School of Cyber Science and Technology, Beihang University, Beijing 100191, China.
State Key Laboratory of Cryptology, Beijing 100878, China.
Sensors (Basel). 2023 Apr 14;23(8):3991. doi: 10.3390/s23083991.
The IoT-enabled Smart Grid uses IoT smart devices to collect the private electricity data of consumers and send it to service providers over the public network, which leads to some new security problems. To ensure the communication security in a smart grid, many researches are focusing on using authentication and key agreement protocols to protect against cyber attacks. Unfortunately, most of them are vulnerable to various attacks. In this paper, we analyze the security of an existent protocol by introducing an insider attacker, and show that their scheme cannot guarantee the claimed security requirements under their adversary model. Then, we present an improved lightweight authentication and key agreement protocol, which aims to enhance the security of IoT-enabled smart grid systems. Furthermore, we proved the security of the scheme under the real-or-random oracle model. The result shown that the improved scheme is secure in the presence of both internal attackers and external attackers. Compared with the original protocol, the new protocol is more secure, while keeping the same computation efficiency. Both of them are 0.0552 ms. The communication of the new protocol is 236 bytes, which is acceptable in smart grids. In other words, with similar communication and computation cost, we proposed a more secure protocol for smart grids.
物联网使能的智能电网使用物联网智能设备来收集消费者的私人电力数据,并通过公共网络将其发送到服务提供商,这导致了一些新的安全问题。为了确保智能电网中的通信安全,许多研究都集中在使用身份验证和密钥协商协议来防止网络攻击。不幸的是,它们中的大多数协议都容易受到各种攻击。在本文中,我们通过引入内部攻击者来分析现有协议的安全性,并表明在他们的对手模型下,他们的方案不能保证所声称的安全要求。然后,我们提出了一种改进的轻量级身份验证和密钥协商协议,旨在增强物联网使能的智能电网系统的安全性。此外,我们在真实或随机预言机模型下证明了该方案的安全性。结果表明,改进的方案在存在内部攻击者和外部攻击者的情况下都是安全的。与原始协议相比,新协议在保持相同计算效率的同时更加安全。它们的计算时间都是 0.0552ms。新协议的通信量为 236 字节,在智能电网中是可以接受的。换句话说,在具有类似通信和计算成本的情况下,我们为智能电网提出了一种更安全的协议。