 3 . Let S u c c i be the event that A guesses bit b for G M i in the test session successfully. The games G M 0 to G M 3 are presented as follows.
Game G M 0 : This game is related to the real attack under the random oracle model. Therefore
A d v A a k e = 2 | P r [ S u c c 0 ] 1 / 2 |
Game G M 1 : We query E x e c u t e oracles several times to simulate A ’s eavesdropping attack. Because all messages are encrypted symmetrically or hashed, these operations cannot make A obtain more useful information. Thus A cannot extend the advantage of winning game G M 1 . Therefore
P r [ S u c c 0 ] = P r [ S u c c 1 ]
Game G M 2 : We query S e n d and H a s h oracles to simulate A ’s active attack. It is impossible for A to find the collisions of Y i / P i / Q i in the way of making queries, or decrypting the information of X i / Z i without key K / t k . Hence there is no collision when querying S e n d oracles. Due to the birthday paradox, we obtain
| P r [ S u c c 2 ] P r [ S u c c 1 ] | A d v A s e + 3 q s e n d 2 / 2 l + 1
Game G M 3 : This game aims at simulating forward security using the C o r r u p t oracle query. Even if A is lucky enough to find the correct hash collision value, he still needs to find a way to obtain the long-term stored key K and the temporarily generated t k . Thus, A has to query the C o r r u p t and Hash Oracle, and we have
| P r [ S u c c 3 ] P r [ S u c c 2 ] | q c 2 / 2 l + 1
A cannot receive any useful messages since all the oracles have been simulated. At this point, A has half the chance to guess the correct value of b, so the probability to win G M 3 is:
P r [ S u c c 3 ] = 1 2
As a result, the final output performs as follows:
A d v A a k e 2 A d v A s e + ( q c 2 + 3 q s e n d 2 ) / 2 l
The semantic security of the improved protocol is proved completely. □

5.2. Informal Security Analysis

This subsection contains an informal security analysis to show that the improved protocol can resist various attacks from both outsider and insider attackers.

5.2.1. Insider Attack

As mentioned in Section 2, an attacker A may have a legitimate identity. Even if A obtains the master key K of the service provider, A cannot pretend to be another consumer in the improved protocol, since N S M is stored in X i = E K ( ( I D i     N 1 ) | | N S M | | ( ( h ( I D j | | K | | N S M ) )     I D i ) ) during the registration phase, and ( h ( I D j | | K | | N S M ) generated by each consumer is different. Although N S M can be obtained when decrypting X i with key K, ( h ( I D j | | K | | N S M ) cannot be calculated without I D j or K at the same time. In addition, S P j still does not store S M i ’s ID so it still meets S M i ’s non-traceability.

5.2.2. De-Synchronization Attack

Our scheme can resist de-synchronization attacks with a dynamic verification table. If A intercepts message X i , Y i , Z i or P i , S M i ’s unique identification in the table is not updated, and S M i can perform the authentication phase again. Suppose that A intercepts message Q i sent by S P j and S 1 of the dynamic verification table has been updated, while the last unique identification is also stored in S 2 . Once S M i has not received the confirmation message within the limited time, it can still use the last unique identification to authenticate, which can be found in S 2 .

5.2.3. Replay Attack

If A wants to replay messages { X i , Y i } sent by S M i , it can pass the first step of S P j ’s verification. However, after receiving message Z i returned by S P j , A cannot generate t k = h ( N 1 *     N 2 *     I D i * ) . The attacker will not succeed in replaying message P i , because N 3 generated by S P j is different each time. If A wants to replay the messages Z i and Q i sent by S P j , S M i will find that h ( I D i | | N 1 | | N 2 ) and h ( N 1 | | ( N 2     N 3 * ) ) are not the same, since N 2 is randomly generated by S M i for each session.

5.2.4. Man-in-the-Middle Attack

The messages sent by S M i and S P j are processed by hash function or symmetrically encrypted. Even if A obtains the master key K, he can only decrypt the first message X i sent by S M i and cannot obtain other useful information. Because of the anonymity of S M i , A cannot obtain I D i of S M i . The random number N 1 is also not be obtained because the tamper-resistant device prevents its leakage. Therefore, even if the attacker modifies the message, A cannot mount a Man-in-the-middle attack.

5.2.5. Impersonation Attack

In the impersonation attack, we consider an adversary A , who can monitor the public network and capture the message { X i , Y i , Z i , P i , Q i } transferred on an insecure channel. We consider two cases.
  • SM impersonation attack. If adversary A wants to impersonate the SM, he must forge the message { X i , Y i , P i } to have the SP believe that the message is legal. However, A must know secret parameters such as I D i , N 1 , N 3 in order to produce the messages as legal. Due to the lack of knowledge of these parameters, the adversary cannot implement the SM impersonation attack.
  • SP impersonation attack. If the adversary A wants to impersonate SP, it needs to forge the message { Z i , Q i } . The generation of the message requires SP’s long-term secret as auxiliary material which the adversary cannot learn. Therefore, the improved scheme can resist the impersonation attack.

5.2.6. Anonymity and Untraceability

The purpose of anonymity is to prevent the adversary, who can intercept messages in an insecure channel, from obtaining the actual ID of the smart grid. At a higher level, the adversary cannot find any relationship among sessions of one entity. In the improved scheme, all the transmitted messages are { X i , Y i , Z i , P i , Q i } . The ID of SM is sent over the insecure channel with the use of a hash function. Therefore, the adversary cannot derive the actual ID from the transmitted messages. Furthermore, each communicated message is dynamically changed by involving random numbers. The adversary also fails to trace the participants.

5.2.7. Perfect Forward Secrecy

This property means even if the long-term secret parameters of both entities are leaked, it will not lead to the previous session key being compromised. In our protocol, if the long-term secret parameters of SM and SP are compromised, the adversary needs to know the ephemeral secret to compute. Due to the lack of the knowledge of the ephemeral secret, the session key remain secure.

6. Performance Analysis

How to improve security without affecting the efficiency is one of the goals of improving the protocol. This section presents a comparison between the improved protocol and four other protocols proposed recently for smart grids [19,20,21,22,27], in terms of functionality, computation efficiency and the communication efficiency.

6.1. Security and Functionality Analysis

Table 3 shows the comparison of security and functionality, where F 1 denotes mutual authentication, F 2 denotes session-key security, F 3 denotes message integrity, F 4 denotes smart meters’ anonymity, F 5 denotes perfect forward secrecy, F 6 denotes smart meters’ untraceability, R 1 denotes the ability to resist replay attack, R 2 denotes resistance to man-in-the-middle attack, R 3 denotes resistance to impersonation attack, R 4 denotes resistance to de-synchronization attack, R 5 denotes resistance to insider attack and R 6 denotes resistance to stolen verifier attack.
From Table 3, it can be seen that the improved scheme can meet the basic functionality and security requirements. In terms of functionality, our scheme can guarantee mutual authentication, session-key security, message integrity, perfect forward secrecy, smart meters’ anonymity and untraceability. In terms of security, our scheme can resist replay attacks, man-in-the-middle attacks, impersonation attack, de-synchronization attacks, insider attacks and stolen verifier attacks. In addition, some protocols do not consider insider attackers [19,21,22]. Some schemes [19,20,22] do not provide smart meters’ anonymity, while some [19,20,21,27] cannot resist de-synchronization attacks. To summarize, our improved protocol has advantages in security and functionality.

6.2. Computation Overhead Analysis

Only the authentication and agreement phase is compared when analyzing the computation cost, since this phase is the main part of the scheme. The executions of the concatenating operation and OR operation are not considered, because the time of these executions is negligible. Let T h denote the computation time for the one-way hash function, T e denote the computation time for symmetric encryption operation, T d denote the computation time for a symmetric decryption operation, T H M A C denote the computation time for the hash-based message authentication code (HMAC) operation, T a denote the computation time for point addition of elliptic curve and T m denote the computation time for the point multiplication of the elliptic curve. According to the literature of Abbasinezhad-Mood et al. [39], we have that T h takes 0.0023 ms, T e takes 0.0046 ms, T d takes 0.0046 ms, T H M A C takes 0.0046 ms, T a takes 0.0288 ms and T m takes 2.226 ms. Let C 1 denote the computation cost in the smart meter, C 2 denote the computation overhead in the service provider phase and C 3 denote the total costs. Table 4 shows the computational cost including the improved protocol and other ones.
It can be seen from Table 4 that the computation cost of the improved protocol at the smart meter is C 1 = 7 T h + 1 T d , i.e., the smart meter needs to execute seven one-way hash function operations and an encryption operation. In addition, the service provider’s computation overhead is C 2 = 9 T h + 2 T e + 1 T d . The total cost is C 3 = 16 T h + 2 T d + 2 T e , which is less computation resources than the protocols using the elliptic curve [19,20,21,27]. The new protocol has the same computation efficiency as the original protocol [22]. Both of them are 0.0552 ms. Since these two protocols have a great improvement in computation cost compared with the known protocols [19,20,21,27], our proposed protocol is still lightweight in terms of computational overhead level.

6.3. Communication Overhead Analysis

This subsection discusses the communication cost of the improved protocol. Suppose the hash function used in the improved protocol is SHA1 and the symmetric encryption algorithm is AES-128. The output of the hash function is 20 bytes (160 bits), the output of a 128 bit AES is based on the input of the plaintext, and the random number is 128 bits long. Similarly, a point of the elliptic curve is assumed to be 40 bytes (320 bits).
Let C 4 denote the communication cost in the authentication and key agreement phase. Table 5 shows the communication cost including the improved protocol and others.
Table 5 shows that the communication cost of these protocols are relatively close, ranging from 200 bytes to 300 bytes. The new protocol has a communication cost of 236 bytes, which is a little higher than the original protocol [22]. However, it is still less than the communication cost of protocols [19,20,21,27]. In other words, this communication cost is acceptable in smart grids.
To sum up, the improved protocol obtains the strongest security against both the outsider attacker and the insider attacker, and is the only one obtaining all security properties. In terms of the computation efficiency and the communication efficiency, the improved protocol has low computational cost and communication cost compared with the lightweight schemes, thus is very suitable for the smart grid with limited computing resources.

7. Conclusions

In this paper, we analyzed the security of Zhang et al.’s protocol [22] and showed that their protocol is not secure enough to prevent an impersonation attack against an insider attacker, since different SMs hold the same confidential information. To address the flaws, we proposed an improved protocol which allows SMs and SPs to authenticate each other and establish a session key securely. Moreover, we verified the security of the improved protocol using the ROR model. By conducting an informal security analysis, we demonstrated that the new protocol is secure against various attacks from both outsider and insider attackers. In terms of the computation cost and communication cost, the improved protocol has almost the same efficiency as Zhang et al.’s protocol, while providing enhanced security. Furthermore, the proposed protocol has a significantly lower computational cost compared to the other protocols, which is well suited to smart grid environments where smart meters are resources-constrained. The limitation of our protocol is that it is not suitable in general communication models, except wireless ones. In addition, our protocol has no significant advantage over existing schemes in terms of communication cost. We will consider these two limitations in our future work.

Author Contributions

Conceptualization, H.G. and J.L.; Data curation, C.C. and Y.W., Formal analysis, C.C., Y.W. and H.G.; Funding acquisition, H.G. and J.L.; Investigation, Y.W. and C.C.; Methodology, C.C. and Y.W.; Project administration, J.L.; Resources, H.G.; Software, M.D.; Supervision, H.G.; Writing—original draft, C.C.; Writing—review editing, C.C., Y.W. and B.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key R&D Program of China (2021YFB2700200), Beijing Natural Science Foundation (4202037) and the National Natural Science Foundation of China (U21B2021, 61972018, 61932014).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

We would like to express our gratitude to all those who helped us during the writing of this manuscript, especially support from School of Cyber Science and Technology, Beihang University.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ehsani, M.; Gao, Y.; Longo, S.; Ebrahimi, K. Modern Electric, Hybrid Electric, and Fuel Cell Vehicles; CRC Press: Boca Raton, FL, USA, 2018. [Google Scholar]
  2. Rehmani, M.H.; Reisslein, M.; Rachedi, A.; Erol-Kantarci, M.; Radenkovic, M. Integrating renewable energy resources into the smart grid: Recent developments in information and communication technologies. IEEE Trans. Ind. Inform. 2018, 14, 2814–2825. [Google Scholar] [CrossRef]
  3. Hamedani, K.; Liu, L.; Atat, R.; Wu, J.; Yi, Y. Reservoir computing meets smart grids: Attack detection using delayed feedback networks. IEEE Trans. Ind. Inform. 2018, 14, 734–743. [Google Scholar] [CrossRef]
  4. Kumar, P.; Lin, Y.; Bai, G.; Paverd, A.; Dong, J.S.; Martin, A. Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues. IEEE Commun. Surv. Tutor. 2019, 21, 2886–2927. [Google Scholar] [CrossRef] [Green Version]
  5. NIST. Framework and Roadmap for Smart Grid Interoperability Standards, Release 4.0; Smart Grid Interoperability Panel (SGIP): Washington, DC, USA, 2021. [Google Scholar]
  6. Wu, J.; Guo, S.; Huang, H.; Liu, W.; Xiang, Y. Information and communications technologies for sustainable development goals: Stateof-the-art, needs and perspectives. IEEE Commun. Surv. Tutor. 2018, 20, 2389–2406. [Google Scholar] [CrossRef] [Green Version]
  7. McDaniel, P.; McLaughlin, S. Security and privacy challenges in the smart grid. IEEE Secur. Priv. 2009, 7, 75–77. [Google Scholar] [CrossRef]
  8. Yan, Y.; Qian, Y.; Sharif, H.; Tipper, D. A survey on smart grid communication infrastructures: Motivations, requirements and challenges. IEEE Commun. Surv. Tutor. 2013, 15, 5–20. [Google Scholar] [CrossRef] [Green Version]
  9. Analysis of the Cyber Attack on the Ukrainian Power Grid. Available online: https://africautc.org/wp-content/uploads/2018/05/E-ISAC_SANS_Ukraine_DUC_5.pdf (accessed on 12 April 2023).
  10. Wu, D.; Zhou, C. Fault-Tolerant and Scalable Key Management for Smart Grid. IEEE Trans. Smart Grid 2011, 2, 375–381. [Google Scholar] [CrossRef]
  11. Xia, J.; Wang, Y. Secure key distribution for the smart grid. IEEE Trans. Smart Grid 2012, 3, 1437–1443. [Google Scholar] [CrossRef]
  12. Park, J.H.; Kim, M.; Kwon, D. Security Weakness in the Smart Grid Key Distribution Scheme Proposed by Xia and Wang. IEEE Trans. Smart Grid 2013, 4, 1613–1614. [Google Scholar] [CrossRef]
  13. Wang, Y. Password protected smart card and memory stick authentication against off-line dictionary attacks. In Information Security and Privacy Research; Springer: Heidelberg, Germany, 2012; pp. 489–500. [Google Scholar]
  14. Tsai, J.-L.; Lo, N.-W. Secure anonymous key distribution scheme for smart grid. IEEE Trans. Smart Grid 2016, 7, 906–914. [Google Scholar] [CrossRef]
  15. Odelu, V.; Das, A.K.; Wazid, M.; Conti, M. Provably Secure Authenticated Key Agreement Scheme for Smart Grid. IEEE Trans. Smart Grid 2016, 9, 1900–1910. [Google Scholar] [CrossRef]
  16. Odelu, V.; Das, A.K.; Goswami, A. A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1953–1966. [Google Scholar] [CrossRef]
  17. Canetti, R.; Krawczyk, H. Analysis of key-exchange protocols andtheir use for building secure channels. In Advances in Cryptology Eurocrypt 2001; Springer: Heidelberg, Germany, 2001; pp. 453–474. [Google Scholar]
  18. Nicanfar, H.; Jokar, P.; Beznosov, K.; Leung, V. Efficient authentication and key management mechanisms for smart grid communications. Syst. J. IEEE 2014, 8, 629–640. [Google Scholar] [CrossRef]
  19. Mohammadali, A.; Haghighi, M.S.; Tadayon, M.H.; Mohammadi-Nodooshan, A. A novel identity-based key establishment method for advanced metering infrastructure in smart grid. IEEE Trans. Smart Grid 2016, 9, 2834–2842. [Google Scholar] [CrossRef]
  20. Mahmood, K.; Chaudhry, S.A.; Naqvi, H.; Kumari, S.; Li, X.; Sangaiah, A.K. An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Gener. Comput. Syst. 2018, 81, 557–565. [Google Scholar] [CrossRef]
  21. Kumar, P.; Gurtov, A.; Sain, M.; Martin, A.; Ha, P. Lightweight authentication and key agreement for smart metering in smart energy networks. IEEE Trans. Smart Grid 2018, 10, 4349–4359. [Google Scholar] [CrossRef] [Green Version]
  22. Zhang, L.; Zhao, L.; Yin, S.; Chi, C.H.; Liu, R.; Zhang, Y. A lightweight authentication scheme with privacy protection for smart grid communications. Future Gener. Comput. Syst. 2019, 100, 770–778. [Google Scholar] [CrossRef]
  23. Ferrag, M.A.; Babaghayou, M.; Yazici, M.A. Cyber security for fog-based smart grid SCADA systems: Solutions and challenges. J. Inf. Secur. Appl. 2020, 52, 102500. [Google Scholar] [CrossRef]
  24. Sadhukhan, D.; Ray, S.; Obaidat, M.S.; Dasgupta, M. A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography. J. Syst. Archit. 2021, 114, 101938. [Google Scholar] [CrossRef]
  25. Abbasinezhad-Mood, D.; Nikooghadam, M. An anonymous ECC-based self-certified key distribution scheme for the smart grid. IEEE Trans. Ind. Electron. 2018, 65, 7996–8004. [Google Scholar] [CrossRef]
  26. Khan, A.A.; Kumar, V.; Ahmad, M.; Rana, S.; Mishra, D. PALK: Password-based anonymous lightweight key agreement framework for smart grid. Int. J. Electr. Power Energy Syst. 2020, 121, 106121. [Google Scholar] [CrossRef]
  27. Taqi, S.A.M.; Jalili, S. LSPA-SGs: A lightweight and secure protocol for authentication and key agreement based Elliptic Curve Cryptography in smart grids. Energy Rep. 2022, 8, 153–164. [Google Scholar] [CrossRef]
  28. Deebak, B.D.; Memon, F.H.; Cheng, X.; Dev, K.; Hu, J.; Khowaja, S.A.; Qureshi, N.M.F.; Choi, K.H. Seamless privacy-preservation and authentication framework for IoT-enabled smart eHealth systems. Sustain. Cities Soc. 2022, 80, 103661. [Google Scholar] [CrossRef]
  29. Tanveer, M.; Ahmad, M.; Khalifa, H.S.; Alkhayyat, A.; Abd El-Latif, A.A. A new anonymous authentication framework for secure smart grids applications. J. Inf. Secur. Appl. 2022, 71, 103336. [Google Scholar] [CrossRef]
  30. Khan, A.A.; Kumar, V.; Ahmad, M. An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach. J. King Saud Univ.-Comput. Inf. Sci. 2022, 3, 698–705. [Google Scholar] [CrossRef]
  31. Chaudhry, S.A.; Nebhan, J.; Yahya, K.; Al-Turjman, F. A privacy enhanced authentication scheme for securing smart grid infrastructure. IEEE Trans. Ind. Inform. 2021, 18, 5000–5006. [Google Scholar] [CrossRef]
  32. Chen, M.; Miao, Y.; Hao, Y.; Hwang, K. Narrow band internet of things. IEEE Access 2017, 5, 20557. [Google Scholar] [CrossRef]
  33. Chen, M.; Li, W.; Hao, Y.; Qian, Y.; Humar, I. Edge cognitive computing based smart healthcare system. Future Gener. Comput. Syst. 2018, 86, 403–411. [Google Scholar] [CrossRef]
  34. Wang, Y.; Chen, Q.; Hong, T.; Kang, C. Review of smart meter data analytics: Applications, methodologies, and challenges. IEEE Trans. Smart Grid 2018, 10, 3125–3148. [Google Scholar] [CrossRef] [Green Version]
  35. Su, W.; Eichi, H.; Zeng, W.; Chow, M.-Y. A survey on the electrification of transportation in a smart grid environment. IEEE Trans. Ind. Informat. 2012, 8, 1–10. [Google Scholar] [CrossRef]
  36. Fang, X.; Misra, S.; Xue, G.; Yang, D. Smart grid-The new and improved power grid: A survey. IEEE Commun. Surv. Tuts. 2012, 14, 944–980. [Google Scholar] [CrossRef]
  37. Boroyevich, D.; Cvetkovic, I.; Burgos, R.; Dong, D. Intergrid: A future electronic energy network? IEEE J. Emerg. Sel. Top. Power Electron. 2013, 1, 127–138. [Google Scholar] [CrossRef]
  38. Shoup, V. Sequences of Games: A Tool for Taming Complexity in Security Proofs. IACR Cryptology ePrint Archive. 2004. Available online: https://eprint.iacr.org/2004/332 (accessed on 12 April 2023).
  39. Abbasinezhad-Mood, D.; Nikooghadam, M.; Mazinani, S.M.; Babamohammadi, A.; Ostad-Sharif, A. More efficient key establishment protocol for smart grid communications: Design and experimental evaluation on ARM-based hardware. Ad Hoc Netw. 2019, 89, 119–131. [Google Scholar] [CrossRef]
Figure 1. NIST smart grid conceptual network model.
Figure 1. NIST smart grid conceptual network model.
Sensors 23 03991 g001
Figure 2. Communication model in smart grid.
Figure 2. Communication model in smart grid.
Sensors 23 03991 g002
Figure 3. Attacker registration as a normal user.
Figure 3. Attacker registration as a normal user.
Sensors 23 03991 g003
Figure 4. Attacker intercepts on S M i ’s information.
Figure 4. Attacker intercepts on S M i ’s information.
Sensors 23 03991 g004
Figure 5. Registration phase.
Figure 5. Registration phase.
Sensors 23 03991 g005
Figure 6. The dynamic verification table.
Figure 6. The dynamic verification table.
Sensors 23 03991 g006
Figure 7. Authentication and key agreement phase.
Figure 7. Authentication and key agreement phase.
Sensors 23 03991 g007
Table 1. Overview of authentication protocols.
Table 1. Overview of authentication protocols.
SchemeLimitationsPrimitive UsedYear
 [19]Cannot resist replay attack, SK compromised attack, SM impersonation attack, and MINM attacks, cannot ensure anonymity, does not consider internal attackersECC, XOR, and Hash2018
 [20]Cannot ensure the anonymity of SM, does not consider internal attackersECC, XOR, and Hash2018
 [21]Cannot ensure the anonymity of SM, does not consider internal attackersECC, XOR, and Hash2018
 [22]Cannot resist insider attacks, impersonation attack, SK compromise attack, loss the anonymity of SMAES, XOR, and Hash2019
 [27]Does not consider internal attackersECC, XOR, and Hash2022
our schemeCan resist known attacks, considers internal attackersAES, XOR, and Hash
Table 2. Symbols and notations in our scheme.
Table 2. Symbols and notations in our scheme.
Symbols and NotationsDescription
S M i , I D i the ith smart meter and S M i ’s identity
S P j , I D j the jth service provider and S P j ’s identity
Kservice providers’ master secret key
t k a temporary key between S M i and S P j
| | concatenating operation
exclusive OR
h ( ) ˙ a one-way hash function
E K Symmetric encryption using key K
D K Symmetric decryption using key K
N 1 , N 2 , N 3 , N S M High entropy random numbers
S i S M i ’s unique identification stored in the table
Table 3. Security and functionality comparison table.
Table 3. Security and functionality comparison table.
F1F2F3F4F5F6R1R2R3R4R5R6
 [19]YESYESYESNONOYESYESYESYES//YES
 [20]YESYESYESNONOYESYESYESYES/YESYES
 [21]YESYESYESYES/YESYESYESNO//YES
 [22]YESYESYESNOYESYESYESYESYESYESNOYES
 [27]YESYESYESYESYESYESYESYESYESNOYESYES
our schemeYESYESYESYESYESYESYESYESYESYESYESYES
Table 4. Computation cost comparison table.
Table 4. Computation cost comparison table.
[19][20][21][22][27]Our Scheme
C 1 3 T h + 2 T m  = 3 T h  + 2 T m  = 3 T h  + 2 T m  +  T e  +  T d  +7 T h  + 1 T d  = 4 T h  +  T e  +  T d  + 3 T m 7 T h  + 1 T d  =
4.4589 ms4.4589 ms 2 T H M A C  = 4.4773 ms0.0207 ms= 6.7796 ms0.0207 ms
C 2 4 T h  + 3 T m  = 2 T h  + 3 T m  +  T a 4 T h  + 3 T m  +  T e  +  T d  + 9 T h  + 2 T e  +  T d 3 T h  +  T e  +  T d  + 3 T m 9 T h  + 2 T e  +  T d
6.6872 ms = 6.7114 ms2 T H M A C  = 6.7056 ms = 0.0345 ms = 6.7772 ms = 0.0345 ms
C 3 11.1461 ms11.1703 ms11.1829 ms0.0552 ms13.5568 ms0.0552 ms
Table 5. Communication cost comparison table.
Table 5. Communication cost comparison table.
[19][20][21][22][27]Our Scheme
C 4 248 bytes298 bytes254 bytes204 bytes248 bytes236 bytes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chen, C.; Guo, H.; Wu, Y.; Shen, B.; Ding, M.; Liu, J. A Lightweight Authentication and Key Agreement Protocol for IoT-Enabled Smart Grid System. Sensors 2023, 23, 3991. https://0-doi-org.brum.beds.ac.uk/10.3390/s23083991

AMA Style

Chen C, Guo H, Wu Y, Shen B, Ding M, Liu J. A Lightweight Authentication and Key Agreement Protocol for IoT-Enabled Smart Grid System. Sensors. 2023; 23(8):3991. https://0-doi-org.brum.beds.ac.uk/10.3390/s23083991

Chicago/Turabian Style

Chen, Chen, Hua Guo, Yapeng Wu, Bowen Shen, Mingyang Ding, and Jianwei Liu. 2023. "A Lightweight Authentication and Key Agreement Protocol for IoT-Enabled Smart Grid System" Sensors 23, no. 8: 3991. https://0-doi-org.brum.beds.ac.uk/10.3390/s23083991

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop