PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks

被引:1
作者
Mehta, Prarthana J. [1 ]
Parne, Balu L. [1 ]
Patel, Sankita J. [1 ]
机构
[1] Sardar Vallabhbhai Natl Inst Technol SVNIT, Dept Comp Sci & Engn, Surat 395007, Gujarat, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 06期
关键词
Authentication; Fuzzy extractor; Physically unclonable function; Smart grid network; Security; Privacy; SECURITY; PROTOCOL; SCHEME;
D O I
10.1007/s10586-024-04395-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoTs) is a promising technology that combines communication and data networking. Integration of Smart Grids (SGs) and IoT will fulfill an increased demand for energy requirements by transforming the reliable and efficient traditional power grids. The SG enables bi-directional transmission between the Service Provider (SP) and Smart Meter (SM) to send and receive information regarding electricity consumption over a public channel. The public channel allows an adversary to intercept the information exchanged between them and tamper with the SM as it is installed outside which leads to forging or modification of the messages and privacy violation. In addition, the SM has limited computational and storage capacity. To protect SM privacy and securely communicate in the SG network, Physically Unclonable Functions (PUFs) based Authentication and Key Agreement (AKA) schemes were suggested in the literature. However, they may suffer from the machine learning modeling attack and several other security issues. Thus, we propose a finite state machine enabled controlled PUF based AKA (PF-AKA) Framework for the IoT based SG (IoT-SG) network. The PF-AKA framework is verified formally using the Real-or-Random (RoR) model, AVISPA tool, and BAN logic. It shows that PF-AKA achieves the security requirements along with protection from the SM physical and modeling attacks. The performance analysis is carried out and it represents that the PF-AKA yields competitive computation and communication costs compared to AKA schemes in the literature for the IoT-SG network.
引用
收藏
页码:8099 / 8117
页数:19
相关论文
共 50 条
  • [41] A Robust ECC-Based Authentication and Key Agreement Protocol for 6G-Based Smart Home Environments
    Yuan, Minghua
    Tan, Haowen
    Zheng, Wenying
    Vijayakumar, P.
    Alqahtani, Fayez
    Tolba, Amr
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (18): : 29615 - 29627
  • [42] A puf-based three-party authentication key establishment scheme for fog-enabled smart home
    Yang, Huan
    Guo, Yajun
    Guo, Yimin
    PERVASIVE AND MOBILE COMPUTING, 2023, 95
  • [43] A New Efficient SIP Authentication and Key Agreement Protocol Based on Chaotic Maps and Using Smart Card
    Azrour, Mourade
    Ouanan, Mohammed
    Farhaoui, Yousef
    ICCWCS'17: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND WIRELESS COMMUNICATION SYSTEMS, 2017,
  • [45] Privacy-Preserving Fast Three-Factor Authentication and Key Agreement for IoT-Based E-Health Systems
    Zhang, Liping
    Zhu, Yue
    Ren, Wei
    Zhang, Yixin
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (02) : 1324 - 1333
  • [46] Provably Secure and Lightweight Authentication and Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks
    Awais, Syed Muhammad
    Wu Yucheng
    Mahmood, Khalid
    Alenazi, Mohammed J. F.
    Bashir, Ali Kashif
    Das, Ashok Kumar
    Lorenz, Pascal
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (12) : 21107 - 21116
  • [47] An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT
    Wu, Tsu-Yang
    Wu, Haozhi
    Kumari, Saru
    Chen, Chien-Ming
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (02)
  • [48] Securing Cloud-based Healthcare Applications with a Quantum-resistant Authentication and Key Agreement Framework
    Bahache, Anwar Noureddine
    Chikouche, Noureddine
    Akleylek, Sedat
    INTERNET OF THINGS, 2024, 26
  • [49] Blockchain-assisted authentication and key agreement scheme for fog-based smart grid
    Tomar, Ashish
    Tripathi, Sachin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01): : 451 - 468
  • [50] Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT
    Hu, Shunfang
    Jiang, Shaoping
    Miao, Qing
    Yang, Fan
    Zhou, Weihong
    Duan, Peng
    APPLIED SCIENCES-BASEL, 2024, 14 (08):