PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks

被引:1
作者
Mehta, Prarthana J. [1 ]
Parne, Balu L. [1 ]
Patel, Sankita J. [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol SVNIT, Dept Comp Sci & Engn, Surat 395007, Gujarat, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 06期
关键词
Authentication; Fuzzy extractor; Physically unclonable function; Smart grid network; Security; Privacy; SECURITY; PROTOCOL; SCHEME;
D O I
10.1007/s10586-024-04395-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoTs) is a promising technology that combines communication and data networking. Integration of Smart Grids (SGs) and IoT will fulfill an increased demand for energy requirements by transforming the reliable and efficient traditional power grids. The SG enables bi-directional transmission between the Service Provider (SP) and Smart Meter (SM) to send and receive information regarding electricity consumption over a public channel. The public channel allows an adversary to intercept the information exchanged between them and tamper with the SM as it is installed outside which leads to forging or modification of the messages and privacy violation. In addition, the SM has limited computational and storage capacity. To protect SM privacy and securely communicate in the SG network, Physically Unclonable Functions (PUFs) based Authentication and Key Agreement (AKA) schemes were suggested in the literature. However, they may suffer from the machine learning modeling attack and several other security issues. Thus, we propose a finite state machine enabled controlled PUF based AKA (PF-AKA) Framework for the IoT based SG (IoT-SG) network. The PF-AKA framework is verified formally using the Real-or-Random (RoR) model, AVISPA tool, and BAN logic. It shows that PF-AKA achieves the security requirements along with protection from the SM physical and modeling attacks. The performance analysis is carried out and it represents that the PF-AKA yields competitive computation and communication costs compared to AKA schemes in the literature for the IoT-SG network.
引用
收藏
页码:8099 / 8117
页数:19
相关论文
共 50 条
  • [21] A Secure User Anonymity-Preserving Biometrics and PUF-Based Multiserver Authentication Scheme With Key Agreement in 5G Networks
    Xu, Deqin
    Bian, Weixin
    Li, Qingde
    Xie, Dong
    Zhao, Jun
    Hu, Yao
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 5170 - 5184
  • [22] A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
    Chen, Liquan
    Wang, Jinlong
    Yin, Bangwei
    Yu, Kunliang
    Han, Jinguang
    CHINA COMMUNICATIONS, 2023, 20 (05) : 198 - 216
  • [23] Provably Secure ECC-Based Authentication and Key Agreement Scheme for Advanced Metering Infrastructure in the Smart Grid
    Hu, Shunfang
    Chen, Yanru
    Zheng, Yilong
    Xing, Bin
    Li, Yang
    Zhang, Le
    Chen, Liangyin
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (04) : 5985 - 5994
  • [24] A Novel Smart Card Based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 813 - 832
  • [25] A New PUF-Based Protocol for Mutual Authentication and Key Agreement Between Three Layers of Entities in Cloud-Based IoMT Networks
    Modarres, Amir Masoud Aminian
    Anzabi-Nezhad, Nima S.
    Zare, Maryam
    IEEE ACCESS, 2024, 12 : 21807 - 21824
  • [26] Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks
    Najafi, Fatemeh
    Kaveh, Masoud
    Martin, Diego
    Reza Mosavi, Mohammad
    SENSORS, 2021, 21 (06) : 1 - 16
  • [27] RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications
    Safkhani, Masoumeh
    Bagheri, Nasour
    Kumari, Saru
    Tavakoli, Hamidreza
    Kumar, Sachin
    Chen, Jiahui
    IEEE ACCESS, 2020, 8 : 200851 - 200862
  • [28] On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
    Sun, Da-Zhi
    Gao, Yi-Na
    Tian, Yangguang
    SENSORS, 2023, 23 (14)
  • [29] Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme
    Bian, Weixin
    Gope, Prosanta
    Cheng, Yongqiang
    Li, Qingde
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 : 45 - 55
  • [30] BAKA: Biometric Authentication and Key Agreement Scheme Based on Fuzzy Extractor for Wireless Body Area Networks
    Zhang, Shiwen
    Yan, Ziwei
    Liang, Wei
    Li, Kuan-Ching
    Dobre, Ciprian
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (03) : 5118 - 5128