Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids
Abstract
:1. Introduction
1.1. Motivation
1.2. Challenge
1.3. Our Contribution
1.4. Related Works
1.5. Paper Organization
2. Review of Former Scheme
- Step one:
- 1.
- The of the is sent to the NG.
- Step two: The NG searches its database for a field that matches the received. If a duplicate item is discovered, then:
- 1.
- It obtains the associated for the received and generates two random numbers, and .
- 2.
- Then A and V are calculated as and , where is the timestamp of NG.
- 3.
- NG replies to .
- Step three: Upon receiving the messages, given , the calculates and obtains and from , where should be almost similar with the ’s timestamp . Afterwards, given and , it verifies V and if the verification is passed:
- 1.
- By generating a random number , calculates a new challenge as .
- 2.
- Based on the new response , it generates .
- 3.
- Then computes E and as and .
- 4.
- Finally it transfers to NG and deletes all stored variables.
- Step four: After receiving the messages, by using the NG obtains , and . Then in order to verify , it computes . If the verification holds, the NG:
- 1.
- Compares with the existing report format. If the comparison holds, it accepts the messages.
- 2.
- NG calculates as the new challenge and saves as a new CRP for the next authentication process.
- 3.
- It accepts all messages and finishes a successful mutual authentication process.
3. Cryptanalysis of KM-Protocol
- 1.
- Sends to NG.
- 2.
- NG retrieves the related and generates and and computes and and replies to the , which is impersonated by the adversary.
- 3.
- The adversary computes . Given that timestamp is a public value, the adversary can compute and extract and from . Next, the adversary computes , and returns to NG.
- 4.
- NG obtains as follows:It also obtains as follows:
4. Proposed Protocol
Suggested Remedy
- Step one:
- 1.
- sends its to the NG, if it fails uses the .
- Step two: NG looks up the associated with the received and generates a random number . Following that, A and V are calculated as and , where is the NG timestamp. Then NG responds to with .
- Step three: When the messages are received, verifies the received and, given , calculates and obtains . Following that, it verifies V before generating a random number in order to calculate a new challenge as . Then it computes , , and . Finally it transfers to NG, stores new and deletes all stored variables, exclude and .
- Step four: After receiving the messages, NG computes and , and . Next it verifies whether to accept the messages. Then, NG stores and corresponding for the next authentication process.
5. Security and Cost Evaluation of the Improved Protocol
5.1. Replay Attack
5.2. Impersonation Attack
5.3. Traceability and Anonymity
5.4. Secret Disclosure Attack
5.5. Man-in-the-Middle Attack
5.6. Permanent De-Synchronization Attack
5.7. Modeling Attack
5.8. Scyther
5.9. Cost Analysis
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
IoT | Internet of Things |
SG | Smart Grid |
NAN | Neighborhood Area Network |
SM | Smart Meter |
NG | Neighborhood Gateway |
PUF | Physically Unclonable Function |
A Challenge-Response Pair | |
Timestamp | |
The unique identifier |
References
- Juang, W.S.; Chen, S.T.; Liaw, H.T. Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards. IEEE Trans. Ind. Electron. 2008, 55, 2551–2556. [Google Scholar] [CrossRef]
- Tsai, J.L.; Lo, N.W.; Wu, T.C. Novel Anonymous Authentication Scheme Using Smart Cards. IEEE Trans. Ind. Inform. 2013, 9, 2004–2013. [Google Scholar] [CrossRef]
- Shunmuganathan, S.; Saravanan, R.D.; Palanichamy, Y. Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multiserver Environment. Can. J. Electr. Comput. Eng. 2015, 38, 20–30. [Google Scholar] [CrossRef]
- Odelu, V.; Das, A.K.; Goswami, A. A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1953–1966. [Google Scholar] [CrossRef]
- Badhib, A.; Alshehri, S.; Cherif, A. A Robust Device-to-Device Continuous Authentication Protocol for the Internet of Things. IEEE Access 2021, 9, 124768–124792. [Google Scholar] [CrossRef]
- Zhang, R.; Xiao, Y.; Sun, S.; Ma, H. Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications. IEEE Trans. Dependable Secur. Comput. 2019, 16, 625–634. [Google Scholar] [CrossRef]
- Ryu, J.; Oh, J.; Kwon, D.; Son, S.; Lee, J.; Park, Y.; Park, Y. Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System. IEEE Access 2022, 10, 11511–11526. [Google Scholar] [CrossRef]
- Liu, Z.; Guo, C.; Wang, B. A Physically Secure, Lightweight Three-Factor and Anonymous User Authentication Protocol for IoT. IEEE Access 2020, 8, 195914–195928. [Google Scholar] [CrossRef]
- Adeli, M.; Bagheri, N.; Martín, H.; Peris-Lopez, P. Challenging the security of “A PUF-based hardware mutual authentication protocol”. J. Parallel Distrib. Comput. 2022, 169, 199–210. [Google Scholar] [CrossRef]
- Cao, J.; Li, S.; Ma, R.; Han, Y.; Zhang, Y.; Li, H. RPRIA: Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices. IEEE Internet Things J. 2022, 9, 19174–19187. [Google Scholar] [CrossRef]
- Aminian Modarres, A.M.; Sarbishaei, G. An Improved Lightweight Two-Factor Authentication Protocol for IoT Applications. IEEE Trans. Ind. Inform. 2022, 1–11. [Google Scholar] [CrossRef]
- Cho, Y.; Oh, J.; Kwon, D.; Son, S.; Lee, J.; Park, Y. A Secure and Anonymous User Authentication Scheme for IoT-Enabled Smart Home Environments Using PUF. IEEE Access 2022, 10, 101330–101346. [Google Scholar] [CrossRef]
- Li, S.; Zhang, T.; Yu, B.; He, K. A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT. IEEE Sens. J. 2021, 21, 5487–5501. [Google Scholar] [CrossRef]
- Lounis, K.; Zulkernine, M. T2T-MAP: A PUF-Based Thing-to-Thing Mutual Authentication Protocol for IoT. IEEE Access 2021, 9, 137384–137405. [Google Scholar] [CrossRef]
- Xu, Y.; Lao, Y.; Liu, W.; Zhang, Z.; You, X.; Zhang, C. Mathematical Modeling Analysis of Strong Physical Unclonable Functions. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2020, 39, 4426–4438. [Google Scholar] [CrossRef]
- Shi, J.; Lu, Y.; Zhang, J. Approximation Attacks on Strong PUFs. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2020, 39, 2138–2151. [Google Scholar] [CrossRef]
- Zhang, J.; Shen, C.; Guo, Z.; Wu, Q.; Chang, W. CT PUF: Configurable Tristate PUF Against Machine Learning Attacks for IoT Security. IEEE Internet Things J. 2022, 9, 14452–14462. [Google Scholar] [CrossRef]
- Uddin, M.; Majumder, M.B.; Rose, G.S. Robustness Analysis of a Memristive Crossbar PUF Against Modeling Attacks. IEEE Trans. Nanotechnol. 2017, 16, 396–405. [Google Scholar] [CrossRef]
- Liu, J.; Zhao, Y.; Zhu, Y.; Chan, C.H.; Martins, R.P. A Weak PUF-Assisted Strong PUF With Inherent Immunity to Modeling Attacks and Ultra-Low BER. IEEE Trans. Circuits Syst. I Regul. Pap. 2022, 69, 4898–4907. [Google Scholar] [CrossRef]
- Patil, V.C.; Kundu, S. Realizing Robust, Lightweight Strong PUFs for Securing Smart Grids. IEEE Trans. Consumer Electron. 2022, 68, 5–13. [Google Scholar] [CrossRef]
- Boyapally, H.; Mathew, P.; Patranabis, S.; Chatterjee, U.; Agarwal, U.; Maheshwari, M.; Dey, S.; Mukhopadhyay, D. Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters. IEEE Trans. Dependable Secur. Comput. 2022, 19, 663–680. [Google Scholar] [CrossRef]
- Mall, P.; Amin, R.; Das, A.K.; Leung, M.T.; Choo, K.R. PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey. IEEE Internet Things J. 2022, 9, 8205–8228. [Google Scholar] [CrossRef]
- Kaveh, M.; Mosavi, M.R. A Lightweight Mutual Authentication for Smart Grid Neighborhood Area Network Communications Based on Physically Unclonable Function. IEEE Syst. J. 2020, 14, 4535–4544. [Google Scholar] [CrossRef]
- Aghapour, S.; Kaveh, M.; Martín, D.; Mosavi, M.R. An Ultra-Lightweight and Provably Secure Broadcast Authentication Protocol for Smart Grid Communications. IEEE Access 2020, 8, 125477–125487. [Google Scholar] [CrossRef]
- Aghapour, S.; Kaveh, M.; Mosavi, M.R.; Martín, D. An Ultra-Lightweight Mutual Authentication Scheme for Smart Grid Two-Way Communications. IEEE Access 2021, 9, 74562–74573. [Google Scholar] [CrossRef]
- Lotfy, A.; Kaveh, M.; Martín, D.; Mosavi, M.R. An Efficient Design of Anderson PUF by Utilization of the Xilinx Primitives in the SLICEM. IEEE Access 2021, 9, 23025–23034. [Google Scholar] [CrossRef]
- Baghestani, S.H.; Moazami, F.; Tahavori, M. Lightweight Authenticated Key Agreement for Smart Metering in Smart Grid. IEEE Syst. J. 2022, 16, 4983–4991. [Google Scholar] [CrossRef]
- Zerrouki, F.; Ouchani, S.; Bouarfa, H. PUF-based mutual authentication and session key establishment protocol for IoT devices. J. Ambient. Intell. Humaniz. Comput. 2022, 1–19. [Google Scholar] [CrossRef]
- Kumar, P.; Gurtov, A.V.; Sain, M.; Martin, A.P.; Ha, P.H. Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks. IEEE Trans. Smart Grid 2019, 10, 4349–4359. [Google Scholar] [CrossRef] [Green Version]
- Liu, F.; Yan, Y.; Sun, Y.; Liu, J.; Li, D.; Guan, Z. Extremely Lightweight PUF-based Batch Authentication Protocol for End-Edge-Cloud Hierarchical Smart Grid. Secur. Commun. Netw. 2022, 2022, 9774853. [Google Scholar] [CrossRef]
- Gope, P.; Sikdar, B. Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication. IEEE Trans. Smart Grid 2019, 10, 3953–3962. [Google Scholar] [CrossRef]
- Badar, H.M.S.; Qadri, S.; Shamshad, S.; Ayub, M.F.; Mahmood, K.; Kumar, N. An Identity Based Authentication Protocol for Smart Grid Environment Using Physical Uncloneable Function. IEEE Trans. Smart Grid 2021, 12, 4426–4434. [Google Scholar] [CrossRef]
- Cremers, C. CISPA. Available online: https://people.cispa.io/cas.cremers/publications/index.html (accessed on 17 December 2022).
Symbol | Description |
---|---|
challenge of PUF | |
The response to | |
A challenge-response pair | |
Timestamp | |
SM | Smart-meter |
NG | Neighborhood gateway |
r | Random number |
The unique identifier | |
One-way hash functions | |
Concatenation of the strings A and B | |
Assuming , | |
⊕ | Bitwise XOR |
r | Random number |
Usage report of the |
Primetive | SM (s) | NG (s) |
---|---|---|
83.75 | 16.9 | |
262 | 25.1 | |
22.5 | 0.5 | |
8912.8 | 1968 | |
32,891.8 | 8806 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Safkhani, M.; Bagheri, N.; Ali, S.; Hussain Malik, M.; Hassan Ahmed, O.; Hosseinzadeh, M.; Mosavi, A.H. Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids. Mathematics 2023, 11, 48. https://doi.org/10.3390/math11010048
Safkhani M, Bagheri N, Ali S, Hussain Malik M, Hassan Ahmed O, Hosseinzadeh M, Mosavi AH. Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids. Mathematics. 2023; 11(1):48. https://doi.org/10.3390/math11010048
Chicago/Turabian StyleSafkhani, Masoumeh, Nasour Bagheri, Saqib Ali, Mazhar Hussain Malik, Omed Hassan Ahmed, Mehdi Hosseinzadeh, and Amir H. Mosavi. 2023. "Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids" Mathematics 11, no. 1: 48. https://doi.org/10.3390/math11010048
APA StyleSafkhani, M., Bagheri, N., Ali, S., Hussain Malik, M., Hassan Ahmed, O., Hosseinzadeh, M., & Mosavi, A. H. (2023). Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids. Mathematics, 11(1), 48. https://doi.org/10.3390/math11010048