Next Article in Journal
A Monocular Visual Localization Algorithm for Large-Scale Indoor Environments through Matching a Prior Semantic Map
Previous Article in Journal
An Estimated δ-Based Iterative Block Decision Feedback Equalization in SC-FDE System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Noval and Efficient ECC-Based Authenticated Key Agreement Scheme for Smart Metering in the Smart Grid

1
College of Artificial Intelligence, Tianjin University of Science and Technology, Tianjin 300453, China
2
College of Engineering, Qatar University, Doha 2713, Qatar
3
State Grid Smart Grid Research Institute Co., Ltd., Nanjing 211167, China
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(20), 3398; https://doi.org/10.3390/electronics11203398
Submission received: 15 September 2022 / Revised: 14 October 2022 / Accepted: 16 October 2022 / Published: 20 October 2022

Abstract

:
With the gradual maturity of the smart grid (SG), security challenges have become one of the important issues that needs to be addressed urgently. In SG, the identity authentication and key agreement protocol between a smart meter ( S M ) and an aggregator ( A G ) is a prerequisite for both parties to establish a secure communication. Some of the existing solutions require high communication cost, some have key escrow problems and security defects. Elliptic curve cryptosystem (ECC) holds the feature of low-key requirement and high security to make it more suitable for the security solutions to the communications in SG. In this paper, we propose a mutual anonymous authentication with an ECC-based key agreement scheme to secure the communications in SG. In addition, we compare our scheme with other existing schemes by the number of encryption operations, the computation delay, and the communication cost. The results indicate that our scheme is more efficient without the loss of safety properties.

1. Introduction

The traditional power grid can no longer meet people’s demand for electricity, and it relies on fossil fuels, so it has an impact on the environment and energy. As a result, the smart grid (SG) was proposed at the beginning of the 21st century and developed rapidly. It uses advanced and modern technology to transmit the power efficiently and reliably, to control more effectively the cost and manage the power resources [1]. SG as the next generation of the power grid has received much attention for its efficiency, reliability, and sustainability.
SG can promote the rapid development of a country and provide convenience for people’s lives, having cost-effective and reliable characteristics. However, in SG, there could be many security risks between an aggregator ( A G ) and a smart meter ( S M ), if the communication between them has not been well protected. Security issues such as software vulnerabilities have always been the key issues with its development. With the vulnerabilities, hackers can easily launch attacks to cause power supply failures, power grid overload, and energy theft. In addition, the uncoordinated planning, design, and development speed can also bring more serious security challenges [2]. Therefore, in SG, the identity authentication and key agreement protocol between an A G and a S M is a prerequisite for both parties to establish a secure communication.

1.1. Related Works

Mutual authentication between an S M and an A G is the first critical step in the design of security countermeasures. Over the last few years, various researchers have made many efforts in the design of authenticated key distribution schemes in SG [3,4]. By Gope’s scheme [5], before communication, an A G has to check the validity of the S M s , which increases the computational complexity linearly with the number of S M s [6]. Kumar et al. proposed a lightweight authentication and key agreement in intelligent energy networks in [7]. But Kumar’s scheme is unable to resist a brief leak of secrets and suffers from time synchronization attacks. Odelu et al. proposed a provably secure authenticated key agreement scheme for SG in [8], but Odelu’s scheme is vulnerable to impersonation attack and traceability attack. Braeken et al. proposed a provably secure key agreement model for intelligent metering communications in [9], but Braeken’s scheme cannot deal effectively with malicious internal attackers [10]. Xiang and Zhang have presented a situation-aware protocol for device authentication in SG using a hash function and synchronous encryption for authentication, but without supporting perfect forward secrecy and anonymity of S M s [11]. Physical unclonable functions are an original function against physical attacks [12,13], but they are extremely vulnerable to modeling attacks.
Compared to other cryptographic functions, the elliptic curve cryptosystem (ECC) can reduce computational work effectively, and can also be used in the design of security schemes for SG [14,15,16,17,18,19,20,21,22]. Dariush et al. proposed a lightweight authentication scheme for a security-enhanced ECC in [14], which can improve its security performance and provide perfect positive confidentiality but fails to protect the anonymity of the S M s . Srinivas’s scheme cannot defend the man-in the middle attacks and simulated attacks in [15]. In addition, it does not render the anonymity feature of S M s . Chaudhry in [16] analyzed the password-based anonymous lightweight key agreement protocol proposed by Khan et al. in [17] and showed that Khan’s scheme has a false login and authentication stage according to the ECC operation. Thus, Chaudhry proposed an improved scheme, which is not free from the public key infrastructure challenges with a high computation cost in [16]. By Khan’s new scheme in [18], the communication among the user, trusted third party and server creates some security issues as a result of the introduction of a third party. To alleviate such problems, Sureshkumar et al. proposed a modified mutual authentication and key protocol mechanism using the ECC for SG in [19], but which requires a separate security mechanism to organize and initialize the real-time information. In order to solve the problems of S M s being vulnerable to tracking attacks, Baghestani et al. in [20] and Chaudhry et al. in [21] proposed a new mutual authentication key agreement scheme based on ECC for SG. However, both the schemes are weak against key compromise impersonation attack. The authentication scheme for SG proposed by Jalili et al. can ensure the anonymity of S M in [22], but it is vulnerable to de-synchronization attacks and has a large communication cost because the transmitted parameters need to be updated in the authentication stage.
Some other schemes in [23,24,25,26] can cause a significant drain on communication and computation resources due to their high computation complexity. Wang et al. introduced a blockchain-based authentication and key agreement protocol (BAKA) for edge-computing-based SG in [24]. The adoption of blockchain technology can solve the issue of undeniability and transparency of data but it will greatly increase the time delay for message chaining up and retrieval. Qi et al. proposed a scheme named as two-pass privacy preserving authenticated key agreement (TPPA) based on the elliptic curve Qu-Vanstone implicit certificates with a trusted third-party participation in SG in [25]. However, under the Canetti and Krawczyk (CK) adversary model [27], it does not ensure session key security, and suffers from denial of service attacks. Xiang et al. in [26] proposed a secure privacy-preservation authentication key agreement scheme (SPAK) for SG communications without providing anonymity of the S M s . Thus, it could not provide a better privacy-preservation and efficient authentication process.

1.2. Motivation

Due to the requirements for high reliability and security for the communications in SG, each S M needs to be authenticated by an A G before entering the SG. The main design goal in SG is to provide robust quality data transmission to meet the requirements of QoS, such as reliability, throughput, latency, and security [28]. In fact, power information generated by S M s is often transmitted over public insecure channels, which definitely gives the attackers an opportunity to break into the SG system. Secure identity mutual authentication is a critical first step in deterring attackers. Although there are many researchers working on authentication schemes, they all have their own problems, such as not providing anonymity of S M s in [14,15,26], holding a key hosting problem in [20,21,24,26], being vulnerable to active attacks in [15,25], without the ability to resist the man-in-the-middle attacks in [15,24], lack of providing session key security in [25], requiring a high computation cost in [23,24,25,26]. Therefore, to provide thoroughly the desired security functions for the communications in SG, particularly with the ability against key compromise attacks, we put forward an efficient and anonymity self-authentication scheme between the A G and the S M based on the ECC in SG. The scheme adopts less bilinear mapping and multiplication operations to reduce the computational costs without sacrificing security function.

1.3. Contributions

To solve the above existing problems, we present our contributions as follows:
(1)
We propose an ECC-based authentication and key agreement scheme (EAKA) for SG. The S M and A G are registered with a trusted third party and conduct two-way identity authentication to provide anonymity protection for the S M .
(2)
The proposed EAKA scheme can achieve a strong voucher privacy evaluated by the CK adversary model. It is testified to be safe under the random oracle model. Theoretical safety analysis indicates that the proposed EAKA scheme can oppose some classic attacks such as replay attacks and MITM attacks.
(3)
The proposed EAKA scheme has more advantages on network performance. According to the number of encryption operations, the computation delay, and communication cost, we compare the proposed EAKA scheme with other schemes to demonstrate that it is effective in terms of security and computational cost in the authentication process.

1.4. Paper Organization

The rest of the paper is arranged as follows:
In the second part, we present the mathematical background and the encryption concepts involved in the proposed scheme. In addition, we also introduce the system model and the threat model. In the third part, we describe the process of identity authentication of the proposed EAKA scheme in detail. In the fourth part, we perform a safety analysis of the proposed EAKA scheme using the CK adversary model and qualitative safety analysis. In the fifth part, we evaluate the performance of the proposed EAKA scheme through simulation experiments. Finally, we summarize the paper and propose the future work.

2. Preliminaries

In this section, we first describe the relevant content about the cryptography of the ECC. We then introduce the system model of the communication networks in SG. Finally, we discuss the threat model used in the security analysis.

2.1. ECC

As shown in Equation (1), the elliptic curve group E p ( a , b ) is defined over the prime finite field F p by the nonsingular elliptic curve equation E, where p is a prime number:
y 2 = x 3 + a x + b ( m o d   p ) , a , b F p , = 4 a 3 + 27 b 2 m o d   p 0  
Lemma 1.
(Elliptic Curves Discrete Log Problem (ECDLP)) [29,30]: Given the discrete log problem of fixed points G E p ( a , b ) and P = K G E p ( a , b ) , it is very hard to calculate k Z q * .
Lemma 2.
(Elliptic Curve Diffie-Helman problem (ECDHP)) [29,30]: The security of the ECDHP key exchange system works based on the security of the ECDLP. Given G , x G , y G E p ( a , b ) , it is very difficult to calculate x y G E p ( a , b ) .
We choose a random number m Z q * , the random number on the elliptic curve which meets its scalar point multiplication is defined as m G = G + G + + G ( m   t i m e s ) . Let G 1 and G 2 be a cycle group of prime order q, where G 1 is an additive group of cycles and G 2 is a multiplicative cycle group. The map e : G 1 × G 1 G 2 is proved to be an admissible bilinear map if it meets the following conditions.
(1)
Bilinearity: e ( a P , b Q ) = e ( a b P , Q ) = e ( P , a b Q ) = e ( P , Q ) a b , for all a , b Z q * , p , Q G 1 .
(2)
Non-degeneracy: There exists P , Q G 1 , so that e ( P , Q ) 1 , where 1 is the multiplication unit of G 2 .
(3)
Computability: For all P , Q G 1 , e ( P , Q ) can be efficiently computed.

2.2. System Model

As demonstrated in Figure 1, a communication network in SG consists of three traditional networks including a Home Area Network, a Local Area Network, and a Wide Area Network [31]. Based on the aspects of the public utilities, the Home Area Network is a group of household appliances, entertainment systems, lighting systems, energy storage, and power generation. In the Home Area Network, the S M is a home gateway that can gather energy depletion readings, which then transmits the collected readings to the service provider through the A G and performs the control command obtained from the service provider. The Local Area Network supports communication between the S M s and the A G s . Data concentrators and A G s can be concentrated in the surrounding residential areas. We set up a wireless mesh network between metering gateways and the S M s , through which the A G s can periodically collect all the required data, and then transmit them to the utilities via fixed-line communication. The Local Area Network usually communicates through the powerline communication.
Wireless mesh networks have been widely used, where each S M collects its information and becomes a router for other S M s to send consumption usage information to the data concentrator. The Wide Area Network provides connections between multiple data concentrators and the utility control centers, which is called the advanced network. In addition, the Wide Area Network can transmit and receive large amounts of smart metering infrastructure data, control commands, and signals, so it is also considered as a core network. The A G and the S M should be mutually authenticated to obtain a session key agreement. Before the authentication, A G s and S M s should register with the registration authority ( RA ) located near the utility service provider in the Wide Area Network. If the two-way communication between the A G and the S M is exposed to the public, attackers may launch malicious attacks to threaten the security of communications. If sensitive data is leaked, customer privacy will be compromised. In addition, the delay of real-time communication also affects the efficiency of the communication. Therefore, a more secure and strict authentication scheme should be adopted to protect the privacy of users.

2.3. Threat Model

This paper employs the widely-accepted and well-known Canetti and Krawczyk (CK) adversary model [27]. By the CK adversary model, a probabilistic polynomial-time adversary A can control the communication channel to achieve the function of listening, modification, and free interception. In addition, the secret information can be obtained by attackers and the session key also can be further damaged to create security threats during the communication process. A can launch the following query to interact with the protocol participant x , where x represents the S M i or A G j in this paper.
E x e c u t e ( S M i , A G j ) : A can only initiate a passive attack which is to eavesdrop information on the communication channel and will return the messages that participants exchange while executing this query.
S e n d ( x , m ) : Send query is defined on the basis of modification attacks, replay attacks, simulation attacks, etc. A can use this query to send a message m to x and and will receive a response message by x .
h n ( m ) : By this query, A performs a hash query on the message m and receives a random number r n as the hash value of m.
Test ( x ) : When obtaining a Test ( x ) query, x returns its session key or the same random value of the participating session key. An unbiased coin a { 0.1 } is flipped, if a is 1, the realistic session key is returned. Otherwise, x returns a arbitrary value with the same bit length of session key.
Corrupt ( x ) : By this query, A can obtain the static privacy of x to capture the concept of forward secrecy.
ESReveal ( x ) : With this query, A can get the brief secret held by x .
S K R e v e a l ( x ) : A can get the session key of x through this query.
Expire ( x ) : In this query, the completed session key held by x is removed.
There are the following definitions found in terms for this model:
Definition 1.
If S M i and A G j in the receiving state can authenticate each other and establish a session key, they can be called partners.
Definition 2.
If the S K R e v e a l ( x ) and Corrupt ( x ) queries are made before the Expire ( x ) query, the session s would be locally exposed. Conversely, if the session is not disclosed, it can be considered as having freshness.
Definition 3.
The security of authenticated key agreement (AKA) is modeled by the game G a m e A K A ( x , A ) in which A can send out many queries to x . The purpose of A is to correctly guess the hidden bit a { 0 , 1 } through the Test ( x ) query. It is assumed that Succ indicates the event where A wins and Pr ( S u c c ) indicates the probability of A wining the game G a m e A K A ( x , A ) . Therefore, as shown in Equation (2), the advantage of the disruption AKA is defined as:
  A d v A K A ( A ) = | 2 P r [ a = a ] 1 | = | 2 P r [ S u c c ( A ) ] 1 |
If there exists ε > 0 satisfying A d v A K A ( A ) < ε , then we argue that our scheme is safe for the CK adversarial model.

3. The Proposed Eaka Scheme

As depicted in Figure 2, we describe the proposed EAKA scheme in details, the whole process of which includes three stages, respectively “system initialization”, “registration”, and “authentication and key agreement”. Table 1 presents the notations applied in this paper.

3.1. System Initialization

In this stage, R A selects and publishes the system parameters. The steps of this phase are as follows.
(1)
R A chooses a large prime p on the non-singular elliptic curve E p ( a , b ) , and a point P E p ( a , b ) as the base point or generator, R A also chooses a cyclic additive group G 1 and a multiplicative group G 1 × G 1 G 2 , then it calculates a bilinear mapping e : G 1 × G 1 G 2 , g = e ( P , P ) .
(2)
R A randomly selects four one-way hash functions ( h 0 , h 1 , h 2 , h 3 ). R A selects a random number k Z q * as its private key, then computes its own public key as P p u b = k P .
(3)
R A publishes the system parameters { E p ( a , b ) , P , P p u b , h 0 , h 1 , h 2 , h 3 } .

3.2. Registration

After completing the registration stage, S M i and A G j calculate their private keys separately by the returned values from the R A .
(1)
S M i first sends its own i d to R A via a secure channel.
(2)
After obtaining the registration information, R A computes D i = k + h 0 ( i d i ) and sends { D i } to S M i through a safe channel.
(3)
After getting { D i } , S M i computes its private key s i as s i = 1 D i and public key P i as P i = s i P .
Similarly, the same process is performed for the registration of A G j . R A computes D j = k + h 0 ( i d j ) , and sends { D j } to A G j through a secure channel. A G j also gets its private key s j and public key P j as s j = 1 D j ,   P j = s j P . Figure 3 and Algorithm 1, Figure 4 and Algorithm 2, illustrate the S M i and A G j registration processes respectively.
Algorithm 1.  A G j registration
Input: i d j ;
Output: s j , P j ;
1: D j = k + h 0 ( i d j ) ;
2: return  A G j ( D j );
Algorithm 2.  S M i registration
Input: i d i ;
Output: s i , P i ;
1: D i = k + h 0 ( i d i ) ;
2: return  S M i ( D i );

3.3. Authentication and Key Agreement

As demonstrated in Figure 5, Algorithm 3 and Algorithm 4, A G j and S M i authenticate each other and generate a session key, and the two parties then communicate through the session key.
(1)
At first, S M i generates a random number x i Z q * , and then computes X i = x i P ,   g 1 = g x i ,   R 1 = x i ( P p u b + h 0 ( i d j ) P ) ,   M = ( i d i || X i ) h 1 ( g 1 | | t i ) , where t i is its current timestamp. Then S M i sends { M , R 1 , t i } to A G j .
(2)
When obtaining { M , R 1 , t i } at the time t i * , A G j verifies the freshness of t i by checking t i * t i ? < t . If not, A G j terminates the session. Otherwise, A G j proceeds to compute g 1 = e ( R 1 , P j ) shown in Equation (3). The value t i and the resulting g 1 are hashed to calculate i d i | | X i = M h 1 ( g 1 | | t i ) . Then, A G j checks whether X i D j and R 1 are the same to verify the authenticity of S M i . If it is false, A G j breaks this procedure. Otherwise, A G j generates a random number x j Z q * and computes R 2 = x j ( P p u b + h 0 ( i d i ) P ) ,   C 1 = x j R 1 s j . Then A G j can get V i j = h 2 ( i d j | | C 1 | | t j ) and the session key S K = h 3 ( i d i | | i d j | | C 1 ) . Finally, A G j replies { V i j , R 2 , t j } to S M i , where t j is its current timestamp.
(3)
When obtaining { V i j , R 2 , t j } at the time t j * , S M i verifies the freshness of t j by checking t j * t j ? < t . If not, S M i terminates the session. Otherwise, S M i proceeds to compute C 2 = x i R 2 s i shown in Equations (4) and (5), where s i is S M i ’s private key. Then S M i checks whether h 2 ( i d j | | C 2 | | t j ) and V i j are the same to verify the authenticity of A G j . If false, S M i breaks this procedure. Otherwise S M i generates the session key S K = h 3 ( i d i | | i d j | | C 2 ) . S M i and A G j complete the verification for both parties to obtain a common session key agreement.
g 1   = e ( R i , P j ) = e ( x i ( P p u b + h 0 ( i d j ) P ) , s j P ) = e ( x i ( k + h 0 ( i d j ) ) P , 1 k + h 0 ( i d j ) P ) = e ( P , P ) x i ( k + h 0 ( i d j ) ) · 1 k + h 0 ( i d j ) = g x i
C 1 = x j R 1 s j = x j x i ( P p u b + h 0 ( i d j ) P ) s j = x i x j ( k + h 0 ( i d j ) ) P 1 k + h 0 ( i d j ) = x i x j P
C 2 = x j R 2 s i = x j x i ( P p u b + h 0 ( i d i ) P ) s i = x i x j ( k + h 0 ( i d i ) ) P 1 k + h 0 ( i d i ) = x i x j P = C 1
Algorithm 3.  S M i authenticates A G j
Input:   V i j ,   R 2 ,   t j ;
Output: accept or reject;
1:   x i Z q * , t i ;  //generate a random number and a timestamp
2: X i = x i P ;
3: g 1 = g x i ;
4: R 1 = x i ( P p u b + h ( i d j ) P ) ;
5: M = ( i d i | | X i ) H 1 ( g 1 | | t i ) ;
6: t j * ;        //generate a timestamp
7: if( t j * t j < t ) then
8:    C 2 = x i R 2 s i ;
9:   if( V i j = h 2 ( i d j | | C 2 | | i d j ) then
10:      accept;
11:      S K = h 3 ( i d i | | i d j | | C 2 ) ;
12:   else reject;
12: else reject;
13: end if
Algorithm 4.  A G j authenticates S M i
Input:   M ,   R 1 ,   t i ;
Output: accept or reject;
1: t i * ;  //generate a timestamp
2: if( t j * t j < t ) then
3:     g 1 = e ( R 1 , P j ) ;
4:     i d i | | X i = M h 1 ( g 1 | | t i ) ;
5:    if( X i D j = R 1 ) then
6:      accept;
7:       x j Z q * , t j ;  //generate a random number and a timestamp
8:       R 2 = x j ( P p u b + h 0 ( i d i ) P ) ;
9:       C 1 = x j R 1 s j ;
10:        V i j = h 2 ( i d j | | C 1 | | t j ) ;
11:       S K = h 3 ( i d i | | i d j | | C 1 ) ;
12:   else reject;
13: else reject;
14: end if

4. Security Analysis

In this section, we evaluate our proposed EAKA scheme under the CK adversary model. By this model, an attacker A can perform a series of operations to achieve the effect of controlling communication. Besides, A can also interact with S M i or A G j .

4.1. Formal Evaluation by Random Oracle Model

By the random oracle model, all entities can interact with each other. Furthermore, they can also make oracle queries defined in Section II-C, whose questions are answered by a function uniformly selected among all possible functions. If any adversary has only a negligible probability of success with given abilities, the scheme is described as an ideal system.
Theorem 1.
The model supposes that  A can fight the semantic security of the protocol and issue Execute query q e , Send query q s , and Hash query q h . As shown in (3), the advantages of A are defined in Equation (6):
A d v A K A ( A ) ( q s + q e ) 2 p + q h 2 + 2 q s 2 l + 2 q h m a x { A d v A K A E C D H P ( A ) , A d v A K A E C D L P ( A ) }
where l is the length of hash value.
Proof. 
The stochastic model defines the game sequence G i (i = 0, 1, 2, 3, 4) to prove the semantic security of the protocol. G 0 indicates a real attack, while G 4 represents a game where A lacks the superiority. s i represents the incident where A speculates the correct random number a in the Test query. □
Game G 0 : This game is a simulation of a real attack by A under a random model. We can obtain Equation (7):
          A d v A K A ( A ) = | 2 P r [ s 0 ] 1 |                                    
Game G1: In this game, the query simulates a real attack. The simulation of the game which stores the results in the corresponding list is basically the same as the actual situation. If the result of the query is in the list, then we return it directly. If not, we output an arbitrary value of the same length as a result of the query and add it to the list. Thus, we have Equation (8):
          P r [ s 1 ] = P r [ s 0 ]                                            
Game G 2 : The game G 2 is identical to the previous game simulation but G 2 is terminated if the value of the query conflicts with the list. Therefore, we can derive from the birthday paradox, the probability of hash collision is at most q h 2 2 l + 1 , and the collision probability of transcription to the list is at most ( q s + q e ) 2 2 p . So, we can obtain Equation (9):
          | P r [ s 2 ] P r [ s 1 ] | q h 2 2 l + 1 + ( q s + q e ) 2 2 p                                            
Game G 3 : If A does not use the hash query, but A can also accurately speculate the validation value R 1 and V i j , then the game will be suspended. Therefore, we can obtain Equation (10):
          | P r [ s 3 ] P r [ s 2 ] | q s 2 l                                        
Game G 4 : By this game, an analysis on the security of the session key can be made. A queries to C 2 = x i R 2 s i to the random oracle h 3 in the test-session but it cannot implement the session key unless showing one of ( x i , s i ) or ( x j , s j ) to A . Therefore, A uses the query to calculate the session key with the following four scenarios:
(1)
Corrupt ( S M i ) and Corrupt ( A G j )
By this, A can obtain the static private keys s i of S M i and s j of A G j .
(2)
Corrupt ( S M i ) and ESReveal ( A G j )
By this, A can get the static private key s i of S M i and brief secret x j of A G j .
(3)
ESReveal ( S M i ) and Corrupt ( A G j )
By this, A can obtain the brief secret x i of S M i and static private key s j of A G j .
(4)
ESReveal ( S M i ) and ESReveal ( A G j )
By this, A can obtain the brief secret x i of S M i and brief secret x j of A G j .
According to C 2 = x i R 2 s i , the condition for A to obtain the session key is that A must know both the brief secret x i and static private key s i of S M i . However, for the above four cases, the session key SK cannot be calculated by A without obtaining h 4 or solving the ECDHP and ECDLP assumptions. If the ECDHP and ECDLP assumptions hold, the distinction between G3 and G4 is negligible [29]. So, we can get Equation (11):
          | P r [ s 4 ] P r [ s 3 ] | q h m a x { A d v A K A E C D H P ( A ) , A d v A K A E C D L P ( A ) }                                          
Otherwise, in the game G4, the guess bit α is random and independent which is in the Test query. And there is no advantage to distinguish between real sessions and random keys for a query with incorrect input. Therefore, we have Equation (12):
          P r [ s 4 ] = 1 2                                            
Finally, combining the above Equations (7)–(12), we can conclude that Equation (6) holds. So here exists ε = ( q s + q e ) 2 p + q h 2 + 2 q s 2 l + 2 q h m a x { A d v A K A E C D H P ( A ) , A d v A K A E C D L P ( A ) } > 0 satisfying A d v A K A ( A ) < ε , then we conclude that our proposed EAKA scheme is safe for the CK adversarial model.

4.2. Informal Security Analysis

In this subsection, we qualitatively analyze the security features of the EAKA scheme as follows:
(1)
Mutual authentication: First, S M i can authenticate A G j by checking whether h 3 ( i d i | | W T i | | C 2 ) = V i j holds. With S M i ’s private key s i and random number x i , S M i can compute C 2 = x i R 2 s i to verify the identity of A G j . A G j also confirms the identity of S M i by verifying whether R 1 = X i D j holds, where D j is sent by R A . Both S M i and A G j have completed mutual certification.
(2)
Key agreement: As we can see in Figure 5, after successful mutual authentication, both participants can get the same session key S K = h 3 ( i d i | | i d j | | C 1 ) = h 3 ( i d i | | i d j | | C 2 ) = h 3 ( i d i | | i d j | | x i x j P ) , Under the premise that the assumptions of the ECDH problem [30] are established, the session key cannot be obtained by A .
(3)
S M i ’s identity anonymity: In the authentication phase, the i d i which is encrypted by M = ( i d i || X i ) h 1 ( g 1 | | t i ) is sent to A G j on the open channel. The random number x i is randomly generated and constantly changed in each session, M is dynamic so that it is different in each session. Therefore, S M i can maintain the anonymity of the identity.
(4)
Perfect forward confidentiality: According to C 1 = x j R 1 s j and S K = h 3 ( i d i | | i d j | | C 1 ) , A needs to know the random number x j and private key s j of A G j to get the session key. However, it is very hard for A to get x i or x j which are generated by S M i or A G j and guess the session key. Even if the static private key s i and s j of S M i and A G j can be obtained by A , x i and x j are different values generated randomly in each session, so any previous established session keys cannot be derived by A . Due to the difficulty of the ECDHP and ECDLP assumptions, the session key cannot be cracked without knowing the random number. Therefore, our proposed EAKA scheme provides perfect forward confidentiality.
(5)
Man-in-the-middle attack: By this type of attack, A tries to establish a connection with A G j and S M i individually to make A G j and S M i mistakenly believe that both parties are connected. If A wants to establish connections with S M i , it needs to obtain the random number x j and private key s j of A G j to get the session key, but A cannot access the private key s j . By the partial session key C 1 or C 2 , A is unable to calculate the session key. Therefore, the analysis shows that our proposed EAKA scheme is able to resist man-in-the-middle attack.
(6)
Replay attack: Replay attack is launched for spoofing hosts by sending previous data. A timestamp and random number mechanism is introduced in our scheme to cope with replay attack. S M i generates a timestamp t i , then A G j verifies the freshness of the timestamp. If t i * t i > t , A G j will discard this replay elimination. The replay attack fails, even if t i * is modified by the adversary A because the original timestamp is embedded in h 1 ( g 1 | | t i ) , and the integrity of the time can be ensured by h 1 . Similarly, S M i verifies the freshness of the timestamp t j which is sent by A G j . S M i and A G j validate the timestamps sent by each other to ensure the freshness of the information in each data interaction. Therefore, our proposed EAKA scheme is considered feasible and effectively effective against replay attack.
(7)
Key leakage attack: Even if A can obtain respectively the private key s i of S M i and private key s j of A G j during the communication, A cannot succeed in getting the session key. According to formula C 1 = x j R 1 s j or C 2 = x i R 2 s i , A should know x i or x j to get the shared key besides the private key. Therefore, our proposed EAKA scheme can defend key leakage attack.

4.3. Comparison of Security Features

According to the security features, we compare our proposed EAKA scheme with the recently proposed solutions including the BAKA in [24], the TPPA in [25], and the SPAK in [26] schemes. As depicted in Table 2, the TPPA scheme lacks the session key security under the CK adversary model and it is unable to resist DoS attacks. In addition, the BAKA scheme has high computational and communication cost. The SPAK scheme cannot provide strong S M anonymity. Since the private key of our scheme is computed by itself in the registration phase, there is no key escrow issue. Therefore, our proposed EAKA scheme has better security properties with low computation and communication cost.

5. Performance Analysis

In this section, we evaluate the performance of the proposed EAKA scheme in terms of number of the number of cryptographic operations, computation delay, and communication cost. In addition, we also compare our EAKA scheme with other existing related solutions including the BAKA, the TPPA, and the SPAK schemes.

5.1. Number of Cryptographic Operations

We divide the cryptographic operations into five categories. PAD, HAS, EXP, BPA, and MUL representing point addition, hash operation, modular exponent, bilinear pairing, and scalar multiplication, respectively. The hardware of an S M as a user will use a RASPBERRY PI 3B+ with 1 GB LPDDR2 SDRAM and a BCM2837B0 system on chip with 1.4 GHZ frequency. The hardware of an A G as a server will use a computer with 4 GB RAM and an INTEL(R) CELERON (R) J1900 CPU. We adopt the encryption algorithm in [32,33,34] to simulate the time required to perform each of the cryptographic operations, which are shown in Table 3. From Table 3, the BPA operation spends the most time for users and the MUL operation also consumes a lot of time. So, in our scheme, high time-consuming encryption elements should be avoided as much as possible to reduce the total authentication latency without sacrificing the security features. From Table 4, each scheme uses different numbers of the encryption operations. We compare our scheme with the other four and find that they use the cryptographic operations more to increase their authentication delays. However, our scheme avoids the number of password operations, which is the most time-consuming operation, to reduce the authentication delays.

5.2. Computation Delay

According to the data in Table 3 and Table 4, we can simply calculate the time spent by each scheme for its cryptographic operations. The total number of cryptographic operations of the BAKA scheme is 24 with the time taken as 131.986 ms shown in Equation (14). The total number of password operations of the TPPA scheme is 29 with the time consumed as 95.702 ms shown in Equation (15). The total number of cryptographic operations of the SPAK scheme is 26 with the time consumed as 102.358 ms, shown in Equation (16). The total number of cryptographic operations performed by the proposed EAKA scheme is 18 with the time consumed as 74.792 ms shown in (13), which is 43% lower than that of the BAKA scheme, 22% lower than that of the TPPA scheme, and 27% lower than that of the SPAK scheme. The three schemes use more encryption components, which may increase their authentication delays.
T E A K A = 3 T M U L S M + 3 T M U L A G + 4 T H A S S M + 4 T H A S A G + T E X P S M + T B P A A G + T P A D S M + T P A D A G = 74.792   m s
T B A K A = 6 T M U L S M + 6 T M U L A G + 4 T H A S S M + 4 T H A S A G + 2 T P A D S M + 2 T P A D A G = 131.986   m s
T T P P A = 4 T M U L E S + 4 T M U L S M + 4 T P A D E S + 3 T P A D S M + 6 T H A S E S + 4 T H A S S M + 2 T E X P E S + 2 T E X P S M = 95.702   ( m s )
T S P A K = 2 T M U L E S + 2 T M U L S M + 3 T P A D E S + 3 T P A D S M + 6 T H A S E S + 6 T H A S S M + T E X P E S + T E X P S M + T B P A E S + T B P A S M = 102.358   ( m s )
In addition, Figure 6 details the computation delay of the S M and the A G by each scheme. On the S M side, the authentication delay by the BAKA scheme is the largest reaching 120.106 ms. The delay of the TPPA scheme and the delay of the SPAK scheme is 87.042 ms and 92.714 ms, respectively, while the delay of the EAKA scheme is minimal. On the A G side, the delay by the BAKA scheme is the maximum as 11.88 ms, and the delay by the TPP scheme and the delay by the SPAK schemes is 8.66 ms and 9.644 ms, respectively. The delay by our scheme is slightly higher at 11.233 ms. The result shows that our scheme meets the low time-consuming requirements of the SG.
C++ encoding is used to simulate the attack environment for security validation. Since there are some new types of malicious attacks which are unpredictable, and the authentication process of the four schemes may be interrupted by those unknown attacks, we simulate the attack environment as constantly changing the proportion of unknown attacks. Those attacks that can be resisted through security analysis are known as known attacks. The emergence of some new malicious attacks is unpredictable, and all these potential attacks are called unknown attacks. Assume the unknown attacks can interrupt the authentication process of these four methods. The computation delay is fixed for each type of the scheme under a known attack, while it could be uncertain under an unknown attack. We compare the computation delay in different scenarios and perform a total of 10,000 validation procedures for these four schemes by constantly varying the proportion of attack types to analyze the performance and validation delays of the different schemes.
As depicted in Figure 7, we perform specific simulations for each scheme, as the relationship between the different ratios of unknown attacks and the average computation delay by each scheme. The abscissa indicates the ratio of unknown attacks and the ordinate denotes the authentication time consumption by each of the four schemes. The ratio of unknown attacks increases from 0.1 to 0.9. Figure 7 shows that when the ratios of unknown attacks keep getting larger, the average authentication delay of each scheme also keeps increasing. The proposed EAKA scheme always has the lowest computation delay when the unknown attacks ratio is increasing. When the ratio of unknown attacks is the same, the computation delay of the proposed EAKA scheme is the lowest. Therefore, the proposed EAKA scheme has efficiency advantages even under different unknown attacks.

5.3. Communication Cost

The communication cost is also one of the important measures to evaluate the quality of a solution. We assume that the identity and the bit length of EXP are 64 b, the time stamp is 32 b, 160 b for random number verification and hash function, the operation for each point on the elliptic curve is 161 b, and an element in the multiplication group is 512 b. The statistical results of the proposed EAKA, the BAKA, the TPPA, and the SPAK schemes are respectively 706 b, 1027 b, 966 b, and 962 b which is depicted in Figure 8. The proposed EAKA scheme has a 31% lower communication cost than the BAKA scheme and 27% lower than the TPPA scheme and the SPAK scheme. Thus, the results indicate that the EAKA scheme has certain superiorities in terms of communication cost.

6. Conclusions

In this paper, we proposed a two-way anonymous authentication scheme based on ECC for the communications for smart metering in SG. The scheme adopts a self-authentication method to resist simulated attacks and provides the maximum protection in the authentication process. For the safety of the proposed EAKA scheme, we conducted a qualitative analysis. The proposed EAKA scheme can provide session key agreement, perfect forward secrecy, and privacy protection of S M . In addition, we evaluated the performance of the EAKA scheme by comparing it to other existing solutions to conclude that the proposed EAKA scheme cannot only incur a low computation delay but also can realize all the security functions provided by other schemes. In future research, we will introduce a trust-based weighted assessment pseudonymous to realize the secure storage control of distributed trust data, and we will design a comprehensive trust model approach to better study this part of identity authentication.

Author Contributions

Conceptualization, C.W.; Methodology and writing, S.L.; Formal analysis, M.M.; Data curation, Y.Z.; Investigation, X.T.; Supervision, B.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Orr, F.; Nafees, M.N.; Saxena, N.; Choi, B.J. Securing Publisher-Subscriber Smart Grid Infrastructure. Electronics 2021, 10, 2355. [Google Scholar] [CrossRef]
  2. Shokry, M.; Awad, A.I.; Abd-Ellah, M.K.; Khalaf, A.A.M. Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision. Future Gener. Comput. Syst. 2022, 136, 358–377. [Google Scholar] [CrossRef]
  3. Barreto, R.; Faria, P.; Vale, Z. Electric Mobility. An Overview of the Main Aspects Related to the Smart Grid. Electronics 2022, 11, 1311. [Google Scholar] [CrossRef]
  4. Je, S.M.; Woo, H.; Choi, J.; Jung, S.H.; Huh, J.H. A Research Trend on Anonymous Signature and Authentication Methods for Privacy Invasion Preventability on Smart Grid and Power Plant Environments. Energies 2022, 15, 4363. [Google Scholar] [CrossRef]
  5. Gope, P.; Sikdar, B. Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids. IEEE Trans. Inf. Forensics Secur. 2018, 14, 1554–1566. [Google Scholar] [CrossRef]
  6. Zhang, H.; Wang, J.; Ding, Y. Blockchain-based decentralized and secure keyless signature scheme for smart grid. Energy 2019, 180, 955–967. [Google Scholar] [CrossRef]
  7. Kumar, P.; Gurtov, A.; Sain, M.; Martin, A.; Ha, P. Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks. IEEE Trans. Smart Grid 2018, 10, 4349–4359. [Google Scholar] [CrossRef] [Green Version]
  8. Odelu, V.; Das, A.K.; Wazid, M.; Conti, M. Provably Secure Authenticated Key Agreement Scheme for Smart Grid. IEEE Trans. Smart Grid 2018, 9, 1900–1910. [Google Scholar] [CrossRef]
  9. Braeken, A.; Kumar, P.; Martin, A. Efficient and Provably Secure Key Agreement for Modern Smart Metering Communications. Energies 2018, 11, 2662. [Google Scholar] [CrossRef] [Green Version]
  10. Xu, G.; Li, X.; Jiao, L.; Wang, W.; Liu, A.; Su, C.; Zheng, X.; Liu, S.; Cheng, X. BAGKD: A Batch Authentication and Group Key Distribution Protocol for VANETs. IEEE Commun. Mag. 2020, 58, 35–41. [Google Scholar] [CrossRef]
  11. Xiang, A.; Zheng, J. A situation-aware scheme for efficient device authentication in smart grid-enabled home area networks. Electronics 2020, 9, 989. [Google Scholar] [CrossRef]
  12. Kaveh, M.; Martín, D.; Mosavi, M.R. A Lightweight Authentication Scheme for V2G Communications: A PUF-Based Approach Ensuring Cyber/Physical Security and Identity/Location Privacy. Electronics 2020, 9, 1479. [Google Scholar] [CrossRef]
  13. Mall, P.; Amin, R.; Das, A.K.; Leung, M.T.; Choo, K.K.R. PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey. IEEE Internet Things J. 2022, 9, 8205–8228. [Google Scholar] [CrossRef]
  14. Dariush, A.M.; Morteza, N. Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications. Future Gener. Comput. Syst. 2018, 84, 47–57. [Google Scholar]
  15. Srinivas, J.; Das, A.K.; Li, X.; Khan, M.K.; Jo, M. Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for IoT-Enabled Smart Grid Systems. IEEE Trans. Ind. Inform. 2021, 17, 4425–4436. [Google Scholar] [CrossRef]
  16. Chaudhry, S.A. Correcting PALK: Password-based anonymous lightweight key agreement framework for smart grid. Int. J. Electr. Power Energy Syst. 2021, 125, 106529. [Google Scholar] [CrossRef]
  17. Khan, A.A.; Kumar, V.; Ahmad, M.; Rana, S.; Mishra, D. PALK: Password-based anonymous lightweight key agreement framework for smart grid. Int. J. Electr. Power Energy Syst. 2021, 121, 106121. [Google Scholar] [CrossRef]
  18. Khan, A.A.; Kumar, V.; Ahmad, M.; Rana, S. LAKAF: Lightweight authentication and key agreement framework for smart grid network. J. Syst. Archit. 2021, 116, 102053. [Google Scholar] [CrossRef]
  19. Sureshkumar, V.; Anandhi, S.; Amin, R.; Selvarajan, N.; Madhumathi, R. Design of Robust Mutual Authentication and Key Establishment Security Protocol for Cloud-Enabled Smart Grid Communication. IEEE Syst. J. 2021, 15, 3565–3572. [Google Scholar] [CrossRef]
  20. Baghestani, S.H.; Moazami, F.; Tahavori, M. Lightweight Authenticated Key Agreement for Smart Metering in Smart Grid. IEEE Syst. J. 2022, 16, 4983–4991. [Google Scholar] [CrossRef]
  21. Chaudhry, S.A.; Nebhan, J.; Yahya, K.; Al-Turjman, F. A privacy enhanced authentication scheme for securing smart grid infrastructure. IEEE Trans. Ind. Inform. 2021, 18, 5000–5006. [Google Scholar] [CrossRef]
  22. Taqi, S.A.M.; Jalili, S. LSPA-SGs: A lightweight and secure protocol for authentication and key agreement based Elliptic Curve Cryptography in smart grids. Energy Rep. 2022, 8, 153–164. [Google Scholar] [CrossRef]
  23. Li, K.; Shi, R.; Wu, M.; Li, Y.; Zhang, X. A novel privacy-preserving multi-level aggregate signcryption and query scheme for Smart Grid via mobile fog computing. J. Inf. Secur. Appl. 2022, 67, 103214. [Google Scholar] [CrossRef]
  24. Wang, J.; Wu, L.; Choo, K.-K.R.; He, D. Blockchain-Based Anonymous Authentication with Key Management for Smart Grid Edge Computing Infrastructure. IEEE Trans. Ind. Inform. 2020, 16, 1984–1992. [Google Scholar] [CrossRef]
  25. Qi, M.; Chen, J. Two-Pass Privacy Preserving Authenticated Key Agreement Scheme for Smart Grid. IEEE Syst. J. 2021, 15, 3201–3207. [Google Scholar] [CrossRef]
  26. Xiang, X.Y.; Cao, J. An efficient authenticated key agreement scheme supporting privacy-preservation for smart grid communication. Electr. Power Syst. Res. 2022, 203, 107630. [Google Scholar] [CrossRef]
  27. Canetti, R.; Krawczyk, H. Analysis of key-exchange protocols and their use for building secure channels. Theory Appl. Cryptogr. Tech. 2001, 2045, 453–474. [Google Scholar]
  28. Liberati, F.; Garone, E.; di Giorgio, A. Review of Cyber-Physical Attacks in Smart Grids: A System-Theoretic Perspective. Electronics 2021, 10, 1153. [Google Scholar] [CrossRef]
  29. Liu, X.X.; Ma, W.P.; Cao, H. NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture. J. Med. Syst. 2019, 43, 318. [Google Scholar] [CrossRef]
  30. Chande, M.K.; Lee, C.C.; Li, C.T. Cryptanalysis and improvement of a ECDLP based proxy blind signature scheme. J. Discret. Math. Sci. Cryptogr. 2018, 21, 23–34. [Google Scholar] [CrossRef]
  31. Kumar, P.; Lin, Y.; Bai, G.; Paverd, A.; Dong, J.S.; Martin, A. Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues. IEEE Commun. Surv. Tutor. 2019, 21, 2886–2927. [Google Scholar] [CrossRef] [Green Version]
  32. Arduinolibs: Cryptographic Library. Available online: http://rweather.github.io/arduinolibs/crypto.html (accessed on 2 October 2017).
  33. OpenSSL, Cryptography and SSL/TLS Toolkit. Available online: http://www.openssl.org (accessed on 1 April 2017).
  34. Wang, C.; Zhang, Y.; Chen, X.; Liang, K.; Wang, Z. SDN-Based Handover Authentication Scheme for Mobile Edge Computing in Cyber-Physical Systems. IEEE Internet Things J. 2019, 6, 8692–8701. [Google Scholar] [CrossRef]
Figure 1. Architecture of Communication Networks in SG.
Figure 1. Architecture of Communication Networks in SG.
Electronics 11 03398 g001
Figure 2. General overview of the proposed scheme.
Figure 2. General overview of the proposed scheme.
Electronics 11 03398 g002
Figure 3. The process of SMi registration.
Figure 3. The process of SMi registration.
Electronics 11 03398 g003
Figure 4. The process of AGj registration.
Figure 4. The process of AGj registration.
Electronics 11 03398 g004
Figure 5. The authentication and key agreement phase.
Figure 5. The authentication and key agreement phase.
Electronics 11 03398 g005
Figure 6. Computation delay of each scheme in authentication phase.
Figure 6. Computation delay of each scheme in authentication phase.
Electronics 11 03398 g006
Figure 7. Authentication delay of each scheme under different attack frequency.
Figure 7. Authentication delay of each scheme under different attack frequency.
Electronics 11 03398 g007
Figure 8. Communication cost of each scheme in authentication phase.
Figure 8. Communication cost of each scheme in authentication phase.
Electronics 11 03398 g008
Table 1. Notations.
Table 1. Notations.
NotationsDescription
S M i The ith smart meter
A G j The jth service provider
( k , P p u b ) Private and public keys of RA
R A Trusted authority
i d i , i d j The identity of S M i and A G j
( s i , P i ) Private and public keys of S M i
( s j , P j ) Private and public keys of A G j
P The base point
S K Shared session key
The concatenation operator
The exclusive-or operator
Table 2. Feature-based comparison with the related schemes.
Table 2. Feature-based comparison with the related schemes.
Security AttributesEAKABAKATPPASPAK
Authentication and key agreement
Providing perfect forward secrecy
Session key security under CK adversary model×
DoS attack×
No key escrow issue××
Low computation and communication cost×
Replay attack resistance
Free from the PKI challenges
Prividing strong SM anonymity×
Table 3. Execution time of basic operations.
Table 3. Execution time of basic operations.
OperationDescriptionGoogle Nexus (ms)Alibaba Cloud (ms)
T B P A The execution time of a bilinear pairing48.665.275
T E X P The execution time of a modular exponentiation3.3280.339
T M U L The execution time of a scalar multiplication19.9191.97
T H A S The execution time of a general hash function0.0890.009
T P A D The execution time of a point addition0.1180.012
Table 4. Comparison of number of cryptography operations.
Table 4. Comparison of number of cryptography operations.
EAKABAKATPPASPAK
UserServerUserServerUserServerUserServer
BPA01000011
MUL33664422
PAD11223433
EXP10002211
HAS44444666
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wang, C.; Li, S.; Ma, M.; Tong, X.; Zhang, Y.; Zhang, B. A Noval and Efficient ECC-Based Authenticated Key Agreement Scheme for Smart Metering in the Smart Grid. Electronics 2022, 11, 3398. https://doi.org/10.3390/electronics11203398

AMA Style

Wang C, Li S, Ma M, Tong X, Zhang Y, Zhang B. A Noval and Efficient ECC-Based Authenticated Key Agreement Scheme for Smart Metering in the Smart Grid. Electronics. 2022; 11(20):3398. https://doi.org/10.3390/electronics11203398

Chicago/Turabian Style

Wang, Cong, Su Li, Maode Ma, Xin Tong, Yiying Zhang, and Bo Zhang. 2022. "A Noval and Efficient ECC-Based Authenticated Key Agreement Scheme for Smart Metering in the Smart Grid" Electronics 11, no. 20: 3398. https://doi.org/10.3390/electronics11203398

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop