ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor

被引:22
作者
Yu, SungJin [1 ,2 ]
Park, KiSung [1 ]
机构
[1] Elect & Telecommun Res Inst, Daejeon 34129, South Korea
[2] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
关键词
Industrial smart grid; Cryptographic protocol; Authentication; Key agreement; Fuzzy extractor; MANAGEMENT; EXCHANGE;
D O I
10.1016/j.sysarc.2022.102698
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Smart grid (SG) has been received significant attention due to various services such as renewable energy and demand response. However, SG is fragile to various security attacks because an adversary can eavesdrop, insert, delete, or intercept the exchanged messages over an open channel. Thus, secure and lightweight authentication and key agreement (AKA) scheme for SG to ensure the necessary security requirements. Recently, the existing schemes designed a secure and efficient AKA protocol for industrial SG using cryptographic primitives to ensure reliable energy services. However, we prove that existing schemes for industrial SG are vulnerable to potential security attacks and do not guarantee the necessary security requirements. To enhance the security flaws of the existing schemes, we design a secure and lightweight AKA scheme for SG using fuzzy extractor, called ISG-SLAS. ISG-SLAS resists various security attacks and provides security functionalities. We evaluate the security of the ISG-SLAS using ROR model and AVISPA simulation. Moreover, we present the testbed experiments using MIRACL based on Raspberry PI 4. We then present a comparative analysis between ISG-SLAS and related schemes. Consequently, ISG-SLAS better ensures security and efficiency compared with related schemes and is more suitable than related schemes for practical SG.
引用
收藏
页数:11
相关论文
共 48 条
[1]   An Anonymous ECC-Based Self-Certified Key Distribution Scheme for the Smart Grid [J].
Abbasinezhad-Mood, Dariush ;
Nikooghadam, Morteza .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2018, 65 (10) :7996-8004
[2]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[3]  
Advanced Encryption Standard (AES). National Institute of Standards and Technology (NIST), 2001, AES 256 Encryption in Java
[4]   A clogging resistant secure authentication scheme for fog computing services [J].
Ali, Zeeshan ;
Chaudhry, Shehzad Ashraf ;
Mahmood, Khalid ;
Garg, Sahil ;
Lv, Zhihan ;
Bin Zikria, Yousaf .
COMPUTER NETWORKS, 2021, 185
[5]  
[Anonymous], 1995, 1801 FIPS PUB NIST U
[6]  
AVISPA, 2001, AUT VAL INT SEC PROT
[7]  
Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
[8]   Efficient and Provably Secure Key Agreement for Modern Smart Metering Communications [J].
Braeken, An ;
Kumar, Pardeep ;
Martin, Andrew .
ENERGIES, 2018, 11 (10)
[9]   Cyber-Physical Device Authentication for the Smart Grid Electric Vehicle Ecosystem [J].
Chan, Aldar C. -F. ;
Zhou, Jianying .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (07) :1509-1517
[10]  
Chaudhry S. A., 2022, IEEE T IND INF, V1, P1, DOI [10.1109/TII.2022.3158663, DOI 10.1109/TII.2022.3158663]