Next Article in Journal
A Comprehensive Review of Integrated Energy Systems Considering Power-to-Gas Technology
Previous Article in Journal
Solar Irradiance Stability Factors
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Lightweight Anonymous Authentication and Key Agreement Protocol for a Smart Grid

School of Mathematics and Computer Science, Yunnan Minzu University, Kunming 650504, China
*
Author to whom correspondence should be addressed.
Submission received: 20 July 2024 / Revised: 3 September 2024 / Accepted: 9 September 2024 / Published: 11 September 2024
(This article belongs to the Special Issue Resilience and Security of Modern Power Systems)

Abstract

:
The smart grid (SG) is an efficient and reliable framework capable of controlling computers, automation, new technologies, and devices. Advanced metering infrastructure (AMI) is a crucial part of the SG, facilitating two-way communication between users and service providers (SPs). Computation, storage, and communication are extremely limited as the AMI’s device is typically deployed outdoors and connected to an open network. Therefore, an authentication and key agreement protocol is necessary to ensure the security and confidentiality of communications. Existing research still does not meet the anonymity, perfect forward secrecy, and resource-limited requirements of the SG environment. To address this issue, we advance a lightweight authentication and key agreement scheme based on elliptic curve cryptography (ECC). The security of the proposed protocol is rigorously proven under the random oracle model (ROM), and was verified by a ProVerif tool. Additionally, performance comparisons validate that the proposed protocol provides enhanced security features at the lowest computation and communication costs.

1. Introduction

With the advancement in information, communication, and electronic technologies, traditional power grids are gradually being replaced by smart grids (SGs) [1]. The SG is a kind of power grid system that uses modern information technology, communication technology, and automation technology to upgrade the power system intelligently [2]. It not only realizes the efficient transmission and distribution of power, but also has real-time monitoring, two-way communication, and automatic adjustment functions, making the power grid more reliable, stable, and flexible [3]. By integrating advanced sensors, smart metering devices, and automated control systems, smart grids are able to obtain various data on grid operation in a timely manner, and optimize the distribution and use of power resources by analyzing these data. At the same time, the smart grid can also effectively support the access of renewable energy sources (e.g., wind and solar energy), improve the efficiency of energy utilization, and reduce the impact on the environment [4]. The SG enables users to optimize their energy usage through the communication network. In case of emergencies or price increases, load demand can be controlled to enable users to minimize or maximize the use of electricity [5].
The advanced metering infrastructure (AMI) is an integral part of the SG, and the structure is shown in Figure 1. The AMI serves as the foundational information system for the SG, functioning as an open bi-directional communication system for measures, collections, storage, and analysis of energy utilization data. This system primarily consists of smart meters (SMs), gateways, and service providers (SPs). Generally, SMs are embedded programmable bidirectional units capable of measuring electricity usage and providing time-based pricing and usage data for consumers and utility providers. Additionally, they are capable of executing control commands from SPs [6]. Typically, SMs are installed outside homes where they can be accessed. Their data of communication contain the personal information of consumers and power consumption or statistical data, enabling adversaries to analyze and predict consumers’ daily lives [7]. Furthermore, data transmitted between the SM and SP over open channels may be susceptible to eavesdropping, interception, modification, and malicious exploitation. Authentication and key agreement (AKA) protocol protects against a wide range of threats and ensures secure communication between users and the SG infrastructure.
In AKA protocol, entities can achieve secure communication over a public channel by authenticating each other and negotiating a common session key. The main task of AKA protocol is to ensure the security and efficiency of communication. Most importantly, it aims to achieve a broader range of security objectives. Communication messages in SGs contain sensitive and private information, and the transmission process of the information must ensure its confidentiality and integrity [8]. Moreover, the SG includes numerous resource-constrained devices, so the computation and communication costs directly determine the efficiency of the protocol. Devices with low efficiency cannot be deployed in realistic environments [9].
The AKA process is vulnerable to many potential cyber threats and attacks, such as man-in-the-middle attacks, replay attacks, identity theft attacks, and denial of service attacks [10]. To address these challenges, researchers have made significant efforts: multi-factor authentication [11] effectively reduces unauthorized access and potential security threats. Physical unclonable function (PUF) technology [12] provides a unique and secure method of key generation and device authentication. Quantum cryptography [13] has also demonstrated significant advantages in eavesdropping detection and key distribution. Despite the significant efforts made by researchers, various shortcomings still exist [14]. Therefore, designing schemes for a SG with a higher performance and more secure and efficient data transmission is extremely challenging and attractive [15].

2. Related Work

In recent years, researchers have proposed numerous AKA protocols for the SG. In 2020, Khan et al. [16] proposed a password-based anonymous lightweight key agreement framework, claiming to offer strong anonymity, untraceability, data confidentiality, perfect forward secrecy, and mutual authentication. Later, Safhani et al. [17] identified security vulnerabilities in [16], noting that attackers could extract users’ permanent identifiers and passwords, enabling them to carry out further attacks. Taqi et al. [18] also demonstrated that the protocol by Khan et al. [16] had two security vulnerabilities: no user anonymity and nonresistance to password guessing attacks. In the same year, Sureshkumar et al. [19] proposed another key establishment protocol, claiming that it enables all smart meters to authenticate with service providers and agree on a single session key. Later, Cheng et al. [20] pointed out that [19] lacked weak forward security and could not resist temporary private key leakage attacks. In 2021, Srinivas et al. [21] proposed a new identity authentication key exchange scheme based on anonymous signatures, aiming to improve security and functional features with a reduced communication and computation cost. Subsequently, Baruah et al. [22] demonstrated that the scheme proposed in [21] was susceptible to man-in-the-middle and impersonation attacks. Khan et al. [23] proposed a lightweight authentication and key negotiation protocol for smart grids, which they claimed to be effective at resisting replay attacks, impersonation attacks, man-in-the-middle attacks, and DoS attacks as well as more security functions. Later, Mehta et al. [24] pointed out that the protocol proposed by Khan et al. [23] does not satisfy user anonymity and session key security. In 2022, Yu et al. [25] designed an AKA scheme for SGs using fuzzy extractors, claiming it can withstand various security attacks and provide robust security features. However, Li et al. [26] proved that [25] was unable to resist ephemeral secret leakage attacks and could not provide untraceability. Khan et al. [27] introduced an identity authentication technique based on elliptic curve cryptography (ECC), aimed at secure SG communication using biometrics. However, it required heavy computation costs. In 2023, Wang et al. [28] proposed an authentication key agreement protocol based on ECC and bilinear pairing. However, with the inclusion of bilinear pairing, this scheme has heavy computation costs.
In summary, the existing AKA protocols for SGs have various shortcomings. For instance, some do not provide user anonymity [16,24]; others lack perfect forward secrecy [19]. Additionally, most are vulnerable to specific attacks, such as man-in-the-middle attacks, impersonation attacks, session key security attacks, ephemeral secret leakage attacks, key compromise impersonation attacks, and information leakage attacks [16,19,21,23,25]. Furthermore, performance analysis indicates that most schemes require heavy computation and communication costs [27,28], making them unsuitable for resource-constrained SG environments. The related work is summarized in Table 1.
To achieve user anonymity and untraceability, this paper obtains them by encrypting identities with hash values that include timestamps. Resist replay attacks by utilizing current system timestamp verification of communication messages. The dynamic changes in timestamps and the difficulty of computing random numbers are utilized to resist attacks such as man-in-the-middle attacks and temporary key leakage attacks.
Contribution: The main contributions of this paper are as follows:
1.
This paper proposes a lightweight identity authentication and key agreement scheme based on ECC. This scheme fully leverages the advantages of key exchange mechanisms, as well as the message authentication capabilities of ECC and one-way hash functions. Entity identities are transmitted anonymously between sessions and dynamically encrypted using random numbers that cannot be traced from session to session.
2.
To accommodate the growing number of devices and users, the scheme negotiates a new session key before each session for the next secret communication. It eliminates the need to interrupt service or store keys, and can ensure that the AKA scheme can adapt to an expanding SG scale by responding to changes in the network in real time.
3.
The security of the proposed protocol was rigorously proven under the random oracle model (ROM) and was verified by a ProVerif 2.05 tool. It achieves user anonymity, mutual authentication, perfect forward security, resistance to impersonation attacks, man-in-the-middle attacks, and resistance to ephemeral secret leakage attacks.
4.
The proposed scheme demonstrates significant reductions in computation and communication overheads compared to related schemes, while also providing improved security and functionality features. A comparison shows that the proposed scheme exhibits higher efficacy and robustness.
Organization: The rest of this paper is organized as follows: Section 3 provides an overview of preliminaries. Section 4 proposes an ECC-based AKA protocol. Section 5 presents the security analysis. Section 6 discusses the performance analysis. Finally, Section 7 concludes the paper.

3. Preliminaries

3.1. Communication Model

The National Institute of Standards and Technology (NIST) [29] has proposed a SG framework model that primarily consists of two components: smart meters and smart providers. The model can be simplified as shown in Figure 2. The model includes three participants: the smart meter ( S i ), service provider ( S P j ), and trust anchor (TA). The TA is a sole trusted entity. The TA is required to complete S i and S P j registration, compute secret data for both parties to use in the subsequent authentication process, and does not participate in the S i and S P j authentication process. S i is deployed on the user side, collecting electricity usage information and transmitting accumulated data to S P j . S P j serves as the control center for electricity data, gathering data generated by smart terminals and deciding the next steps in response to this information. After the TA sets up the system parameters, S i and S P j complete the registration with the help of the TA and get their own private keys and parties’ public keys. Then, after mutual identity verification, S i and S P j negotiate a session key for secure communication in subsequent sessions over a public channel.

3.2. Elliptic Curve Cryptography

Devices in SGs typically have limited computational and storage capabilities, and thus require a cryptographic scheme that provides high security while operating efficiently in resource-constrained environments. ECC is particularly suitable for use in SG environments due to its superior security and efficiency compared to traditional encryption algorithms.
  • Efficient key generation and management
Compared to traditional public-key cryptographic algorithms like RSA, ECC can achieve the same level of security with much smaller key sizes [30]. This means that ECC requires fewer computational resources and less storage space, which reduces device power consumption and also minimizes network bandwidth usage. Moreover, the encryption operations of point addition and point multiplication in conjunction with the mathematical problem of elliptic curve encryption ensure that even if an attacker intercepts the communication message, the key cannot be deduced because it is an irreversible process.
  • Enhanced authentication mechanisms
ECC supports authentication protocols that can incorporate timestamps or random numbers to effectively prevent replay attacks.

3.3. Elliptic Curve Cryptography Mathematical Problems

Given a large prime q > 3 , let E P ( a , b ) represent a nonsingular elliptic curve over the finite field F q , with P as the generator. Let G be a subgroup of the order p , where p > q . Therefore, it can be applied to the elliptic curve discrete logarithm (ECDL) problem and the elliptic curve Diffie–Hellman (ECDH) problem [31]:
Definition 1. 
ECDL problem: Given points  X a X  on the elliptic curve  E P  where  X G  and  a Z q , it is computationally difficult to find  a .
Definition 2. 
ECDH problem: For the given points  a X   a n d   b X  on the elliptic curve  E P , where  X G  and   a , b Z q , it is computationally unfeasible to find  a b X .

4. Proposed Protocol

In this section, the proposed scheme is described in detail. The scheme consists of three phases: system setup, registration, and authentication and key agreement. Table 2 presents the symbols and descriptions used in the subsequent phase descriptions. The process of the protocol is shown in Figure 3.

4.1. System Setup Phase

TA performs the following to choose the system parameters:
S1: The TA chooses a non-singular elliptic curve E p ( a , b ) and point P E p ( a , b ) as the base point.
S2: The TA chooses a collision-resistant one-way hash function H ( ) and distributes the parameters { E P , P , H ( ) } to the participating entities.

4.2. Registration Phase

This subsection describes the registration process of S i and S P j , taking the registration of the S i as an example, as shown in Figure 4. The operations of the system setup and registration phases are described in Algorithm 1.
Algorithm 1 System setup phase and registration processes of S i
#******************** System setup phase ********************#
1.TA chooses E p ( a , b ) , point P E p ( a , b ) and H ( ) .
2.TA distributes { E P , P , H ( ) }.
#******************** Registration processes of S i ********************#
3. S i selects I D S , generates r S Z q
4. S i computes R S = r S · P
5. S i submits { I D S , R S } towards TA via secure channel.
6.If  I D S is valid and not in the database, then:
7.  TA generates r S t a Z q
8.  TA computes K S = R S + r S t a · P
9.  TA stores { I D S , K S }
10.  TA sends { I D S P , K S P , r S t a } to S i
11.Else:
12.   S i computes k S = ( r S + r S t a ) m o d   p , K S = k S P
13.  If  K S = K S  then:
14.     S i computes W S P = k S · K S P
15.     S i stores { I D S , k S , W S P }
16.  Else:
17.    Terminate session
18.  End if;
19.End
R1: Firstly, S i chooses a random r S Z q and its identifier I D S Z q , computes R S = r S · P . Then, S i transmits a registration request I D S , R S to the TA securely.
R2: Upon receiving S i ’s registration request I D S , R S , the TA checks whether the I D S is valid or not. If I D S is invalid, the TA rejects S i registration request and asks S i to submit a new identifier. Then, the TA chooses r S t a Z q randomly to calculate the public key of S i . K S = R S + r S t a · P . Next, the TA stores { I D S P , K S } in the database and sends { I D S P , K S P , r S t a } to S i via a secure channel.
R3: Upon S i receiving the response from the TA, S i obtains its private key, k S = r S + r S t a m o d   p . Then, S i checks whether K S ? = k S · P , if it holds, S i computes W S P = k S · K S P and stores { I D S , k S , W S P } .
Similarly, S P j stores { I D S P , k S P , W S } after registration.

4.3. Authentication and Key Agreement Phase

This subsection describes the authentication and key agreement between S i and S P j ; see the details in Figure 5. The operations of the authentication and key agreement phases are described in Algorithm 2.
A1: S i first chooses a random number l S Z q and generates the current timestamp T S . Then, it computes L S = l S K S and M S = H ( L S W S P ) P . Thirdly, S i encrypts I D S as E I D S = I D S H ( M S T S ) and obtains the verifier V S = H ( I D S L S M S T S ) . Finally, S i transmits the authentication request M 1 = { E I D S , L S , V S , T S } to S P j .
B1: Upon receiving the request message sent by S i at T S , S P j checks the condition T S T S < T for validating the received timestamp T S . If so, it computes M S P = H L S W S P and I D S = E I D S H ( M S P T S ) . S P j checks if V S ? = H ( I D S L S M S P T S ) , if it is not valid, S P j terminates the current session.
B2: S P j first chooses a random number l S P Z q and generates timestamp T S P . Secondly, it computes L S P = l S P K S P and obtains the session key as S S K S P = H ( I D S I D S P M S P L S L S P ) . Finally, S P j computes the verifier V S P = H ( I D S P L S P M S P T S P ) and transmits M 2 = { L S P , V S P , T S P } to S i through a public channel.
A2: Upon receiving the response message sent by S P j at T S P , S i checks the condition T S P T S P < T for validating the received timestamp T S P . If it is not met, the communication is terminated. Otherwise, S i checks if V S P ? = H ( I D S P L S P M S T S P ) , if it is not met, the session is terminated. S i further computes the session key S S K S = H ( I D S I D S P M S L S L S P ) .
Algorithm 2 Authentication and key agreement
#******************** Authentication and key agreement ********************#
1. S i generates l s Z q   and   T S
2. S i computes L S = l S · K S , M S = H L S W S P P , E I D S = I D S H ( M S T S ) , V S = H ( I D S L S M S T S )
3. S i sends M 1 = { E I D S , L S , V S , T S } to S P j
4. S P j computes M S P = H L S W S P , I D S = E I D S H ( M S P T S )
5. S P j computes V S = H ( I D S L S M S P T S )
6.If  V S ! = V S  then:
7.  Terminate session
8.  Else:
9.   S P j generates l S P Z q , T S P
10.   S P j computes L S P = l S P K S P , S S K S P = H ( I D S I D S P M S P L S L S P )
11. S P j computes V S P = H ( I D S P L S P M S P T S P )
12.   S P j sends M 2 = { L S P , V S P , T S P } to S i
13.   S i computes V S P = H ( I D S P L S P M S T S P )
14.    If  V S P ! = V S P  then:
15.    Terminate session
16.  Else:
17.     S i computes S S K S = H ( I D S I D S P M S L S L S P )
18.  End if;
19.End

5. Security Analysis

This section describes the ROM-based formal security analysis, descriptive security analysis, and automated formal verification making use of ProVerif.

5.1. Adversary Model

Suppose there are two participants in the scheme: the service provider and smart meter. There may be multiple instances of each entity, with each instance being considered an oracle. These instances may execute concurrently. Instances of the smart meter and service provider are denoted as S i and S P j ( i , j ϵ Z ), respectively. Any type of instance is represented by I S i S P j .
The proposed protocol adopts the eCK adversary model [32]. Assume that 𝒜 is a probabilistic polynomial-time adversary which can completely control the public channel, meaning it can eavesdrop, intercept, replay, delete, or modify messages in the channels. Additionally, under the eCK adversary model, 𝒜 can compromise secret credentials, such as session keys, private keys, and ephemeral secrets. Therefore, a secure key agreement protocol should ensure that the leakage of certain secret values cannot affect other values’ security. 𝒜 can have a session with S i or S P j by the following query [33]. As shown in Table 3.

5.2. Formal Security Analysis

In this subsection, a formal security analysis of the proposed protocol is implemented based on the ROM model.
Each oracle may have three possible states, which are:
(1)
Acceptance: If an instance receives the final expected protocol message, then I enters the acceptance state.
(2)
Freshness: Instances I is fresh when the following conditions are met:
  • I is accepted and has the session key.
  • Neither I nor his partner (if existing) has been queried by S R e v e a l   ( I ) .
  • C o r r u p t   ( I ) is not queried by 𝒜.
(3)
Empty: This state indicates that the instance’s input was not answered.
Partnership: S i and S P j are in a partnership when the following three conditions are met:
(1)
S i and S P j have successfully authenticated each other and share the same session identifier.
(2)
S i and S P j are both in the acceptance state;
(3)
S i and S P j are mutual partners.
Semantic Security: In this protocol, 𝒜 attempts to break the semantic security of the protocol through multiple E x e c u t e   ( I ) , S e n d   ( I , M ) , and h ( m ) , S R e v e a l   ( I ) , r R e v e a l   ( I ) queries, and one T e s t   ( I ) query. Using the message obtained in the query, 𝒜 attempts to guess the value b of b in the T e s t   ( I ) query. Let AKA-SG denotes the protocol designed in this paper, Adv 𝒜 AKA SG ( t ) denote 𝒜’s advantage in breaking the semantic security of AKA-SG within polynomial time t, W i n j ( j = 0,1 , , 4 ) denotes the event that 𝒜 succeeds in the following series of games G i ( i = 0,1 , , 4 ) , Pr W i n denotes the success probability of 𝒜. Then, the advantage of 𝒜 in breaking the semantic security of AKA-SG is:
adv 𝒜 AKA SG = | 2 Pr [ b = b ] 1 | = | 2 Pr [ Win ] 1 |
The AKA scheme is considered semantically secure under the eCK adversarial model when Adv 𝒜 AKA SG < ε , where ε > 0 is a sufficiently small number.
Theorem 1. 
Let  q e , q s  and  q h  represent the number of  E x e c u t e   ( I ) ,  S e n d   ( I , M ) , and  h ( m )  made by 𝒜 within polynomial time  t . Assume that the length of each hash value is  l . The advantage of 𝒜 in breaking the semantic security of AKA-SG is:
Adv 𝒜 AKA SG ( t ) q h 2 2 l + ( q e + q s ) 2 p 1 + ( 2 q h + q s ) 2 + ( q h + q s ) 2 2 l 1 + 2 Adv 𝒜 AKA SG ( t )
Proof of Theorem 1. 
Through a series of gaming games G i , the simulator emulates the protocol and answers 𝒜’s queries. Detailed proofs are listed as follows:
G 0 : This game simulates the real attack under the ROM model. Hence,
Adv 𝒜 AKA SG ( t ) = | 2 Pr [ Win 0 ] 1 |
G 1 : In this game, 𝒜 executes E x e c u t e ( I ) and T e s t ( I ) queries to launch active attacks against the protocol. Through the E x e c u t e ( I ) query, 𝒜 can obtain the information on the public channel, specifically M 1 = { E I D S , L S , V S , T S } and M 2 = { L S P , V S P , T S P } . During the authentication phase, the T e s t ( I ) query allows 𝒜 to determine whether the session key is the actual key or a random value. Clearly, 𝒜 cannot compute the session key S S K S P ( S S K S ) based on the information obtained on the public channel. Therefore, 𝒜’s advantage does not increase compared to G 0 . That is,
| Pr [ Win 1 ] Pr [ Win 0 ] | = 0
G 2 : In this game, 𝒜 can forge messages by making S e n d   ( I , M ) queries and h ( m ) queries. The semantic security of the protocol is threatened only when 𝒜 finds collisions and forges a legitimate message. In this paper, 𝒜 can find the following two types of collisions:
(1)
The probability of collisions in the output of the hash function is at most: q h 2 2 l + 1
(2)
The probability of collisions in random numbers is at most: ( q e + q s ) 2 2 ( p 1 )
Therefore, unless a collision occurs, games G 2 and G 1 are indistinguishable; we have:
| Pr [ Win 2 ] Pr [ Win 1 ] | q h 2 2 l + 1 + ( q e + q s ) 2 2 ( p 1 )
G 3 : In this game, 𝒜 attempts to guess certain parameters to forge a legitimate message:
(1)
If 𝒜 receives M 1 = { E I D S , L S , V S , T S } , 𝒜 performs hash queries to compute M 1 . Thus, the probability of encountering the cases ( , M S ) , ( I D S L S M S , V S ) is: ( 2 q h + q s ) 2 2 l .
(2)
If 𝒜 receives M 2 = { L S P , V S P , T S P } , then the probability of encountering the case ( I D S P L S P M S P , V S P ) is: ( q h + q s ) 2 2 l .
Unless 𝒜 successfully obtains the aforementioned parameters, G 2 and G 3 are indistinguishable. We have:
| Pr [ Win 3 ] Pr [ Win 2 ] | ( 2 q h + q s ) 2 + ( q h + q s ) 2 2 l
G 4 : In this game, 𝒜 can capture S i and S P j by performing a C o r r u p t ( I ) query, obtaining the key k S and k S P stored in its memory. Additionally, 𝒜 can obtain the ephemeral secrets for I through an r R e v e a l ( I ) query. 𝒜 can also intercept the data transmitted over the public channel, specifically M 1 = { E I D S , L S , V S , T S } and M 2 = { L S P , V S P , T S P } . can use the intercepted data to compute the session key S S K S ( S S K S P ) between S i and S P j . Due to the computational difficulty of the ECDL and ECDH problems, computing S S K S ( S S K S P ) is unfeasible. We have:
| Pr [ Win 4 ] Pr [ Win 3 ] | Adv 𝒜 AKA SG ( t )
After executing all relevant queries related to the aforementioned game, 𝒜 has no other significant advantage. Once the R e v e a l   ( I ) and T e s t ( I ) queries are performed, 𝒜 can only guess the random bit b to determine whether the computed S S K S ( S S K S P ) between S i and S P j is the actual key or a random number. Therefore:
Pr [ Win 4 ] = 1 2
Considering all possibilities, Theorem 1 is successfully proven. □

5.3. Descriptive Security Analysis

5.3.1. Anonymity and Untraceability

In this scheme, I D S is encrypted before transmission and changes dynamically from session to session. Additionally, 𝒜 cannot retrieve or track participants from the transmitted messages. In other words, this scheme ensures anonymity and untraceability.

5.3.2. Perfect Forward Security

Assume that the private keys k S and k S P of the entities are leaked. For S S K S = H ( I D S I D S P M S L S L S P ) , where M S = H L S W S P P , L S = l S · K S , 𝒜 cannot obtain the random numbers l S and l S P for each session, thus, he/she cannot compute S S K S . Therefore, 𝒜 cannot compute the session key. In summary, this scheme can ensure perfect forward security.

5.3.3. Mutual Authentication and Key Establishment

During the AKA process, S P j verifies S i by checking the correctness of V S . Similarly, S i verifies V S P to ensure that the messages received are from S i . At the same time, since S S K S = H I D S I D S P M S L S L S P = H I D S I D S P H L S W S P P L S L S P = H I D S I D S P H L S ( k S k S P P ) P L S L S P = H I D S I D S P H L S W S P L S L S P = H I D S I D S P M S P L S L S P = S S K S P , S i and S P j establish the same session key.

5.3.4. Privileged-Insider Attack Resistance

Assume 𝒜 is a privilege insider attacker of the TA, who can obtain the information { I D S P , R S P , I D S , K S , r s P t a } of S i in the registration phase. 𝒜 may attempt to compute S i ’s private key k S = ( r S + r S t a ) m o d   p , where r S is the random number generated by S i . Since the ECDL problem, k S cannot be computed by 𝒜. Similarly, 𝒜 gets the information of S P j and cannot compute S P j ’s private key k S P = ( r S P + r S P t a ) m o d   p . Therefore, the protocol is resistant to privileged insider attacks.

5.3.5. Replay Attack Resistance

Assume that 𝒜 intercepts M 1 = { E I D S , L S , V S , T S } and M 2 = { L S P , V S P , T S P } during the AKA phase. Since these messages involve the current timestamps T S and T S P , respectively, the verification of M 1 and M 2 is based on checking T S and T S P . Therefore, any violation of the timestamp checking will lead us to confirm the replay of old messages by 𝒜. Thus, the scheme is resistant to replay attacks.

5.3.6. Impersonation Attacks Resistance

Taking the example of impersonating S i as an example. If 𝒜 attempts to impersonate S i , it should generate the message M 1 = { E I D S , L S , V S , T S } in a way that S P j believes the message is legitimate and from S i . If 𝒜 does not know the secret parameters such as k s , W S P , generating a valid message within polynomial time would be a computationally expensive task. Therefore, the proposed protocol can resist impersonation attacks.

5.3.7. Man-in-Middle Attack Resistance

Assume that 𝒜 captures all messages transmitted by the participants during the AKA phases over a public channel, where M 1 = { E I D S , L S , V S , T S } and M 2 = { L S P , V S P , T S P } . 𝒜 attempts to modify the transmitted messages to make the participants believe that the received messages come from legitimate parties. Taking the modifying of M 1 as an example, if 𝒜 attempts to modify M 1 = { E I D S , L S , V S , T S } , 𝒜 needs to know the random secret parameter l s and private key k s generated by S i . It is a computationally expensive task. Therefore, the proposed protocol can resist man-in-the-middle attacks.

5.4. Automatic Formal Verification by ProVerif

This subsection utilizes ProVerif [34] to formally verify the proposed scheme. ProVerif is based on the Dolev–Yao security model [35] and is a widely used tool for testing the security of cryptographic protocols [36]. The diagram below illustrates the modeling process of S i , corresponding to Section 3. The modeling process of S P j is similar to that of S i .
The query statement for the proposed scheme with the ProVerif tool is given below:
(1)
query attacker (SSKS).
(2)
query attacker (SSKSP).
The subprocess code of S i is as follows in Figure 6:
We use Process!SPj|!Si|!TA to demonstrate the parallel execution of three entities as shown in Figure 7.
The simulation results are shown in Figure 6. The results indicate that the session key proposed is robust against common attacks. Therefore, the proposed scheme is secure under formal verification using the ProVerif framework.

6. Performance Comparison

In this section, the proposed scheme is compared with other related schemes of the SG [7,21,37,38,39] in terms of performance.

6.1. Security and Functionality Features Comparison

The comparison of the proposed scheme with related schemes in terms of security is presented in Table 4. As shown in Table 4, the scheme in [21] is not resistant to man-in-the-middle and impersonation attacks, the schemes in [38] and LAS-SG are not resistant to insider attacks, and the scheme in [7] does not provide untraceability. Although the scheme in [37] can fulfill the nine security features in the table, it requires higher computation and communication costs. Therefore, the proposed scheme offers better security and more functional attributes than the existing schemes.

6.2. Computation Cost

Assume that T h ,     T m u l ,     T a d d ,   T p a i r and T e represent the running times for hash operations, point multiplication, point addition, bilinear pairing operations, and symmetric encryption/decryption, respectively, since the execution times of and operations are significantly lower than other operations, which are neglected. The experiments were conducted on a PC with Intel(R) Core (TM) i5-8250U CPU @ 1.60 GHz 1.80 GHz + 8 GB RAM and Windows 11. In the development environment IntelliJ IDEA (IDEA), multiple point addition and point multiplication operations are performed based on the elliptic curve equation: y 2 = x 3 + a x + b ( m o d p ) . When p = 2 192 , these operations were executed 1000 times. The average execution times for T h , T m u l , T a d d , and T e are 0.001 ms, 1.952 ms, 8.126 ms, and 0.018 ms, respectively.
In the authentication and key agreement phases, both S i and S P j in the proposed scheme execute five times T h and eight times T m u l , resulting in a total of 10 T h + 4 T m u l =7.818 (ms). Through similar calculations, Table 5 presents the communication overhead for each protocol in the authentication and key agreement phase. As shown in Table 5, the computational cost of the proposed scheme is the lowest among all compared schemes, except for the scheme in [38]. Although the approach in [38] requires lower computational costs, it does not account for inside attacks. Obviously, the scheme in this paper is more robust.

6.3. Communication Costs

Assuming the sizes of the identity identifier (ID), random number (R), timestamp (T), ECC point (P), hash output (H), and symmetric encryption/decryption (E) are 128 bits, 128 bits, 32 bits, 320 bits, 160 bits, and 256 bits, respectively.
In the proposed scheme, the sizes of messages M 1 = { E I D S , L S , V S , T S } and M 2 = { L S P , V S P , T S P } are (128 + 320 + 160 + 32) = 640 bits and (320 + 160 + 32) = 512 bits, respectively. Therefore, the total communication overhead is 1152 bits. Table 6 shows the communication overhead required for all the schemes. As shown in Table 6, it is clear that the communication overhead is maximum for [39] and minimum for this paper scheme as compared to all schemes. The results indicate that the proposed protocol has the lowest communication cost during the AKA phase which is applicable to the SG.

6.4. Analysis of Performance Comparison Results

As shown in Figure 8, the comparison between computation and communication overheads is visually depicted. It can be observed that the proposed protocol has the minimal communication overhead although its computational overhead is not as good as [38]. Overall, this protocol is the most suitable for resource-constrained devices in SGs.

7. Conclusions

First, this paper reviews the existing SG AKA protocols. Then, we point out that the existing solutions cannot provide perfect forward security and user anonymity, and are unable to resist various attacks such as man-in-the-middle, ephemeral secret leakage, and key compromise impersonation, etc. Heavy computation and communication costs also mean that a number of these schemes are not appropriate for a resources-constrained SG. We proposed a lightweight authentication and key agreement scheme based on ECC to address the existing challenges. Under the eCK adversary model, the security of the session key in this scheme was rigorously proven. With ProVerif, we verified the confidentiality of the session key and the authentication properties. Though performance comparison, it was found that the scheme has advantages such as user anonymity, perfect forward security, and mutual authentication, and resists typical attacks like impersonation, man-in-the-middle, replay attacks and privileged-insider attacks. Additionally, compared to existing solutions, this scheme has minimal computation and communication overheads, making it more suitable for resource-constrained devices in an SG.
Although the scheme has many of the advantages mentioned above, we have not attempted to execute it on other experimental devices. In addition, with the continuous development of quantum computing, it brings great challenges to traditional public key encryption algorithms. In order to ensure seamless integration and compatibility of the scheme with the existing SG infrastructure, the widely accepted Smart Grid Framework model proposed by NIST is considered in this paper. Additionally, with their progressive deployment strategies, compatibility with existing hardware, and network topology adaptability, SGs enable a secure and efficient key management and agreement. In the future, we intend to implement the proposed scheme on a Raspberry Pi to demonstrate its feasibility in resource-constrained devices. Additionally, we intend to ensure that the scheme not only incorporates enhanced security attributes but also can be applied to other resource-constrained scenarios, such as smart healthcare and smart sports devices.

Author Contributions

Conceptualization, S.W. and K.M.; Formal analysis, Y.Z., S.W. and K.M.; Methodology, S.H.; Project administration, J.C.; Resources, S.H.; Supervision, J.C. and S.H.; Validation, Y.Z.; Writing—original draft, Y.Z.; Writing—review and editing, S.H. and K.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The data are not publicly available due to privacy.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Mahmood, K.; Chaudhry, S.A.; Naqvi, H.; Kumari, S.; Li, X.; Sangaiah, A.K. An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Gener. Comput. Syst. 2018, 81, 557–565. [Google Scholar] [CrossRef]
  2. Abbasinezhad-Mood, D.; Nikooghadam, M. Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications. Future Gener. Comput. Syst. 2018, 84, 47–57. [Google Scholar] [CrossRef]
  3. Baghestani, S.H.; Moazami, F.; Tahavori, M. Lightweight authenticated key agreement for smart metering in smart grid. IEEE Syst. J. 2022, 16, 4983–4991. [Google Scholar] [CrossRef]
  4. Rahman, M.A.; Islam, M.R.; Hossain, M.A.; Rana, M.S.; Hossain, M.J.; Gray, E.M. Resiliency of forecasting methods in different application areas of smart grids: A review and future prospects. Eng. Appl. Artif. Intell. 2024, 135, 108785. [Google Scholar] [CrossRef]
  5. Kumar, V.; Ahmad, M.; Mishra, D.; Kumari, S.; Khan, M.K. RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing. Veh. Commun. 2020, 22, 100213. [Google Scholar]
  6. Badar, H.M.S.; Qadri, S.; Shamshad, S.; Ayub, M.F.; Mahmood, K.; Kumar, N. An identity based authentication protocol for smart grid environment using physical uncloneable function. IEEE Trans. Smart Grid 2021, 12, 4426–4434. [Google Scholar] [CrossRef]
  7. Sadhukhan, D.; Ray, S.; Obaidat, M.S.; Dasgupta, M. A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography. J. Syst. Archit. 2021, 114, 101938. [Google Scholar]
  8. Qiu, Y.; Ma, M. A mutual authentication and key establishment scheme for M2M communication in 6LoWPAN networks. IEEE Trans. Ind. Inform. 2016, 12, 2074–2085. [Google Scholar] [CrossRef]
  9. Huseinovic, A.; Mrdovic, S.; Bicakci, K.; Uludag, S. A survey of denial-of-service attacks and solutions in the smart grid. IEEE Access 2020, 8, 177447–177470. [Google Scholar]
  10. Xia, Z.; Liu, T.; Wang, J.; Chen, S. A secure and efficient authenticated key exchange scheme for smart grid. Heliyon 2023, 9, e17240. [Google Scholar] [CrossRef]
  11. Qiu, S.; Wang, D.; Xu, G.; Kumari, S. Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices. IEEE Trans. Dependable Secur. Comput. 2020, 19, 1338–1351. [Google Scholar] [CrossRef]
  12. Yu, S.; Park, K. Puf-based robust and anonymous authentication and key establishment scheme for v2g networks. IEEE Internet Things J. 2024, 11, 15450–15464. [Google Scholar] [CrossRef]
  13. Wang, L.J.; Zhang, K.Y.; Wang, J.Y.; Cheng, J.; Yang, Y.H.; Tang, S.B.; Yan, D.; Tang, Y.L.; Liu, Z.; Yu, Y.; et al. Experimental authentication of quantum key distribution with post-quantum cryptography. NPJ Quantum Inf. 2021, 7, 67. [Google Scholar] [CrossRef]
  14. Li, X.; Niu, J.; Alam Bhuiyan, Z.; Wu, F.; Karuppiah, M.; Kumari, S. A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things. IEEE Trans. Ind. Inform. 2017, 14, 3599–3609. [Google Scholar] [CrossRef]
  15. Wu, D.; Zhou, C. Fault-tolerant and scalable key management for smart grid. IEEE Trans. Smart Grid 2011, 2, 375–381. [Google Scholar]
  16. Khan, A.A.; Kumar, V.; Ahmad, M.; Rana, S.; Mishra, D. PALK: Password-based anonymous lightweight key agreement framework for smart grid. Int. J. Electr. Power Energy Syst. 2020, 121, 106121. [Google Scholar] [CrossRef]
  17. Safkhani, M.; Kumari, S.; Shojafar, M.; Kumar, S. An authentication and key agreement scheme for smart grid. Peer—Peer Netw. Appl. 2022, 15, 1595–1616. [Google Scholar] [CrossRef]
  18. Taqi, S.A.M.; Jalili, S. LSPA-SGs: A lightweight and secure protocol for authentication and key agreement based Elliptic Curve Cryptography in smart grids. Energy Rep. 2022, 8, 153–164. [Google Scholar]
  19. Sureshkumar, V.; Anandhi, S.; Amin, R.; Selvarajan, N.; Madhumathi, R. Design of robust mutual authentication and key establishment security protocol for cloud-enabled smart grid communication. IEEE Syst. J. 2020, 15, 3565–3572. [Google Scholar] [CrossRef]
  20. Cheng, Q.; Ma, Y. Cryptoanalysis on the Forward Security of Two Authenticated Key Protocols. J. Electron. Inf. Technol. 2022, 44, 4294–4303. [Google Scholar]
  21. Srinivas, J.; Das, A.K.; Li, X.; Khan, M.K.; Jo, M. Designing anonymous signature-based authenticated key exchange scheme for Internet of Things-enabled smart grid systems. IEEE Trans. Ind. Inform. 2020, 17, 4425–4436. [Google Scholar] [CrossRef]
  22. Baruah, B.; Dhal, S. An authenticated key agreement scheme for secure communication in smart grid. In Proceedings of the 2021 International Conference on COMmunication Systems & NETworkS (COMSNETS), Bangalore, India, 5–9 January 2021; pp. 447–455. [Google Scholar]
  23. Khan, A.A.; Kumar, V.; Ahmad, M.; Rana, S. LAKAF: Lightweight authentication and key agreement framework for smart grid network. J. Syst. Archit. 2021, 116, 102053. [Google Scholar]
  24. Mehta, P.J.; Parne, B.L.; Patel, S.J. SE-LAKAF: Security enhanced lightweight authentication and key agreement framework for smart grid network. Peer-Peer Netw. Appl. 2023, 16, 1513–1535. [Google Scholar] [CrossRef]
  25. Yu, S.J.; Park, K.S. ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor. J. Syst. Archit. 2022, 131, 102698. [Google Scholar] [CrossRef]
  26. Li, Y. An improved lightweight and privacy preserving authentication scheme for smart grid communication. J. Syst. Archit. 2024, 152, 103176. [Google Scholar] [CrossRef]
  27. Khan, A.A.; Kumar, V.; Ahmad, M. An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 698–705. [Google Scholar] [CrossRef]
  28. Wang, C.; Huo, P.; Ma, M.; Zhou, T.; Zhang, Y. A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid. Computing 2023, 105, 2511–2537. [Google Scholar] [CrossRef]
  29. Gopstein, A.; Nguyen, C.; O’Fallon, C.; Hastings, N.; Wollman, D. NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 4.0; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2021.
  30. Kumari, A.; Abbasi, M.Y.; Kumar, V.; Khan, A.A. A secure user authentication protocol using elliptic curve cryptography. J. Discret. Math. Sci. Cryptogr. 2019, 22, 521–530. [Google Scholar]
  31. Khan, A.A.; Kumar, V.; Prasad, R.; Idrisi, M.J. SGAK: A Robust ECC based Authenticated Key Exchange Protocol for Smart Grid Networks. IEEE Access 2024. [Google Scholar] [CrossRef]
  32. LaMacchia, B.; Lauter, K.; Mityagin, A. Stronger security of authenticated key exchange. In International Conference on Provable Security; Springer: Berlin/Heidelberg, Germany, 2007; pp. 1–16. [Google Scholar]
  33. Mohammadali, A.; Haghighi, M.S.; Tadayon, M.H.; Mohammadi-Nodooshan, A. A novel identity-based key establishment method for advanced metering infrastructure in smart grid. IEEE Trans. Smart Grid 2016, 9, 2834–2842. [Google Scholar] [CrossRef]
  34. Bellare, M.; Rogaway, P. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, VA, USA, 3–5 November 1993; pp. 62–73. [Google Scholar]
  35. Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
  36. Blanchet, B. An efficient cryptographic protocol verifier based on prolog rules. In Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14), Cape Breton, NS, Canada, 11–13 June 2001; pp. 82–96. [Google Scholar]
  37. Wu, Y.; Guo, H.; Han, Y.; Li, S.; Liu, J. A Security-Enhanced Authentication and Key Agreement Protocol in Smart Grid. IEEE Trans. Ind. Inform. 2024, 20, 11449–11457. [Google Scholar] [CrossRef]
  38. Salem, F.M.; Khairy, R.; Ali, I.A. An elliptic curve-based lightweight mutual authentication scheme for secure communication in smart grids. Int. J. Inf. Technol. 2024, 1–11. [Google Scholar] [CrossRef]
  39. Chaudhry, S.A.; Yahya, K.; Garg, S.; Kaddoum, G.; Hassan, M.M.; Zikria, Y.B. LAS-SG: An elliptic curve-based lightweight authentication scheme for smart grid environments. IEEE Trans. Ind. Inform. 2022, 19, 1504–1511. [Google Scholar] [CrossRef]
Figure 1. Structure of AMI system.
Figure 1. Structure of AMI system.
Energies 17 04550 g001
Figure 2. Communication model.
Figure 2. Communication model.
Energies 17 04550 g002
Figure 3. Flowchart of the protocol.
Figure 3. Flowchart of the protocol.
Energies 17 04550 g003
Figure 4. Registration processes of S i .
Figure 4. Registration processes of S i .
Energies 17 04550 g004
Figure 5. Authentication and key agreement.
Figure 5. Authentication and key agreement.
Energies 17 04550 g005
Figure 6. The process of S i .
Figure 6. The process of S i .
Energies 17 04550 g006
Figure 7. Simulation results.
Figure 7. Simulation results.
Energies 17 04550 g007
Figure 8. Performance comparison of related protocols [7,21,37,38,39].
Figure 8. Performance comparison of related protocols [7,21,37,38,39].
Energies 17 04550 g008
Table 1. Summary of related work.
Table 1. Summary of related work.
SchemesProblem DescriptionVulnerabilityCause
[16]A password-based anonymous lightweight key agreement framework is proposed.Cannot provide user anonymity and cannot resist password guessing attacks.The attacker extracted a fixed value from the messages transmitted over the open channel.
[19]A lightweight scheme based on ECC with improved scheme [16].Cannot resist temporary private key leakage attacks.The final session key does not include the temporary keys of both parties.
[21]A new identity authentication key exchange scheme based on anonymous signatures is proposed.Cannot resist man-in-the-middle attacks and impersonation attacks.Secret value leakage led to an attack.
[23]A lightweight authentication and key agreement protocol for smart grids is proposed.Does not meet user anonymity and session key security requirements.The user ID was not dynamically transmitted.
[25]An AKA scheme is designed based on a fuzzy extractor.Cannot resist temporary secret leakage attacks and does not provide untraceability.User IDs are not transmitted dynamically leading to tracing and random number leaks leading to session keys being computed.
Table 2. Symbol description.
Table 2. Symbol description.
SymbolExplanation
T A Trust Anchor
S i ,   I D S i t h   smart meter and its identity
S P j ,   I D S P j t h   service provider and its identity
E P ( a , b ) A non-singular elliptic curve: y 2 = x 3 + a x + b ( m o d p )
PThe base point
k S / K S Private/public key of S i
k S P / K S P Private/public key of S P j
H ( ) A cryptographic (collision-resistant) one-way hash function
S S K S / S S K S P The session key between S i and S P j
T S ,   T S P Timestamps
T Maximum transmission delay
Exclusive-or operation
Concatenation operations
Energies 17 04550 i001Secure channel
Energies 17 04550 i002Public channel
𝒜Adversary
Table 3. Query description.
Table 3. Query description.
Query TypeSignificance
C o r r u p t   ( I ) This query can return the private keys stored in the compromised S i to 𝒜.
S R e v e a l   ( I ) This query enables 𝒜 to obtain S S K S ( S S K S P ) generated by the entity and its partner.
r R e v e a l   ( I ) This query allows 𝒜 to obtain the ephemeral secrets of I .
E x e c u t e   ( I ) This query allows 𝒜 to obtain all exchanged messages between the participants S i and S P j .
S e n d   ( I , M ) In this query, 𝒜 sends a message M to I ; if the message M is valid, 𝒜 outputs the response received from I ; otherwise, the query is ignored.
Test ( I )This query allows 𝒜 to send a session key request to I , and I probabilistically outputs the result of a fair coin flip b . If Test ( I ) does not reach an acceptance state, the result is . Otherwise, if b = 1 , 𝒜 receives the actual session key; otherwise, 𝒜 receives a random value with the same size of the session key.
h ( m ) This query allows 𝒜 to obtain a random number as the hash value of m .
Table 4. Functionality and Security Comparison.
Table 4. Functionality and Security Comparison.
SchemeF1F2F3F4F5F6F7F8F9
ours
[37]
[38]×
[39]×
[7]×
[21]××
Notes: F1: Mutual authentication F2: Anonymity F3: Untraceability F4: Perfect forward security F5: Replay attack F6: Man-in-the-middle attack F7: Privileged-insider attack F8: Impersonation attack resistance F9: Mutual authentication without the help of other entities. √: “a scheme is secure or it supports that feature”; ×: “a scheme is insecure or it does not support that feature”.
Table 5. Computation Cost.
Table 5. Computation Cost.
SchemeComputation CostTimes (ms)
ours10 T h + 4 T m u l 7.818
[37] 16 T h + 8 T m u l 15.64
[38] 16 T h + 3 T m u l 5.872
[39] 6 T h   + 7 T m u l   + 10 T e 15.05
[7] 8 T h   + 6 T m u l   + 2 T a d d 11.85
[21] 14 T h   + 6 T m u l   + 2 T a d d 11.856
Table 6. Communication Cost.
Table 6. Communication Cost.
SchemeCommunication CostNumber of MessagesTotal Bits
oursID + 2P + 2H + 2T21152
[37]3H + 2P + 3T + 2ID31472
[38]ID + 5H + P21248
[39]2H + 2P + 2T + 4E22048
[7]2H + 2P + 2R + 2T + 2ID21536
[21]3H + 3P + 3T31536
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, Y.; Chen, J.; Wang, S.; Ma, K.; Hu, S. Lightweight Anonymous Authentication and Key Agreement Protocol for a Smart Grid. Energies 2024, 17, 4550. https://doi.org/10.3390/en17184550

AMA Style

Zhang Y, Chen J, Wang S, Ma K, Hu S. Lightweight Anonymous Authentication and Key Agreement Protocol for a Smart Grid. Energies. 2024; 17(18):4550. https://doi.org/10.3390/en17184550

Chicago/Turabian Style

Zhang, Ya, Junhua Chen, Shenjin Wang, Kaixuan Ma, and Shunfang Hu. 2024. "Lightweight Anonymous Authentication and Key Agreement Protocol for a Smart Grid" Energies 17, no. 18: 4550. https://doi.org/10.3390/en17184550

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop