Lightweight Hash-Based Authentication Protocol for Smart Grids
Abstract
:1. Introduction
- Secure memory protection: The scheme addresses the need for secure memory protection in SMs to safeguard against the unauthorized access and tampering of sensitive data stored within the devices.
- Robust communication security: By employing a lightweight communication protocol, the scheme ensures secure communication between SMs and power suppliers, protecting against eavesdropping, message tampering, and replay attacks.
- Efficient computational requirements: Recognizing the resource limitations of SMs, the proposed scheme aims to minimize the computational overhead, ensuring efficient authentication without compromising security.
2. Related Work
3. Preliminaries
3.1. Hash Function
- Compute a hash function efficiently: The calculation of the hash value by the hash function must be fast, regardless of the size of the input data.
- Preimage resistance: For the hash function , given , it should be computationally infeasible to find x.
- Second preimage resistance: For the hash function , given x, it should be computationally infeasible to find another such that .
- Collision resistance: For the hash function , it should be computationally infeasible to find and , where such that .
3.2. System Model
- Smart meter (): An electronic device that measures the consumption of utilities, such as electricity, gas, and water, collecting data in real time. It communicates with the neighborhood gateway to transmit data reports. Users utilize SMs to monitor their energy usage.
- Neighborhood gateway (): A neighborhood gateway is configured within a neighborhood area network and communicates regularly with dozens to hundreds of smart meters. For example, it could be installed in a commercial building’s technical room, where it serves the role of transmitting data to a central energy management system, or it might be placed within a home to monitor the household’s energy consumption. In the case of a residential gateway, it could be connected via Bluetooth, Zigbee, or Wi-Fi, and typically supports a capacity of 128 MB or more [24,25]. At a minimum, the gateway must store the information from the smart meter until it can be sent to the cloud or the company. The neighborhood gateway enables smart meters to exchange information with the cloud or the company. It requests data from each SM and collects their data. The neighborhood gateway checks the confidentiality and integrity of the data collected from the SMs.
3.3. Attack Model
- The attacker eavesdrops on all the transmission packets used in the public channel.
- The attacker attempts to decrypt the eavesdropped transmission packets to obtain the values (data report, message, etc.) intended for transmission through communication.
- The attacker attempts to alter the messages used in communication by performing a man-in-the-middle attack.
- The attacker attempts a replay attack.
4. Review of Aghapour et al.’s Scheme [10]
4.1. Initialization Phase
4.2. Secure Communication Phase
4.2.1. First Authentication
- generates the random number for . computes , , where is the i-th message for , is a timestamp of , and is a one-way hash function. sends a message , , , to in the public channel.
- receives the message , , , from , and computes to obtain and . verifies . If it fails to verify the message, stops the protocol. If its verification succeeds, the authenticity of is verified by , and the first authentication phase ends.
4.2.2. Second Authentication
- computes , where is the data report from the corresponding SM, and is a different hash function with . creates the new key , where is a timestamp of . It replaces the old key with . makes the verification and sends a message , , to .
- receives the message , , from and computes . computes . verifies , and if its verification succeeds, compares with the existing format and stores in its database.
5. Limitations of Aghapour et al.’s Scheme [10]
5.1. Inferrability of the Data Report
5.2. Inferrability of the Message
5.3. Extraction of the Secret Key
6. Proposed Scheme
6.1. Initialization Phase
- We denote the j-th SM as . At this time, selects its own identity information. When the identity chosen by is denoted as , transmits the information to through a secure channel.
- receives the identity information of each SM through a secure channel. Assuming that it receives the identity of the j-th SM, generates an initial secret key for communication with . then stores the pair , in its database. transmits the generated to through a secret channel, and receives and stores the secret key .
6.2. First Secure Communication Phase
- To securely send a message to , generates a random number and a timestamp . To protect the message from external leakage, performs the following operations: , . then transmits , , , to through a public channel.
- Upon receiving , , , from , checks if the timestamp is within an appropriate range and performs the following operations to verify the message: . computes using the extracted : . Then, it computes to verify the integrity of the message. If the verification fails, the protocol is immediately halted. If the verification succeeds, the next phase proceeds.
6.3. Second Secure Communication Phase
- To securely send the data report to , generates a timestamp and performs the following operations: . It then computes the new key value and performs the verification . Then, transmits , , to through a public channel.
- Upon receiving , , from , checks if the timestamp is within an appropriate range and performs the following operations for verification : , . compares with existing reports, and if it matches the established format, it is accepted. When computes and checks the verification , if the verification is successful, replaces the existing .
7. Security Analysis of the Proposed Scheme
7.1. Formal Security Analysis
- Query inj-event(EVENT) ==> inj-event(EVENT) is true.
- Query not attacker(K) is true.
7.2. Informal Security Analysis
7.2.1. Provide Mutual Authentication
7.2.2. Resist Replay Attack
7.2.3. Resist Smart Meter Impersonation Attack
7.2.4. Resist Extraction of the Secret Key
7.2.5. Resist Inferrability of the Message
7.2.6. Resist Message Altering
7.2.7. Resist Injection Attack
7.2.8. Provide forward Secrecy
7.2.9. Provide One-Time Pad Key
7.2.10. Resist Man-in-the-Middle Attack
8. Performance Analysis of the Proposed Scheme
9. Discussion of Performance
10. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Jumayev, B.A.; Nazarov, S. Smart Calculation of Heat Energy Supplied by Hot Water. IEIE Trans. Smart Process. Comput. 2023, 12, 155–161. [Google Scholar] [CrossRef]
- Barman, P.; Dutta, L.; Bordoloi, S.; Kalita, A.; Buragohain, P.; Bharali, S.; Azzopardi, B. Renewable energy integration with electric vehicle technology: A review of the existing smart charging approaches. Renew. Sustain. Energy Rev. 2023, 183, 113518. [Google Scholar] [CrossRef]
- Hasan, M.K.; Habib, A.A.; Shukur, Z.; Ibrahim, F.; Islam, S.; Razzaque, M.A. Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations. J. Netw. Comput. Appl. 2023, 209, 103540. [Google Scholar] [CrossRef]
- Mahmood, K.; Chaudhry, S.A.; Naqvi, H.; Kumari, S.; Xiong, L.; Sangaiah, A.K. An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Gener. Comput. Syst. 2018, 81, 557–565. [Google Scholar] [CrossRef]
- Hu, S.; Chen, Y.; Zheng, Y.; Xing, B.; Li, Y.; Zhang, L.; Chen, L. Provably secure ECC-based authentication and key agreement scheme for advanced metering infrastructure in the smart grid. IEEE Trans. Ind. Inform. 2023, 19, 5985–5994. [Google Scholar] [CrossRef]
- Sadhukhan, D.; Ray, S.; Obaidat, M.S.; Dasgupta, M. A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography. J. Syst. Archit. 2021, 114, 101938. [Google Scholar] [CrossRef]
- Sureshkumar, V.; An hi, S.; Amin, R.; Selvarajan, N.; Madhumathi, R. Design of robust mutual authentication and key establishment security protocol for cloud-enabled smart grid communication. IEEE Syst. J. 2020, 15, 3565–3572. [Google Scholar] [CrossRef]
- Kaveh, M.; Mosavi, M.R. A lightweight mutual authentication for smart grid neighborhood area network communications based on physically unclonable function. IEEE Syst. J. 2020, 14, 4535–4544. [Google Scholar] [CrossRef]
- Tanveer, M.; Alasmary, H. LACP-SG: Lightweight authentication protocol for smart grids. Sensors 2023, 23, 2309. [Google Scholar] [CrossRef]
- Aghapour, S.; Kaveh, M.; Mosavi, M.R.; Martín, D. An ultra-lightweight mutual authentication scheme for smart grid two-way communications. IEEE Access 2021, 9, 74562–74573. [Google Scholar] [CrossRef]
- Shim, S.; Kim, J.Y.; Hwang, S.W.; Oh, J.M.; Kim, B.K.; Park, J.H.; Hyun, D.J.; Lee, H. A Comprehensive Review of Cyber-physical System (CPS)-based Approaches to Robot Services. IEIE Trans. Smart Process. Comput. 2024, 13, 69–80. [Google Scholar] [CrossRef]
- Ryu, J.; Lee, H.; Lee, Y.; Won, D. SMASG: Secure mobile authentication scheme for global mobility network. IEEE Access 2022, 10, 26907–26919. [Google Scholar] [CrossRef]
- Degefa, F.; Ryu, J.; Kim, H.; Won, D. MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks. PLOS ONE 2022, 17, e0262696. [Google Scholar] [CrossRef]
- Lee, H.; Ryu, J.; Won, D. Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments. IEEE Int. Things J. 2024, 11, 5798–5815. [Google Scholar] [CrossRef]
- Cheval, V.; Cremers, C.; Dax, A.; Hirschi, L.; Jacomme, C.; Kremer, S. Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses. In Proceedings of the 32nd USENIX Security Symposium (USENIX Security 23), Anaheim, CA, USA, 9–11 August 2023; pp. 5899–5916. [Google Scholar]
- Abbasinezhad-Mood, D.; Nikooghadam, M. An ultra-lightweight and secure scheme for communications of smart meters and neighborhood gateways by utilization of an ARM Cortex-M microcontroller. IEEE Trans. Smart Grid 2017, 9, 6194–6205. [Google Scholar] [CrossRef]
- Ye, F.; Qian, Y.; Hu, R.Q. Energy efficient self-sustaining wireless neighborhood area network design for smart grid. IEEE Trans. Smart Grid 2014, 6, 220–229. [Google Scholar] [CrossRef]
- Khurana, H.; Hadley, M.; Lu, N.; Frincke, D.A. Smart-grid security issues. IEEE Secur. Priv. 2010, 8, 81–85. [Google Scholar] [CrossRef]
- Aloul, F.; Al-Ali, A.R.; Al-Dalky, R.; Al-Mardini, M.; El-Hajj, W. Smart grid security: Threats, vulnerabilities and solutions. Int. J. Smart Grid Clean Energy 2012, 1, 1–6. [Google Scholar] [CrossRef]
- Gorman, S. Electricity grid in US penetrated by spies. Wall Str. J. 2009, 8. [Google Scholar]
- Gjesvik, L.; Szulecki, K. Interpreting cyber-energy-security events: Experts, social imaginaries, and policy discourses around the 2016 Ukraine blackout. Eur. Secur. 2023, 32, 104–124. [Google Scholar] [CrossRef]
- Eisen, J.B. Who Regulates the Smart Grid: FERC’s Authority over Demand Response Compensation in Wholesale Electricity Markets. San Diego J. Clim. Energy L. 2012, 4, 69. [Google Scholar]
- Gopstein, A.; Nguyen, C.; O’Fallon, C.; Hastings, N.; Wollman, D. NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 4.0; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2021. [Google Scholar]
- Casa. EMH Metering. 4 May 2024. Available online: https://emh-metering.com/en/products/smart-meter-gateway/casa/ (accessed on 4 May 2024).
- Xiaomi. Smart-Home-Hub-2-Xiaomi UK. 4 May 2024. Available online: https://www.mi.com/uk/product/xiaomi-smart-home-hub-2/ (accessed on 4 May 2024).
- Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
- Park, B.; Kim, J.; McNair, J. ISAS: AAA Protocol-based Handover and Improved Security Methodology through the Integration Security Authentication System Constitute. IEIE Trans. Smart Process. Comput. 2023, 12, 358–367. [Google Scholar] [CrossRef]
- Blanchet, B.; Smyth, B.; Cheval, V.; Sylvestre, M. ProVerif 2.05: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial. 2023. Available online: https://bblanche.gitlabpages.inria.fr/proverif/manual.pdf (accessed on 4 May 2024).
- Kim, K.; Ryu, J.; Lee, H.; Lee, Y.; Won, D. Distributed and Federated Authentication Schemes Based on Updatable Smart Contracts. Electronics 2023, 12, 1217. [Google Scholar] [CrossRef]
- Kang, T.; Woo, N.; Ryu, J. Enhanced Lightweight Medical Sensor Networks Authentication Scheme Based on Blockchain. IEEE Access 2024, 12, 35612–35629. [Google Scholar] [CrossRef]
- Kim, K.; Ryu, J.; Lee, Y.; Won, D. An improved lightweight user authentication scheme for the internet of medical things. Sensors 2023, 23, 1122. [Google Scholar] [CrossRef]
- Liu, Y.; Cheng, C.; Gu, T.; Jiang, T.; Li, X. A lightweight authenticated communication scheme for smart grid. IEEE Sens. J. 2015, 16, 836–842. [Google Scholar] [CrossRef]
- Garg, S.; Kaur, K.; Kaddoum, G.; Rodrigues, J.J.; Guizani, M. Secure and lightweight authentication scheme for smart metering infrastructure in smart grid. IEEE Trans. Ind. Inform. 2019, 16, 3548–3557. [Google Scholar] [CrossRef]
Notations | Description |
---|---|
j-th smart meter | |
Neighborhood gateway | |
’s identification | |
i-th message for | |
Data report of i-th | |
, | Verification |
i-th secret key for | |
i-th random number for | |
h (, H ( | One-way hash function |
Concatenation operator | |
⊕ | Bitwise XOR operator |
, | Timestamp for and |
(*—-channels—-*) |
free privateChannel:channel [private]. |
free publicChannel:channel [private]. |
(*—-constants—-*) |
free ID:bitstring [private]. |
free N:bitstring [private]. |
(*—-shared key—-*) |
free K:bitstring [private]. |
(*—-functions—-*) |
fun xor(bitstring, bitstring):bitstring. |
fun concat(bitstring, bitstring):bitstring. |
fun h(bitstring):bitstring. |
fun H(bitstring):bitstring. |
equation forall a:bitstring, b:bitstring; xor(xor(a, b), b) = a. |
(*—-events—-*) |
event startfstS(bitstring). |
event endfstS(bitstring). |
event startfstN(bitstring). |
event endfstN(bitstring). |
event start2ndS(bitstring). |
event end2ndS(bitstring). |
event start2ndN(bitstring). |
event end2ndN(bitstring). |
(*—-SMj process—-*) |
let SMj = |
out(privateChannel, (ID)); |
in(privateChannel, (XK:bitstring)); |
event startfstS(ID); |
in(publicChannel, (XA:bitstring, XV:bitstring, XT:bitstring, XXID:bitstring, Xr:bitstring)); |
let P = xor(xor(XA, XK), XA) in |
let Xm = xor(P, Xr) in |
let XXV = H(concat(concat(Xm, Xr), concat(concat(XXID, XT), XK))) in |
event endfstS(ID); |
event start2ndS(ID); |
if XV = XXV then |
new Tj:bitstring; |
new D:bitstring; |
let E = xor(xor(concat(h(Xr), h(XK)), D), XK) in |
let newK = H(concat(concat(Xr, XXID), concat(XT, XK))) in |
let Vp = H(concat(concat(Xm, Xr), concat(concat(XXID, Tj), newK))) in |
out(publicChannel,(E, Vp, Tj)); |
event end2ndS(ID). |
(*—-NG process—-*) |
let NG = |
in(privateChannel, (XID:bitstring)); |
out(privateChannel, (K)); |
event startfstN(N); |
new r:bitstring; |
new m:bitstring; |
new T:bitstring; |
let A = xor(xor(m, r), K) in |
let V = H(concat(concat(m, r), concat(concat(XID, T), K))) in |
out(publicChannel,(A, V, T, XID, r)); |
event endfstN(N); |
event start2ndN(N); |
in(publicChannel,(XE:bitstring, XVp:bitstring, XTj:bitstring)); |
let PP = xor(XE, K) in |
let XD = xor(PP, concat(h(r), h(K))) in |
let XnewK = H(concat(concat(r, XID), concat(T, K))) in |
let XXVp = H(concat(concat(m, r), concat(concat(XID, XTj), XnewK))) in |
if XVp = XXVp then |
event end2ndN(N). |
Query inj-event(endfstS(IDj)) ==> inj-event(startfstS(IDj)) is true. |
Query inj-event(end2ndS(IDj)) ==> inj-event(start2ndS(IDj)) is true. |
Query inj-event(endfstN(IDj)) ==> inj-event(startfstN(IDj)) is true. |
Query inj-event(end2ndN(IDj)) ==> inj-event(start2ndN(IDj)) is true. |
Query not attacker(K[]) is true. |
(*—-queries—-*) |
query IDj:bitstring; inj-event(endfstS(IDj)) ==> inj-event(startfstS(IDj)). |
query IDj:bitstring; inj-event(end2ndS(IDj)) ==> inj-event(start2ndS(IDj)). |
query IDj:bitstring; inj-event(endfstN(IDj)) ==> inj-event(startfstN(IDj)). |
query IDj:bitstring; inj-event(end2ndN(IDj)) ==> inj-event(start2ndN(IDj)). |
query attacker(K). |
(*—-process—-*) |
process |
((!SMj)|(!NG)) |
Security Features | Sureshkumar et al. [7] | Garg et al. [33] | Hu et al. [5] | Aghapour et al. [10] | Ours |
---|---|---|---|---|---|
Provide Mutual Authentication | O | O | O | O | O |
Resist Replay Attack | O | O | O | O | O |
Resist Smart Meter Impersonation Attack | O | O | O | O | O |
Resist Extraction of the Secret Key | O | O | O | O | O |
Resist Inferrability of the Message | O | O | O | X | O |
Resist Message Altering | O | O | O | X | O |
Resist Injection Attack | O | O | O | O | O |
Provide Forward Secrecy | O | O | O | O | O |
Provide One-time Pad Key | X | O | O | O | O |
Resist Man-in-the-Middle Attack | O | O | O | X | O |
Item | Value |
---|---|
CPU | Intel(R) Core(TM) i7-8565U CPU @ 1.80 GHz 1.99 GHz (Intel, Santa Clara, CA, USA) |
RAM | 16.0 GB |
OS | Windows 10 Home |
Software | JDK 17 |
Security level | secp521r1 ECC |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kook, S.; Kim, K.; Ryu, J.; Lee, Y.; Won, D. Lightweight Hash-Based Authentication Protocol for Smart Grids. Sensors 2024, 24, 3085. https://doi.org/10.3390/s24103085
Kook S, Kim K, Ryu J, Lee Y, Won D. Lightweight Hash-Based Authentication Protocol for Smart Grids. Sensors. 2024; 24(10):3085. https://doi.org/10.3390/s24103085
Chicago/Turabian StyleKook, Sangjin, Keunok Kim, Jihyeon Ryu, Youngsook Lee, and Dongho Won. 2024. "Lightweight Hash-Based Authentication Protocol for Smart Grids" Sensors 24, no. 10: 3085. https://doi.org/10.3390/s24103085
APA StyleKook, S., Kim, K., Ryu, J., Lee, Y., & Won, D. (2024). Lightweight Hash-Based Authentication Protocol for Smart Grids. Sensors, 24(10), 3085. https://doi.org/10.3390/s24103085