Cryptanalysis and improvement of a three-factor user authentication scheme for smart grid environment

被引:7
作者
Grover H.S. [1 ]
Adarsh [1 ]
Kumar D. [2 ]
机构
[1] Division of Computer Engineering, NSIT, New Delhi
[2] Department of Information Technology, NSUT, New Delhi
来源
Journal of Reliable Intelligent Environments | 2020年 / 6卷 / 04期
关键词
ProVerif; Session key agreement; Smart grid; User authentication; User impersonation attack;
D O I
10.1007/s40860-020-00113-2
中图分类号
学科分类号
摘要
Nowadays, smart grid technology has become popular because it provides intelligent and distributed electrical power transmission systems. One of its main applications is to charge the electric vehicles. To provide a secure communication between a user and a smart meter and during the peak hours, authentication is necessary between them. Recently, Wazid et al. have discussed a three factor authentication (3FA) scheme for smart grid environment using ECC and showed that it is more secure than the related protocols. Here, we first cryptanalyze their scheme and find the user impersonation and stolen mobile terminal attacks in it. To remove these limitations, we design an improved authentication protocol for smart grid environment. We formally verify the security of our scheme using ProVerif tool. Also we present its informal security analysis to prove that it is invulnerable to many known attacks. In comparative study, we show that our scheme provides more security features than the existing schemes. © 2020, Springer Nature Switzerland AG.
引用
收藏
页码:249 / 260
页数:11
相关论文
共 31 条
[1]  
(2017)
[2]  
Alnasser A., Rikli N.E., Design of a trust security model for smart meters in an urban power grid network, Proceedings of the 10Th ACM Symposium on Qos and Security for Wireless and Mobile Networks, pp. 105-108, (2014)
[3]  
Blanchet B., Et al., An efficient cryptographic protocol verifier based on prolog rules, In: Csfw, 1, pp. 82-96, (2001)
[4]  
Chan A.C.F., Zhou J., Cyber-physical device authentication for the smart grid electric vehicle ecosystem, IEEE J Selected Areas Commun, 32, 7, pp. 1509-1517, (2014)
[5]  
Chim T.W., Yiu S.M., Li V.O., Hui L.C., Zhong J., Prga: Privacy-preserving recording & gateway-assisted authentication of power usage information for smart grid, IEEE trans Dependable Secure Comput, 12, 1, pp. 85-97, (2015)
[6]  
Das A.K., A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks, Peer-to-peer Netwk Appl, 9, 1, pp. 223-244, (2016)
[7]  
Doh I., Lim J., Chae K., Secure authentication for structured smart grid system, In: Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2015 9Th International Conference On, pp. 200-204, (2015)
[8]  
Fouda M.M., Fadlullah Z.M., Kato N., Lu R., Shen X.S., A lightweight message authentication scheme for smart grid communications, IEEE Trans Smart Grid, 2, 4, pp. 675-685, (2011)
[9]  
Gazdar T., Rachedi A., Benslimane A., Belghith A., A distributed advanced analytical trust model for vanets, Global Communications Conference (GLOBECOM), 2012 IEEE, pp. 201-206, (2012)
[10]  
Haddadou N., Rachedi A., Ghamri-Doudane Y., A job market signaling scheme for incentive and trust management in vehicular ad hoc networks, IEEE Trans Vehicular Technol, 64, 8, pp. 3657-3674, (2015)