Next Article in Journal
Validity of the Fama-French Three- and Five-Factor Models in Crisis Settings at the Example of Select Energy-Sector Companies during the COVID-19 Pandemic
Previous Article in Journal
The Unfolding: Origins, Techniques, and Applications within Discrete Event Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids

1
Faculty of Computer Engineering, Shahid Rajaee Teacher Training University, Tehran 16788-15811, Iran
2
Electrical Engineering Department, Shahid Rajaee Teacher Training University, Tehran 16788-15811, Iran
3
Department of Information Systems, College of Economics and Political Science, Sultan Qaboos University, Al Khoudh, Muscat P. C. 123, Oman
4
School of Computing and Creative Technologies, College of Arts, Technology and Environment (CATE), University of the West of England, Frenchay Campus, Coldharbour Lane, Bristol BS16 1QY, UK
5
Department of Information Technology, University of Human Development, Sulaymaniyah 0778-6, Iraq
6
Pattern Recognition and Machine Learning Lab, Gachon University, 1342 Seongnamdaero, Sujeong-gu, Seongnam 13120, Republic of Korea
7
John von Neumann Faculty of Informatics, Obuda University, 1034 Budapest, Hungary
8
Institute of Information Engineering, Slovak University of Technology in Bratislava, 81243 Bratislava, Slovakia
9
Institute of the Information Society, University of Public Service, 1083 Budapest, Hungary
*
Authors to whom correspondence should be addressed.
Mathematics 2023, 11(1), 48; https://doi.org/10.3390/math11010048
Submission received: 5 October 2022 / Revised: 13 December 2022 / Accepted: 15 December 2022 / Published: 23 December 2022

Abstract

:
Authentication protocols are often used in smart grids to deliver the necessary level of security. A huge number of clients in such a system, however, provides the attacker with the ability to clone them, for example. Device fingerprints, or Physically Unclonable Functions (PUF), have been investigated as an authentication feature to thwart such attacks. In order to accomplish the necessary security in smart grid neighborhood area network communications and to prevent unwanted physical access to smart meters, a former study designed a lightweight authentication system in this way. The suggested protocol uses PUFs to reduce physical attacks. As a consequence, the server/meter impersonation attack is one of the many assaults that this protocol is thought to be secure against. On the other hand, it is generally acknowledged that no security solution should be trusted unless its security has been verified by independent researchers. As a result, this paper assesses the security of this protocol against a typical adversary who has access to or influences over the messages carried over the public channel. This study demonstrates that the attacker is simply capable of impersonating the server for the meter and vice versa. In addition, the suggested attacks desynchronize them, making the adversary the only one capable of interacting with the meter in the role of the legal server rather than the latter. Each of the proposed attacks is extremely effective, and their success probability is almost 1. Finally, a modification is suggested that successfully fixes the protocol’s security weaknesses. The security proof of the improved protocol has been done through the Scyther tool. The computational cost comparison shows that the overhead of the proposed protocol compared to the former scheme is 4.85%, while it withstands various attacks, including traceability, desynchronization, impersonation, man-in-the-middle, and secret disclosure attacks.

1. Introduction

Smart grids play an important role in smart cities and are a promising technology for improving power system reliability, flexibility, and efficiency. Information and communication technologies are the basic infrastructure in a smart grid. However, assuming that the network is accessed and controlled by adversaries, this technology poses significant risks. To overcome such disadvantages, authentication protocols play an important role in determining whether a user is a friend or foe. An authentication protocol is a series of information exchanges between two or more parties to determine whether a specific party is legitimate or not. In distributed systems, such as Internet of Things (IoT) systems and smart grids, edge clients/devices are distributed throughout the field. Hence, it could not be possible to use physical protection in many cases, and, as a result, they are vulnerable to adversarial access. Such an adversary, for example, may read their memory and attempt to clone them. If there is a human involved in the authentication process, it is possible to use other factors to provide a higher level of security. Smart card-based user name and password, for example, may be used to increase the security in that case [1,2,3,4] or the user’s biometrics [5,6,7,8]. However, the main challenge for employing multifactor authentication for many embedded devices, such as smart meters, is the fact that they should work 24/4 and be independent of the operator in many cases. Hence, researchers find a dual fingerprint for devices, which is known as a physically unclonable function (PUF) [9,10,11,12,13,14]. Although it could be a promising solution (assuming that PUFs behave fully reliable and randomly), the response is not entirely random, and the proposed protocol could be a target of modeling attacks [15,16,17,18,19], if the adversary accesses the PUF’s input/output.

1.1. Motivation

Following the provided argument, to realize their full potential, smart grid applications require a dependable, lightweight, and fast authentication system [20]. One of the most difficult security challenges in the smart grid is protecting the meters, as well as embedded devices in general, from security breaches that could have disastrous consequences [21]. Among the various proposals to improve the security of smart grids, those that consider physical access to meters are more realistic and can achieve a higher level of security [22]. The reason is that the meters are distributed throughout the field, and an adversary can always access them to read their memory, for example, to clone them. As a result, security based on stored credentials could not withstand attacks based on such access. A common approach to providing security against this type of attack is multi-factor authentication, and among various approaches, using a physically unclonable function (PUF) as a hardware fingerprint has recently received a lot of attention [22]. However, such a solution should provide sufficient security requirements to be applicable to transferring sensitive data.

1.2. Challenge

A former study proposed a lightweight mutual authentication for smart grid neighborhood area network communications based on PUF [23]. Designers provided formal and informal security analysis and claimed protection against a variety of attacks, including impersonation. However, this protocol, similar to any other security solution, should be investigated independently to highlight its pros and cons. To the best of our knowledge, no independent detailed security analysis for this protocol has been reported in the literature. Hence, this paper is aimed at addressing this shortage by shedding light on its security.

1.3. Our Contribution

The main contribution of this paper is to shed light on the security of a PUF-based authentication protocol for smart grid applications, which has been recently proposed in a former study [23]. Although the protocol is very lightweight and has several interesting features that make it a good candidate for the target application, this paper shows that the adversary can easily impersonate the server or the meter and can also desynchronize them permanently. Following the proposed attack in this paper, the adversary could be the only entity that can communicate with the meter as the legitimate server. In addition, an amendment is proposed that effectively addresses the protocol’s security flaws.

1.4. Related Works

Following the protocol discussed in this paper, i.e., [23], nearly the same team of authors [24,25,26] and other researchers [27,28] proposed or analyzed new related schemes, which are worth noting in this section to highlight later advances in this field of research. Among those studies, [26] dedicated to designing a PUF on an FPGA. They specifically proposed an FPGA-based Anderson PUF and tested it on Spartan-6 family Xilinx XC6SLX9 FPGAs. Their finding shows that the proposed structure increases the unpredictability of the designed PUF while decreasing the required area overhead. Aghapour et al. proposed a lightweight protocol [25] that provides mutual authentication using a hash function as the main cryptographic primitive. Although the proposed protocol considered smart grid neighborhood area network communications, it does not employ PUF and by nature, any node can tamper with such an application. In addition, one of the messages is computed as ( ( m i j r i j ) r i j ) k i j where r i j is a random value, m i j is a data packet, and k i j is the latest shared key. The shared key is updated after each successful session, first by the smart meter SM j and then by the gateway NG. However, assuming the adversary allows SM j to receive the message properly and update its session key to k i + 1 j but blocks the sent message to NG, then they desynchronized because SM j does not keep a copy of k i j . Even in that case, the protocol does not provide full security of k i j if it is assumed m i j has enough low entropy and can be predicted by the adversary because m i j r i j r i j = m i j . Hence the expected complexity of finding k i + 1 j is m i n ( 2 H ( m i j ) + 1 2 H ( K i j ) , H ( K i j ) ) while it should be H ( K i j ) , where H ( · ) denotes the entropy function. In a later research, Aghapour et al. [24] proposed another protocol for smart grid applications that again uses the hash function to provide desired security. An interesting feature of this protocol is the use of a hash key chain to provide forward secrecy. However, if the adversary has access to SM j , it can tamper with it. In addition, in this protocol, the NG’s command is sent in plain text, which may not be desirable in some applications. Baghestani et al. [27] recently examined the security of a proposed authentication protocol by Kumar et al. [29] and demonstrated that smart meters are traceable in that protocol. Besides that, they proposed an elliptic curve cryptography (ECC)-based authentication protocol for smart grid applications. However, ECC is very time-consuming and may not be applicable in constrained environments. In addition, it also does not provide security against cloning attacks because it does not use PUF. Moreover, it can not withstand advanced attacks such as key compromise impersonation. Among the most recent research in this field is [30], which proposes a lightweight PUF-based authentication protocol for smart grid applications. Although the proposed protocol has interesting features compared to other related works such as [31,32], it has two important drawbacks. First, in a part of the protocol, the meter identifier is sent over a public channel plain, which is enough to trace it and compromise its anonymity. The second drawback is sending the PUF’s response to the network gateway. Hence, it could be a target for modeling attack by an insider.
Therefore, there is still enough room to do research in this field and design a secure protocol for smart grid applications. On the other hand, any new protocol should be evaluated by third parties to ensure its security, which emphasizes the necessity of this research and other related works.

1.5. Paper Organization

In the remainder of this article, the necessary notations and a description of the former protocol are provided in Section 2. Then, in Section 3, the conducted attacks against this protocol are introduced. In Section 4, the improved protocol and its evaluation are presented. Finally, the paper is concluded in Section 6.

2. Review of Former Scheme

Each phase of the former protocol, which has been proposed by Kaveh and Mosavi [23] and we call it KM-protocol, is briefly explained in the following section, using the list of notations in Table 1.
As previously stated, KM-protocol is a lightweight authentication protocol for smart grids. The proposed protocol takes into account a neighborhood area network (NAN) in which a neighborhood gateway (NG) collects electricity data from hundreds of smart meters (SM). To gain a better understanding of the PUF-based KM-protocol, it is explained how it works in this section, and then its vulnerabilities are shown in the following section. The KM-protocol is divided into two phases: secure installation and secure communication. Secure Installation Phase: A smart meter must be registered by a neighborhood gateway before communication begins. As a result, the smart meter first sends I D j and a C R P = ( C i , R i ) from the PUF function to NG, where R i = PUF j ( C i ) . This data is saved in the database of the NG. As a result, the NG can use them in the authentication process, and the SM j deletes C R P from its memory.
Secure communication Phase: The following are the steps in the authentication process:
  • Step one:
    1.
    The I D j of the SM j is sent to the NG.
  • Step two: The NG searches its database for a field that matches the I D j received. If a duplicate item is discovered, then:
    1.
    It obtains the associated C R P = ( C i , R i ) for the received I D j and generates two random numbers, r N 1 and r N 2 .
    2.
    Then A and V are calculated as A = R i ( ( r N 1 T S NG ) r N 2 ) and V = h ( R i ( T S NG r N 1 ) ( r N 2 I D j ) ) , where T S NG is the timestamp of NG.
    3.
    NG replies { A , V , C i } to SM j .
  • Step three: Upon receiving the messages, given C i , the SM j calculates R i = PUF j ( C i ) and obtains r N 1 and r N 2 from A R i , where T S N S should be almost similar with the SM j ’s timestamp T S j . Afterwards, given r N 1 and r N 2 , it verifies V and if the verification is passed:
    1.
    By generating a random number r SM , SM j calculates a new challenge as C i + 1 = h ( r SM , r N 2 ) .
    2.
    Based on the new response h ( R i + 1 ) = h ( PUF j ( C i + 1 ) ) , it generates S = ( h ( R i + 1 ) ( T S j r N 1 ) ) R i ) .
    3.
    Then SM j computes E and V as E = ( D j ( r N 1 r SM ) ) R i and V = h ( h ( R i + 1 ) ( T S j I D j ) ( r SM D j ) ) .
    4.
    Finally it transfers { E , S , V } to NG and deletes all stored variables.
  • Step four: After receiving the messages, by using R i the NG obtains r SM , D j and h ( R i + 1 ) . Then in order to verify V , it computes h ( h ( R i + 1 ) ( T S NG I D j ) ( r SM D j ) ) . If the verification holds, the NG:
    1.
    Compares D j with the existing report format. If the comparison holds, it accepts the messages.
    2.
    NG calculates C i + 1 = h ( r SM , r N 2 ) as the new challenge and saves ( C i + 1 , h ( R i + 1 ) ) as a new CRP for the next authentication process.
    3.
    It accepts all messages and finishes a successful mutual authentication process.
Because the KM-protocol employs the concatenation (‖) and XOR (⊕) operations in its computation, the given property in Equation (1) is recalled:
( x y ) ( u v ) = ( x u ) ( y v )
where x, y, u, and v are appropriate strings. This property is used in the proposed analysis.

3. Cryptanalysis of KM-Protocol

Although the designer of the KM-protocol [23] claimed optimum security against various attacks in the context, important attacks against the KM-protocol are presented in this section using the same adversarial model and an ideal PUF model. More specifically, assuming that the adversary eavesdrops and stores the sent messages from NG to SM j , i.e., A = R i ( ( r N 1 T S NG ) r N 2 and V = h ( R i ( ( T S NG r N 1 ) ( r N 2 I D j ) . The timestamp in this message is T S NG , which is known to all participants, including the adversary. Furthermore, assuming the adversary intends to impersonate NG to SM j at a desired time T S NG , it computes A = A ( Δ T S NG Δ T S NG ) and sends A , V , C i to SM j when SM j sends its I D j , where Δ T S = T S NG T S NG . It is obvious that:
A = R i ( ( r N 1 T S NG ) r N 2 ) ( Δ T S Δ T S ) = R i ( ( r N 1 T S NG ( T S NG T S NG ) ( r N 2 Δ T S ) ) = R i ( ( r N 1 T S NG ) ( r N 2 Δ T S ) )
After receiving the message, given C i , the SM j calculates R i and obtains r N 1 = r N 1 and r N 2 = r N 2 Δ T S from A R i , and verifies whether:
V ? = h ( R i ( ( T S NG r N 1 ) ( r N 2 I D j ) ) ) = h ( R i ( ( T S NG r N 1 ) ( ( r N 2 Δ T S ) I D j ) ) ) = h ( R i ( ( ( T S NG Δ T S ) r N 1 ) ( r N 2 I D j ) ) = h ( R i ( ( T S NG r N 1 ) ( r N 2 I D j ) ) ) = V
As a result, following Equations (2) and (3), the adversary will be authenticated by SM j with a probability of ‘1’, at any time T S NG . It shows that, contrary to what the designers claim, the KM-protocol is vulnerable to impersonation attacks.
Next, a SM j impersonation attack is proposed that will desynchronize both SM j and NG. Consider a valid session between SM j and NG in which SM j sends its I D j to NG and receives { C i , A , V } and again SM j computes and transfers { E , S , V } . The adversary stores I D j , { C i , A , V } and { E , S , V } but prevents NG form receiving { E , S , V } , where S = ( R i + 1 ( T S NG r N 1 ) ) R i ) , E = ( D j ( r N 1 r SM ) ) R i and V = h ( R i + 1 ( T S NG I D j ) ( r SM D j ) ) . As a result, NG does not update its C P R ( C i , R i ) record. The adversary then does the following procedure:
1.
Sends I D j to NG.
2.
NG retrieves the related C R P ( C i , R i ) and generates r N 1 and r N 2 and computes A ^ = R i ( ( r N 1 T S NG ) r N 2 and V = h ( R i ( ( T S NG r N 1 ) ( r N 2 I D j ) and replies { A , V , C i } to the SM j , which is impersonated by the adversary.
3.
The adversary computes A ^ A = ( ( r N 1 r N 1 ) ( T S NG T S NG ) ) ( r N 2 r N 2 ) . Given that timestamp is a public value, the adversary can compute Δ T S = T S NG T S and extract Δ 1 = r N 1 r N 1 and Δ 2 = r N 2 r N 2 from A ^ A . Next, the adversary computes S ^ = S ( Δ T S Δ 1 ) , E ^ = E ( 0 ( Δ T S Δ 1 ) ) and returns { E ^ , S ^ , V } to NG.
4.
NG obtains r SM as follows:
r SM = ( E ^ R i ) L S W r N 1 = ( ( r N 1 r SM ) ) ( R i ) L S W ) ( Δ T S Δ 1 ) ( R i ) L S W ) r N 1 = ( ( r N 1 r SM ) ) ( Δ T S r N 1 r N 1 ) r N 1 = r SM Δ T S
It also obtains R i + 1 as follows:
R i + 1 = S ^ ( T S NG r N 1 ) R i = ( R i + 1 ( T S NG r N 1 ) ) R i ) ( Δ T S Δ 1 ) ( T S NG r N 1 ) R i = R i + 1
and verifies whether:
V ? = h ( R i + 1 ( T S NG I D j ) ( r SM D j ) ) = h ( R i + 1 ( T S NG I D j ) ( ( r SM Δ T ) D j ) ) (6) = h ( R i + 1 ( ( T S NG Δ T ) I D j ) ( ( r SM ) D j ) ) = h ( R i + 1 ( T S NG I D j ) ( r SM D j ) ) (7) = V
Following the driven values in Equations (4) and (5), the verification of Equation (7) is successful, and the adversary is authenticated as a legitimate SM j , confirming that impersonation was successful.
Following the above attack, the adversary was successfully authenticated as a legitimate SM j . NG, on the other hand, calculates C i + 1 = h ( r SM , r N 2 ) as a new challenge, saves ( C i + 1 , R i + 1 ) as a new CRP for the next authentication process, and deletes C R P ( C i , R i ) from its database. It means that NG has a new C R P ( C i + 1 , R i + 1 ) that is almost certainly not a valid CPR for the embedded PUF within SM j . Therefore, NG is no longer recognized as valid by SM j , indicating that the adversary successfully desynchronized them. The adversary who stored A , V , and C i is now the only entity that can communicate with SM j as a result of the proposed NG impersonation attack.

4. Proposed Protocol

In this section, the KM-protocol is modified as little as possible to counter the proposed attack in this paper, and the security and efficiency of the revised protocol are discussed in comparison to the original protocol.

Suggested Remedy

The main reason for carrying out the proposed attacks is the adversary’s ability to manipulate messages via the XOR operation. Hence, to avoid the proposed attacks, it is recommended to overcome the adversary’s current control over the transferred messages.
To be more precise, similar to the KM-protocol, the improved protocol also includes two phases: secure installation and secure communication. The secure installation phase is unaffected by the revised protocol, except that ( C i , h ( R i ) ) are sent to the NG instead of the KM-protocol’s ( C i , R i ) . However, the steps in the authentication process (authentication phase) is revised as follows:
  • Step one:
    1.
    SM j sends its I D j to the NG, if it fails uses the I D j o l d .
  • Step two: NG looks up the C R P = ( C i , h ( R i ) ) associated with the received I D j and generates a random number r N . Following that, A and V are calculated as A = h ( R i ) r N and V = h ( h ( R i ) T S NG r N I D j ) , where T S NG is the NG timestamp. Then NG responds to SM j with A , V , C i , T S NG .
  • Step three: When the messages are received, SM j verifies the received T S NG and, given C i , calculates h ( R i ) = h ( PUF j ( C i ) ) and obtains r N = A h ( R i ) . Following that, it verifies V before generating a random number r SM in order to calculate a new challenge as C i + 1 = h ( r SM r N ) . Then it computes S = h ( R i + 1 ) h ( r N T S NG ) , E = ( D j r SM ) h ( r N h ( R i + 1 ) h ( R i ) T S NG ) , I D j n e w = h ( h ( R i + 1 ) C i + 1 ) and V = h ( h ( R i + 1 ) T S NG I D j n e w r SM D j C i + 1 ) . Finally it transfers { E , S , V } to NG, stores new I D j n e w = h ( h ( R i + 1 ) C i + 1 ) and deletes all stored variables, exclude I D j n e w and I D j o l d = I D j .
  • Step four: After receiving the messages, NG computes h ( R i + 1 ) = S h ( r N T S NG ) and ( D j r SM ) = E h ( r N h ( R i + 1 ) h ( R i ) T S NG ) , C i + 1 = h ( r SM r N ) and I D j n e w = h ( h ( R i + 1 ) C i + 1 ) . Next it verifies whether V = ? h ( h ( R i + 1 ) T S NG I D j n e w r SM D j C i + 1 ) to accept the messages. Then, NG stores I D j n e w and corresponding ( C i + 1 , h ( R i + 1 ) ) for the next authentication process.
The authentication phase of the improved protocol is depicted in Figure 1.

5. Security and Cost Evaluation of the Improved Protocol

When the computations of V and V in the KM-protocol and the proposed protocol are compared, it is clear that the main difference is that ⊕ is replaced with ‖ and C i + 1 is included in the computation of V . These changes successfully prevent the proposed attacks. Following this fix, it is extremely difficult to impersonate NG or SM j by replaying a message with a T S NG timestamp at another T S NG timestamp. Furthermore, any change in A, E, or S affects h ( R i + 1 ) or C i + 1 , and V is not verified by NG. Hence, the proposed meter impersonation attack will fail as well. On the other hand, the adversary cannot perform the proposed desynchronization attack if s/he cannot impersonate the meter SM j . In the rest of this section, the security of the proposed protocol is presented in more detail. Through the analysis, an active adversary with access to the transferred messages over the public channels, i.e., I D j , E , S , V , A , V , C i , T S NG , is considered, where:
A = h ( R i ) r N V = h ( h ( R i ) T S NG r N I D j ) S = h ( R i + 1 ) h ( r N T S NG ) E = ( D j r SM ) h ( r N h ( R i + 1 ) h ( R i ) T S NG ) V = h ( h ( R i + 1 ) T S NG I D j n e w r SM D j C i + 1 ) C i + 1 = h ( r SM r N ) I D j n e w = h ( h ( R i + 1 ) C i + 1 )

5.1. Replay Attack

Through a replay attack, the adversary aims to use an eavesdropped message from an early time at a later time to impersonate a protocol entity. The current timestamp is used in the computation of V = h ( h ( R i ) T S NG r N I D j ) and V = h ( h ( R i + 1 ) T S NG I D j n e w r SM D j C i + 1 in the proposed protocol, similar to the KM-protocol. Hence, this protocol does not suffer from replay attacks.

5.2. Impersonation Attack

Given that it is not feasible to do a replay attack; the adversary should manipulate the transferred messages to do a successful impersonation attack. In order to impersonate NG, the adversary must return a valid tuple ( A , V , C i , T S NG ) , which corresponds to the current timestamp T S N G . However, it is not possible to compute V = h ( h ( R i ) T S NG r N I D j ) without first knowing h ( R i ) = h ( PUF j ( C i ) ) . However, the only way to get that value is from A = h ( R i ) r N , which is masked by a new random value, or from the previous S = R i h ( r N T S NG ) , which is masked by r N once more. Hence, the adversary has no significant chance to impersonate NG. To impersonate SM, however, the adversary must return a valid set of E , S , and V for the given time T S NG . On the other hand, V = h ( h ( R i + 1 ) T S NG I D j n e w r SM D j C i + 1 ) and the adversary requires h ( R i + 1 ) = h ( PUF j ( C i + 1 ) ) to compute it. Given that the only way to get that value is via A = h ( R i ) r N or S = h ( R i + 1 ) h ( r N T S NG ) , that are masked, this protocol does not suffer from impersonation attacks.

5.3. Traceability and Anonymity

As long as the protocol’s entities have not participated in a successful session, I D j and C i remain unaffected in the proposed protocol, but they will be randomized in the next session as I D j n e w = h ( h ( R i + 1 ) C i + 1 ) and C i + 1 = h ( r SM r N ) . The adversary cannot track the target SM for an extended period of time because r SM and r N are also masked. Other parameters, such as E , S , V , A and V, are randomized by session-dependent ephemeral values and therefore cannot be traced. Hence, this protocol provides long-term untraceability.

5.4. Secret Disclosure Attack

In the proposed protocol, the secret parameter is the PUF’s response and it is masked by ephemeral values through different sessions, i.e., A = h ( R i ) r N and S = R i h ( r N T S NG ) . Hence, the adversary has no chance to retrieve the PUF’s response, which guarantees the protocol’s security against secret disclosure attacks.

5.5. Man-in-the-Middle Attack

If the adversary is able to change the transferred messages without being detected, then it has conducted a successful man-in-the-middle attack. The structure of V = h ( h ( R i ) T S NG r N I D j ) and V = h ( h ( R i + 1 ) T S NG I D j n e w r SM D j C i + 1 ) have been selected such that the integrity of the transferred messages is guaranteed. Therefore, the proposed protocol provides the desired security against man-in-the-middle attacks.

5.6. Permanent De-Synchronization Attack

To do a permanent desynchronization attack, the adversary should successfully do an impersonation attack or act as a man-in-the-middle. Following Section 5.2 and Section 5.5, the adversary has no chance to conduct such attacks. Hence, the proposed protocol resists permanent desynchronization attacks.

5.7. Modeling Attack

To do a modeling attack, the adversary needs access to several challenge/response pairs of the target PUF. Any adversary that monitors the channel has access to the challenges, but the responses are masked by ephemeral session-dependent values. Hence, such an adversary cannot model the embedded PUF. Because it has access to the exact response of PUF, a malicious NG can do this against the KM-protocol. However, in the proposed protocol, it has h ( R i ) , not the exact R i . Therefore, the proposed protocol does not suffer from a modeling attack.

5.8. Scyther

To verify the security of the proposed protocol formally, it has been modeled using SPDL and verified by the Scyther tool [33]. The evaluation results are represented in Figure 2, which confirms the security of the proposed protocol.

5.9. Cost Analysis

The computational cost of the improved protocol with KM-protocol and other related protocols for smart grids is compared and represented in this section. Through this analysis, T E / D , T H , T P U F , T G E N / R E C , and T E C C are used respectively to denote the computational time of a call to symmetric encryption/decryption, a one-way hash function, a PUF operation, the data generation and reproduction algorithm of the fuzzy extractor, and ECC point-multiplication. The expected time of those primitives is quoted from [30] and presented in Table 2, taking into account an embedded platform with a quad-core Cortex-A72 (ARM v8) 64-bit SoC at 1.5 GHz as NG and a MSP430FR5969 microcontroller as the meter. Since the PUF output is noisy, a fuzzy extractor should be used while regenerating the PUF response. Hence, to be fair, that time is added to the protocols whenever it is applicable, e.g., in the KM-protocol and the proposed protocol.
The details of each protocol computation and the approximate computation time based on the above-mentioned setup are provided in Table 3 and also depicted in Figure 3. Following the provided comparison, the overhead of the proposed protocol compared to the KM-protocol is only 4.85%, which is acceptable compared to the provided security level.

6. Conclusions

This paper proposes several successful and efficient attacks against a recently proposed PUF-based protocol for smart grid applications, i.e., KM-protocol. The adversary can impersonate any protocol party, such as NG or SM j , after monitoring a KM-protocol session and initiating another consequence session. Furthermore, following the proposed “SM” impersonation attack, “NG” and “SM” will be permanently desynchronized. The legitimate NG, on the other hand, can no longer communicate with the target SM j , whereas the adversary can communicate with SM j at any time.
Minor changes to the KM-protocol were proposed to counter the proposed attacks and remedy the KM-protocol, which almost entirely prevent the aforementioned flaws at insignificant extra cost when compared to the original protocol.
It is worth noting that the KM-protocol sends the meter identifier, i.e., I D j , over the public channel, which allows for a traceability attack and compromises the meter’s anonymity. This attack was taken into account in the proposed alternative; however, it is still possible to trace a meter as long as it has not participated in a successful session of the protocol. One simple solution is to mask its identifier in the first step, such as by sending S I D j = h ( I D j T S j ) . Although the such protocol provides anonymity in this manner, the outcome is not scalable. It is possible to revise the protocol to provide scalability as well, but this will increase the protocol’s cost, so it is left for future work.

Author Contributions

N.B.: Conceptualization, Methodology, Validation, Writing; M.S.: Experimentation, Validation, Writing—review & editing, S.A. Conceptualization, Methodology, Experimentation, Validation, Writing—review & editing, M.H.M.: Experimentation, Validation, review & editing, O.H.A.: Experimentation, Validation, Writing—review & editing; M.H.: Methodology, Designing, Experimentation, Validation, Supervision, Review, Funding & editing; A.H.M.: Experimentation, Designing, Validation, Writing—review & editing. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

For any supplementary material, please contact the corresponding authors.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
IoTInternet of Things
SGSmart Grid
NANNeighborhood Area Network
SMSmart Meter
NGNeighborhood Gateway
PUFPhysically Unclonable Function
C R P A Challenge-Response Pair
T S Timestamp
I D The unique identifier

References

  1. Juang, W.S.; Chen, S.T.; Liaw, H.T. Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards. IEEE Trans. Ind. Electron. 2008, 55, 2551–2556. [Google Scholar] [CrossRef]
  2. Tsai, J.L.; Lo, N.W.; Wu, T.C. Novel Anonymous Authentication Scheme Using Smart Cards. IEEE Trans. Ind. Inform. 2013, 9, 2004–2013. [Google Scholar] [CrossRef]
  3. Shunmuganathan, S.; Saravanan, R.D.; Palanichamy, Y. Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multiserver Environment. Can. J. Electr. Comput. Eng. 2015, 38, 20–30. [Google Scholar] [CrossRef]
  4. Odelu, V.; Das, A.K.; Goswami, A. A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1953–1966. [Google Scholar] [CrossRef]
  5. Badhib, A.; Alshehri, S.; Cherif, A. A Robust Device-to-Device Continuous Authentication Protocol for the Internet of Things. IEEE Access 2021, 9, 124768–124792. [Google Scholar] [CrossRef]
  6. Zhang, R.; Xiao, Y.; Sun, S.; Ma, H. Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications. IEEE Trans. Dependable Secur. Comput. 2019, 16, 625–634. [Google Scholar] [CrossRef]
  7. Ryu, J.; Oh, J.; Kwon, D.; Son, S.; Lee, J.; Park, Y.; Park, Y. Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System. IEEE Access 2022, 10, 11511–11526. [Google Scholar] [CrossRef]
  8. Liu, Z.; Guo, C.; Wang, B. A Physically Secure, Lightweight Three-Factor and Anonymous User Authentication Protocol for IoT. IEEE Access 2020, 8, 195914–195928. [Google Scholar] [CrossRef]
  9. Adeli, M.; Bagheri, N.; Martín, H.; Peris-Lopez, P. Challenging the security of “A PUF-based hardware mutual authentication protocol”. J. Parallel Distrib. Comput. 2022, 169, 199–210. [Google Scholar] [CrossRef]
  10. Cao, J.; Li, S.; Ma, R.; Han, Y.; Zhang, Y.; Li, H. RPRIA: Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices. IEEE Internet Things J. 2022, 9, 19174–19187. [Google Scholar] [CrossRef]
  11. Aminian Modarres, A.M.; Sarbishaei, G. An Improved Lightweight Two-Factor Authentication Protocol for IoT Applications. IEEE Trans. Ind. Inform. 2022, 1–11. [Google Scholar] [CrossRef]
  12. Cho, Y.; Oh, J.; Kwon, D.; Son, S.; Lee, J.; Park, Y. A Secure and Anonymous User Authentication Scheme for IoT-Enabled Smart Home Environments Using PUF. IEEE Access 2022, 10, 101330–101346. [Google Scholar] [CrossRef]
  13. Li, S.; Zhang, T.; Yu, B.; He, K. A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT. IEEE Sens. J. 2021, 21, 5487–5501. [Google Scholar] [CrossRef]
  14. Lounis, K.; Zulkernine, M. T2T-MAP: A PUF-Based Thing-to-Thing Mutual Authentication Protocol for IoT. IEEE Access 2021, 9, 137384–137405. [Google Scholar] [CrossRef]
  15. Xu, Y.; Lao, Y.; Liu, W.; Zhang, Z.; You, X.; Zhang, C. Mathematical Modeling Analysis of Strong Physical Unclonable Functions. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2020, 39, 4426–4438. [Google Scholar] [CrossRef]
  16. Shi, J.; Lu, Y.; Zhang, J. Approximation Attacks on Strong PUFs. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2020, 39, 2138–2151. [Google Scholar] [CrossRef]
  17. Zhang, J.; Shen, C.; Guo, Z.; Wu, Q.; Chang, W. CT PUF: Configurable Tristate PUF Against Machine Learning Attacks for IoT Security. IEEE Internet Things J. 2022, 9, 14452–14462. [Google Scholar] [CrossRef]
  18. Uddin, M.; Majumder, M.B.; Rose, G.S. Robustness Analysis of a Memristive Crossbar PUF Against Modeling Attacks. IEEE Trans. Nanotechnol. 2017, 16, 396–405. [Google Scholar] [CrossRef]
  19. Liu, J.; Zhao, Y.; Zhu, Y.; Chan, C.H.; Martins, R.P. A Weak PUF-Assisted Strong PUF With Inherent Immunity to Modeling Attacks and Ultra-Low BER. IEEE Trans. Circuits Syst. I Regul. Pap. 2022, 69, 4898–4907. [Google Scholar] [CrossRef]
  20. Patil, V.C.; Kundu, S. Realizing Robust, Lightweight Strong PUFs for Securing Smart Grids. IEEE Trans. Consumer Electron. 2022, 68, 5–13. [Google Scholar] [CrossRef]
  21. Boyapally, H.; Mathew, P.; Patranabis, S.; Chatterjee, U.; Agarwal, U.; Maheshwari, M.; Dey, S.; Mukhopadhyay, D. Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters. IEEE Trans. Dependable Secur. Comput. 2022, 19, 663–680. [Google Scholar] [CrossRef]
  22. Mall, P.; Amin, R.; Das, A.K.; Leung, M.T.; Choo, K.R. PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey. IEEE Internet Things J. 2022, 9, 8205–8228. [Google Scholar] [CrossRef]
  23. Kaveh, M.; Mosavi, M.R. A Lightweight Mutual Authentication for Smart Grid Neighborhood Area Network Communications Based on Physically Unclonable Function. IEEE Syst. J. 2020, 14, 4535–4544. [Google Scholar] [CrossRef]
  24. Aghapour, S.; Kaveh, M.; Martín, D.; Mosavi, M.R. An Ultra-Lightweight and Provably Secure Broadcast Authentication Protocol for Smart Grid Communications. IEEE Access 2020, 8, 125477–125487. [Google Scholar] [CrossRef]
  25. Aghapour, S.; Kaveh, M.; Mosavi, M.R.; Martín, D. An Ultra-Lightweight Mutual Authentication Scheme for Smart Grid Two-Way Communications. IEEE Access 2021, 9, 74562–74573. [Google Scholar] [CrossRef]
  26. Lotfy, A.; Kaveh, M.; Martín, D.; Mosavi, M.R. An Efficient Design of Anderson PUF by Utilization of the Xilinx Primitives in the SLICEM. IEEE Access 2021, 9, 23025–23034. [Google Scholar] [CrossRef]
  27. Baghestani, S.H.; Moazami, F.; Tahavori, M. Lightweight Authenticated Key Agreement for Smart Metering in Smart Grid. IEEE Syst. J. 2022, 16, 4983–4991. [Google Scholar] [CrossRef]
  28. Zerrouki, F.; Ouchani, S.; Bouarfa, H. PUF-based mutual authentication and session key establishment protocol for IoT devices. J. Ambient. Intell. Humaniz. Comput. 2022, 1–19. [Google Scholar] [CrossRef]
  29. Kumar, P.; Gurtov, A.V.; Sain, M.; Martin, A.P.; Ha, P.H. Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks. IEEE Trans. Smart Grid 2019, 10, 4349–4359. [Google Scholar] [CrossRef] [Green Version]
  30. Liu, F.; Yan, Y.; Sun, Y.; Liu, J.; Li, D.; Guan, Z. Extremely Lightweight PUF-based Batch Authentication Protocol for End-Edge-Cloud Hierarchical Smart Grid. Secur. Commun. Netw. 2022, 2022, 9774853. [Google Scholar] [CrossRef]
  31. Gope, P.; Sikdar, B. Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication. IEEE Trans. Smart Grid 2019, 10, 3953–3962. [Google Scholar] [CrossRef]
  32. Badar, H.M.S.; Qadri, S.; Shamshad, S.; Ayub, M.F.; Mahmood, K.; Kumar, N. An Identity Based Authentication Protocol for Smart Grid Environment Using Physical Uncloneable Function. IEEE Trans. Smart Grid 2021, 12, 4426–4434. [Google Scholar] [CrossRef]
  33. Cremers, C. CISPA. Available online: https://people.cispa.io/cas.cremers/publications/index.html (accessed on 17 December 2022).
Figure 1. Mutual authentication phase of proposed protocol.
Figure 1. Mutual authentication phase of proposed protocol.
Mathematics 11 00048 g001
Figure 2. Security evaluation of the proposed protocol using Scyther tool.
Figure 2. Security evaluation of the proposed protocol using Scyther tool.
Mathematics 11 00048 g002
Figure 3. Comparison of the computational cost of the proposed protocol and related protocols ( [GS,2019] [31]; [BQS+,2021] [32]; [LYS+,2022] [30]; [KM,2021] [23]; Ours: Figure 1).
Figure 3. Comparison of the computational cost of the proposed protocol and related protocols ( [GS,2019] [31]; [BQS+,2021] [32]; [LYS+,2022] [30]; [KM,2021] [23]; Ours: Figure 1).
Mathematics 11 00048 g003
Table 1. Used notations.
Table 1. Used notations.
Symbol                                                          Description
C i i t h challenge of PUF
R i The response to C i
C R P A challenge-response pair
T S Timestamp
SMSmart-meter
NGNeighborhood gateway
rRandom number
I D The unique identifier
h ( · ) One-way hash functions
A B Concatenation of the strings A and B
X L S W Assuming X = A B , X L S W = B
Bitwise XOR
rRandom number
D j Usage report of the SM j
Table 2. Cost comparison of different primitives in micro-second, when a Quad-core Cortex-A72 (ARM v8) 64 bit SoC 1. 5GHz as NG and a MSP430FR5969-microcontroller as the meter1 [30].
Table 2. Cost comparison of different primitives in micro-second, when a Quad-core Cortex-A72 (ARM v8) 64 bit SoC 1. 5GHz as NG and a MSP430FR5969-microcontroller as the meter1 [30].
PrimetiveSM ( μ s)NG ( μ s)
T E / D 83.7516.9
T H 26225.1
T P U F 22.50.5
T G E N 8912.81968
T R E C 32,891.88806
Table 3. Cost comparison of different protocols versus the proposed protocols.
Table 3. Cost comparison of different protocols versus the proposed protocols.
[31][32][30][23]0 urs
SMNGSMNGSMNGSMNGSMNG
E/D0000150000
H45394122366
PUF2010222 20
GEN0100020000
REC1010111010
Time34,389.82093.533,902.8225.934,473.5513,128.733,865.875.335,437.8150.6
Total36,483.334,128.747,602.2533,941.135,588.4
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Safkhani, M.; Bagheri, N.; Ali, S.; Hussain Malik, M.; Hassan Ahmed, O.; Hosseinzadeh, M.; Mosavi, A.H. Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids. Mathematics 2023, 11, 48. https://doi.org/10.3390/math11010048

AMA Style

Safkhani M, Bagheri N, Ali S, Hussain Malik M, Hassan Ahmed O, Hosseinzadeh M, Mosavi AH. Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids. Mathematics. 2023; 11(1):48. https://doi.org/10.3390/math11010048

Chicago/Turabian Style

Safkhani, Masoumeh, Nasour Bagheri, Saqib Ali, Mazhar Hussain Malik, Omed Hassan Ahmed, Mehdi Hosseinzadeh, and Amir H. Mosavi. 2023. "Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids" Mathematics 11, no. 1: 48. https://doi.org/10.3390/math11010048

APA Style

Safkhani, M., Bagheri, N., Ali, S., Hussain Malik, M., Hassan Ahmed, O., Hosseinzadeh, M., & Mosavi, A. H. (2023). Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids. Mathematics, 11(1), 48. https://doi.org/10.3390/math11010048

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop