Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids

被引:5
作者
Safkhani, Masoumeh [1 ]
Bagheri, Nasour [2 ]
Ali, Saqib [3 ]
Hussain Malik, Mazhar [4 ]
Hassan Ahmed, Omed [5 ]
Hosseinzadeh, Mehdi [6 ]
Mosavi, Amir H. [7 ,8 ,9 ]
机构
[1] Shahid Rajaee Teacher Training Univ, Fac Comp Engn, Tehran 1678815811, Iran
[2] Shahid Rajaee Teacher Training Univ, Elect Engn Dept, Tehran 1678815811, Iran
[3] Sultan Qaboos Univ, Coll Econ & Polit Sci, Dept Informat Syst, Muscat 123, Oman
[4] Univ West England, Coll Arts Technol & Environm CATE, Sch Comp & Creat Technol, Coldharbour Lane, Bristol BS16 1QY, England
[5] Univ Human Dev, Dept Informat Technol, Sulaymaniyah 07786, Iraq
[6] Gachon Univ, Pattern Recognit & Machine Learning Lab, 1342 Seongnamdaero, Seongnam 13120, South Korea
[7] Obuda Univ, John von Neumann Fac Informat, H-1034 Budapest, Hungary
[8] Slovak Univ Technol Bratislava, Inst Informat Engn, Bratislava 81243, Slovakia
[9] Univ Publ Serv, Inst Informat Soc, H-1083 Budapest, Hungary
关键词
Internet of things; IoT; smart grid; smart city; key agreement; physically unclonable functions; security; MUTUAL AUTHENTICATION; ULTRA-LIGHTWEIGHT; PROVABLY SECURE; PROTOCOL; PUF; ROBUST;
D O I
10.3390/math11010048
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Authentication protocols are often used in smart grids to deliver the necessary level of security. A huge number of clients in such a system, however, provides the attacker with the ability to clone them, for example. Device fingerprints, or Physically Unclonable Functions (PUF), have been investigated as an authentication feature to thwart such attacks. In order to accomplish the necessary security in smart grid neighborhood area network communications and to prevent unwanted physical access to smart meters, a former study designed a lightweight authentication system in this way. The suggested protocol uses PUFs to reduce physical attacks. As a consequence, the server/meter impersonation attack is one of the many assaults that this protocol is thought to be secure against. On the other hand, it is generally acknowledged that no security solution should be trusted unless its security has been verified by independent researchers. As a result, this paper assesses the security of this protocol against a typical adversary who has access to or influences over the messages carried over the public channel. This study demonstrates that the attacker is simply capable of impersonating the server for the meter and vice versa. In addition, the suggested attacks desynchronize them, making the adversary the only one capable of interacting with the meter in the role of the legal server rather than the latter. Each of the proposed attacks is extremely effective, and their success probability is almost 1. Finally, a modification is suggested that successfully fixes the protocol's security weaknesses. The security proof of the improved protocol has been done through the Scyther tool. The computational cost comparison shows that the overhead of the proposed protocol compared to the former scheme is 4.85%, while it withstands various attacks, including traceability, desynchronization, impersonation, man-in-the-middle, and secret disclosure attacks.
引用
收藏
页数:14
相关论文
共 33 条
[1]   Challenging the security of "A PUF-based hardware mutual authentication protocol" [J].
Adeli, Morteza ;
Bagheri, Nasour ;
Martin, Honorio ;
Peris-Lopez, Pedro .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2022, 169 :199-210
[2]   An Ultra-Lightweight Mutual Authentication Scheme for Smart Grid Two-Way Communications [J].
Aghapour, Saeed ;
Kaveh, Masoud ;
Mosavi, Mohammad Reza ;
Martin, Diego .
IEEE ACCESS, 2021, 9 :74562-74573
[3]   An Ultra-Lightweight and Provably Secure Broadcast Authentication Protocol for Smart Grid Communications [J].
Aghapour, Saeed ;
Kaveh, Masoud ;
Martin, Diego ;
Mosavi, Mohammad Reza .
IEEE ACCESS, 2020, 8 :125477-125487
[4]   An Identity Based Authentication Protocol for Smart Grid Environment Using Physical Uncloneable Function [J].
Badar, Hafiz Muhammad Sanaullah ;
Qadri, Salman ;
Shamshad, Salman ;
Ayub, Muhammad Faizan ;
Mahmood, Khalid ;
Kumar, Neeraj .
IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (05) :4426-4434
[5]   A Robust Device-to-Device Continuous Authentication Protocol for the Internet of Things [J].
Badhib, Arwa ;
Alshehri, Suhair ;
Cherif, Asma .
IEEE ACCESS, 2021, 9 :124768-124792
[6]   Lightweight Authenticated Key Agreement for Smart Metering in Smart Grid [J].
Baghestani, Seyed Hamid ;
Moazami, Farokhlagha ;
Tahavori, Mahdi .
IEEE SYSTEMS JOURNAL, 2022, 16 (03) :4983-4991
[7]   RPRIA: Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices [J].
Cao, Jin ;
Li, Sheng ;
Ma, Ruhui ;
Han, Yuxi ;
Zhang, Yueyu ;
Li, Hui .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (19) :19174-19187
[8]   A Secure and Anonymous User Authentication Scheme for IoT-Enabled Smart Home Environments Using PUF [J].
Cho, Yeongjae ;
Oh, Jihyeon ;
Kwon, Deokkyu ;
Son, Seunghwan ;
Lee, Joonyoung ;
Park, Youngho .
IEEE ACCESS, 2022, 10 :101330-101346
[9]  
Cremers C., US
[10]   Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication [J].
Gope, Prosanta ;
Sikdar, Biplab .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (04) :3953-3962