Emas: an efficient MLWE-based authentication scheme for advanced metering infrastructure in smart grid environment

被引:0
作者
Chikouche, Noureddine [1 ]
Mezrag, Fares [1 ]
Hamza, Rafik [2 ]
机构
[1] Laboratory of Informatics and Its Applications of M’Sila, University of M’Sila, University pole, Bordj Bou Arreridj road, M’Sila
[2] Institute for International Strategy, Tokyo International University, Tokyo
关键词
Authentication; Key agreement; MLWE; Smart grid;
D O I
10.1007/s12652-024-04852-5
中图分类号
学科分类号
摘要
Advanced metering infrastructure (AMI) plays a critical role in the smart grid by integrating metering systems with communication capabilities, especially for the industrial internet of things. However, existing authentication protocols have proven ineffective against quantum computing attacks and are computationally intensive since AMI contains limited computing components, such as smart meters. In this paper, we present a novel, efficient module learning with errors-based authentication and key agreement system for AMI, which we call EMAS. As part of the security measures of EMAS, Kyber Post-Quantum Public Key Encryption, a one-time pad mechanism, and hash functions are used. A formal and informal analysis of the security features is presented, showing that the proposed system is secure and resistant to known attacks. The performance analysis of our proposed EMAS on a B-L475E-IOT01A node equipped with a ARM Cortex M4 microcontroller shows that EMAS is more efficient than existing relevant schemes. About the computation time, EMAS takes 15.693 ms. This result is lower than other existing relevant schemes. © The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2024.
引用
收藏
页码:3759 / 3775
页数:16
相关论文
共 49 条
[1]  
Abbasinezhad-Mood D., Nikooghadam M., Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications, Future Gener Comput Syst, 84, pp. 47-57, (2018)
[2]  
Adjih C., Baccelli E., Fleury E., Harter G., Mitton N., Noel T., Pissard-Gibollet R., Saint-Marcel F., Schreiner G., Vandaele J., Et al., Fit iot-lab: A large scale open experimental iot testbed, In: 2015 IEEE 2Nd World Forum on Internet of Things (Wf-Iot)., pp. 459-464, (2015)
[3]  
Agrahari A.K., Varma S., A provably secure rfid authentication protocol based on ecqv for the medical internet of things, Peer-to-Peer Netw Appl, 14, 3, pp. 1277-1289, (2021)
[4]  
Ajiboye P.O., Agyekum K.O.B.O., Frimpong E.A., Privacy and security of advanced metering infrastructure (ami) data and network: a comprehensive review, J Eng Appl Sci, 71, 1, pp. 1-30, (2024)
[5]  
Aranha D.F., Gouvea C.P.L., Markmann T., Wahby R.S., Liao K., RELIC is an Efficient Library for Cryptography, (2020)
[6]  
TrustZone for Cortex-M. [Online]., (2022)
[7]  
Armando A., Basin D., Boichut Y., Chevalier Y., Compagna L., Cuellar J., Drielsma P.H., Heam P.C., Kouchnarenko O., Mantovani J., Modersheim S., von Oheimb D., Rusinowitch M., Santiago J., Turuani M., Vigano L., Vigneron L., The AVISPA tool for the automated validation of internet security protocols and applications, International Conference on Computer Aided Verification. Springer, pp. 281-285, (2005)
[8]  
Avanzi R., Bos J., Ducas L., Kiltz E., Lepoint T., Lyubashevsky V., Schanck J.M., Schwabe P., Seiler G., Stehle D., Crystals-Kyber Algorithm Specifications and Supporting Documentation (Version 3.02). round 3 Submission to the NIST PQC Project, (2021)
[9]  
Baccelli E., Gundogan C., Hahm O., Kietzmann P., Lenders M.S., Petersen H., Schleiser K., Schmidt T.C., Wahlisch M., Riot: an open source operating system for low-end embedded devices in the iot, IEEE Internet Things J, 5, 6, pp. 4428-4440, (2018)
[10]  
Baghestani S.H., Moazami F., Tahavori M., Lightweight authenticated key agreement for smart metering in smart grid, IEEE Syst J, 16, 3, pp. 4983-4991, (2022)