A lightweight privacy-preserving authenticated key exchange scheme for smart grid communications

Document Type: ORIGINAL RESEARCH PAPER

Authors

1 Iran- tehran

2 Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran

3 Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500 032, India

4 Department of Mathematics, Motilal Nehru National Institute of Technology (MNNIT), Allahabad, Uttar Pradesh, India

5 Department of Mathematics, Ch. Charan Singh University, Meerut, Uttar Pradesh, India

6 Electrical engineering Department, Sharif University of Technology, Tehran, Iran

10.22042/isecure.2019.161366.445

Abstract

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of smart grid systems, and utilizing
different new technologies, there are many opportunities for adversaries to attack the smart grid system that can result fatal problems for the customers. A privacy preserving authentication scheme is a critical element for secure development of smart grid. Recently, Mahmood et al. [1] proposed a lightweight message authentication scheme for smart grid communications and claimed that it satisfies the security requirements. Unfortunately, we found that Mahmood et al.'s scheme has some security vulnerabilities and it has not adequate security features to be utilized in smart grid. To address these drawbacks, we propose an efficient and secure lightweight privacy-preserving authentication scheme for a smart grid. Security of our scheme are evaluated, and the formal security analysis and verification are introduced via the broadly-accepted Burrows-Abadi-Needham (BAN) logic and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Finally, the security and efficiency comparisons are provided, which indicate the security and efficiency of the proposed scheme as compared to other existing related schemes.

Keywords