A Multi-User, Single-Authentication Protocol for Smart Grid Architectures
<p>System model.</p> "> Figure 2
<p>A utility server request to the trusted third party to get access policy, its ID, and authentication code.</p> "> Figure 3
<p>Access policy for <math display="inline"><semantics> <mrow> <mi>S</mi> <msub> <mi>G</mi> <mn>1</mn> </msub> </mrow> </semantics></math> = {<math display="inline"><semantics> <mrow> <mi>S</mi> <mi>G</mi> <msub> <mi>D</mi> <mn>1</mn> </msub> <mo>,</mo> <mi>S</mi> <mi>G</mi> <msub> <mi>D</mi> <mn>2</mn> </msub> <mo>,</mo> <mi>S</mi> <mi>G</mi> <msub> <mi>D</mi> <mn>3</mn> </msub> <mo>,</mo> <mi>S</mi> <mi>G</mi> <msub> <mi>D</mi> <mn>4</mn> </msub> </mrow> </semantics></math>}.</p> "> Figure 4
<p>Screen shot of the simulation tool.</p> "> Figure 5
<p>Output of the SPAN-AVISPA analysis.</p> "> Figure 6
<p>Time consumed in various stages.</p> ">
Abstract
:1. Introduction
1.1. Main Contributions
- Developing a lightweight and fast group-based authentication mechanism that executes a full authentication process during the first handshake, while the subsequent handshakes are performed using the authentication token;
- Reducing the energy consumption by reducing the communication overhead; and
- Security validation of the proposed algorithm using a formal and informal security analysis. An Automated Validation of Internet Security Protocol and Applications (AVISPA) tool is used to test the resilience of the proposed algorithm.
1.2. Paper Organization
2. Literature
3. Preliminaries
3.1. Threat Model
- Concurrent execution—the adversary has the capabilities to start multiple sessions with several devices in parallel so that he/she can act as a man in the middle;
- Access to public information—the adversary has full access to all the available public parameters of each device in the network;
- Message tampering—the adversary has the capabilities to capture all the messages, tamper them without knowing the actual content and replay them.
3.2. Algorithm Overview
3.3. System Model
3.4. Elliptic Curve Description and Notations
4. Proposed Algorithm
4.1. Setup
- Step-1:
- Each device of the network is equipped with a non-singular EC (mod p) over a finite field , where a and b are constants and satisfy the condition and ;
- Step-2:
- A device is given a non collision hash function ;
- Step-3:
- A device selects G (group generator). The order of G is set to n and satisfies the condition , where ℘ represents the point at infinity or zero; and
- Step-4:
- The selects a private key on elliptic curve and calculates its private key ; and
- Step-5:
- The makes , and public.
4.2. Registration
4.2.1. Smart Grid Device Registration
- The randomly selects a unique identity () for the smart grid device and calculates ;
- The calculates a timestamps , where represents the registration time of the with the . This is used to generate a new timestamps for the communication with the and after the registration phase;
- The generates a ; and
- The gives offline to the .
- The pre-load the onto the memory, where .
4.2.2. Utility Server Registration
- The randomly selects a unique identity () for the utility server and calculates ;
- The calculates a timestamps , where represents the registration time of the with the . This is used to generate a new timestamps for the communication with the and after the registration phase;
- The generates a ;
- The gives offline to the ; and
- The pre-load the onto the memory where .
4.2.3. Generation
- The selects a random number and current timestamps T;
- The calculates and a verification hash ;
- The sends to the ;
- The verifies the received by comparing it with ;
- The successful verification of and allows the to generate a certificate and a signature ; and
- Finally, the sends , where .
4.2.4. Public/Private Key Generation
4.3. Access Policy
- All intended are grouped together to form a group (i.e., as shown in Figure 1) such that , where i is total number of in a smart grid and ;
- The access policy is defined as a tree structure, where the leaf nodes are the hashes of and the root hash is the authentication code (), as shown in Figure 3;
- The hashes of are represented by ; and
- The authentication code is , where for and .
Algorithm 1 Generation and issuance of access policy, and authentication code by the KMS to the utility server |
|
4.4. Authentication and Session Key Establishment
- The selects a random number and generates a current time stamp ;
- The calculates a nonce , and . The is pre-shared with the utility server by the during the registration phase;
- The sends to the ;
- The validates the timestamp after receiving by checking , where is the maximum propagation time of a message over a channel. It also checks the validity of ;
- If and are valid, the selects a random number and generates a current time stamp ;
- The calculates a nonce and ;
- The calculates , and ;
- The calculates the corresponding using the key-generation function () as ;
- The further calculates and ;
- The sends to the ;
- The validates the timestamp after receiving by checking , where is the maximum propagation time of a message over a channel;
- The successful validation of allows the to compute the public key of using Equation (5);
- The then computes the using Equation (6), ;
- To calculate the , the first computes and ;
- The then computes ;
- The successful verification of R and Q allows the to send the and subsidiaries of to and a hash of (i.e., );
- The then computes using Equation (6) and verifies the received hash () by comparing it with its computed hash from the ;
- Successful verification of the received hash allows to compute the , deriving the as and comparing it with the received . Successful verification allows the utility server to establish a secure link with ; and
- Finally, calculates the and sends it to the utility server where is a common key shared among the devices.
5. Security Analysis
5.1. Formal Security Analysis Using AVISPA
- First, all the public and private parameters and the communication links among the smart grid devices are defined;
- All the messages are scheduled in sequence and properly labelled. For example, sends a message to . It is labelled as 1 while the response from the is labelled as 2. The next message from the is labelled as 3 and so on;
- The total number of messages per device and the content of each message are defined;
- Then, the role and capabilities of an attacker are defined as man-in-the-middle where it has full access to all the messages being exchanged among the devices in the smart grid;
- Finally, all the security sensitive parameters are defined; and
- The AVISPA attack models are run to check the security strength of the proposed algorithm.
5.2. Informal Security Analysis
5.2.1. Man-In-The-Middle Attack (MMA)
5.2.2. Replay Attacks
5.2.3. Forgery of the apID
5.2.4. End-to-End Security
6. Simulation Setup and Results
6.1. Communication Cost
6.2. Cost of Cryptographic Operations
- : computational time of key generation function;
- : computational time of point multiplication;
- : computational time of symmetric encryption;
- : computational time of public key encryption;
- : computational time of hash function;
- : computational time of signature;
- : computational time of signature verification; and
- : computational time of ECC point addition.
6.3. Memory Cost
6.4. Security Comparison
7. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Colak, I.; Sagiroglu, S.; Fulli, G.; Yesilbudak, M.; Covrig, C.F. A survey on the critical issues in smart grid technologies. Renew. Sustain. Energy Rev. 2016, 54, 396–405. [Google Scholar] [CrossRef]
- Gungor, V.C.; Sahin, D.; Kocak, T.; Ergut, S.; Buccella, C.; Cecati, C.; Hancke, G.P. Smart Grid Technologies: Communication Technologies and Standards. IEEE Trans. Ind. Inf. 2011, 7, 529–539. [Google Scholar] [CrossRef] [Green Version]
- Alahakoon, D.; Yu, X. Smart Electricity Meter Data Intelligence for Future Energy Systems: A Survey. IEEE Trans. Ind. Inf. 2016, 12, 425–436. [Google Scholar] [CrossRef]
- Fan, C.; Huang, S.; Lai, Y. Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid. IEEE Trans. Ind. Inf. 2014, 10, 666–675. [Google Scholar] [CrossRef]
- Fouda, M.M.; Fadlullah, Z.M.; Kato, N.; Lu, R.; Shen, X.S. A Lightweight Message Authentication Scheme for Smart Grid Communications. IEEE Trans. Smart Grid 2011, 2, 675–685. [Google Scholar] [CrossRef] [Green Version]
- Wu, D.; Zhou, C. Fault-Tolerant and Scalable Key Management for Smart Grid. IEEE Trans. Smart Grid 2011, 2, 375–381. [Google Scholar] [CrossRef]
- Xia, J.; Wang, Y. Secure Key Distribution for the Smart Grid. IEEE Trans. Smart Grid 2012, 3, 1437–1443. [Google Scholar] [CrossRef]
- Park, J.H.; Kim, M.; Kwon, D. Security Weakness in the Smart Grid Key Distribution Scheme Proposed by Xia and Wang. IEEE Trans. Smart Grid 2013, 4, 1613–1614. [Google Scholar] [CrossRef]
- Tsai, J.; Lo, N. Secure Anonymous Key Distribution Scheme for Smart Grid. IEEE Trans. Smart Grid 2016, 7, 906–914. [Google Scholar] [CrossRef]
- Odelu, V.; Das, A.K.; Wazid, M.; Conti, M. Provably Secure Authenticated Key Agreement Scheme for Smart Grid. IEEE Trans. Smart Grid 2018, 9, 1900–1910. [Google Scholar] [CrossRef]
- He, D.; Wang, H.; Khan, M.K.; Wang, L. Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun. 2016, 10, 1795–1802. [Google Scholar] [CrossRef]
- Mohammadali, A.; Sayad Haghighi, M.; Tadayon, M.H.; Mohammadi-Nodooshan, A. A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid. IEEE Trans. Smart Grid 2018, 9, 2834–2842. [Google Scholar] [CrossRef]
- Doh, I.; Lim, J.; Chae, K. Secure Authentication for Structured Smart Grid System. In Proceedings of the 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Santa Cantarina, Brazil, 8–10 July 2015; pp. 200–204. [Google Scholar] [CrossRef]
- Saxena, N.; Choi, B.J.; Lu, R. Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid. IEEE Trans. Inf. Forensics Secur. 2016, 11, 907–921. [Google Scholar] [CrossRef] [Green Version]
- Yan, Y.; Qian, Y.; Sharif, H.; Tipper, D. A Survey on Cyber Security for Smart Grid Communications. IEEE Commun. Surv. Tutor. 2012, 14, 998–1010. [Google Scholar] [CrossRef] [Green Version]
- Tsang, P.P.; Smith, S.W. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems. In Proceedings of the Ifip Tc 11 23rd International Information Security Conference, Milano, Italy, 7–10 September 2008; pp. 445–459. [Google Scholar]
- Perrig, A.; Canetti, R.; Tygar, J.D.; Song, D. Efficient authentication and signing of multicast streams over lossy channels. In Proceeding of the 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 14–17 May 2000; pp. 56–73. [Google Scholar] [CrossRef] [Green Version]
- Cairns, K.; Hauser, C.; Gamage, T. Flexible data authentication evaluated for the smart grid. In Proceedings of the 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm), Vancouver, BC, Canada, 21–24 October 2013; pp. 492–497. [Google Scholar] [CrossRef]
- Dolev, D.; Yao, A.C. On the security of public key protocols. In Proceedings of the 22nd Annual Symposium on Foundations of Computer Science, Nashville, TN, USA, 28–30 October 1981; pp. 350–357. [Google Scholar] [CrossRef] [Green Version]
- Viganò, L. Automated Security Protocol Analysis With the AVISPA Tool. Electron. Notes Theor. Comput. Sci. 2006, 155, 61–86. [Google Scholar] [CrossRef] [Green Version]
- Automated Validation of Internet Security Protocols and Applications (AVISPA). Artificial Intelligence Laboratory, DIST, University of Genova: Genoa, Italy. Available online: http://www.avispa-project.org/ (accessed on 26 September 2019).
- Grainger, B.M.; Reed, G.F.; McDermott, T.E.; Mao, Z.H.; Kounev, V.; Tipper, D. Analysis of an offshore medium voltage DC microgrid environment Part I: Power sharing controller design. In Proceedings of the 2014 IEEE PES T D Conference and Exposition, Chicago, IL, USA, 14–17 April 2014; pp. 1–5. [Google Scholar] [CrossRef]
- Rivest, R.L.; Hellman, M.E.; Anderson, J.C.; Lyons, J.W. Responses to NIST’s Proposal. Commun. ACM 1992, 35, 41–54. [Google Scholar] [CrossRef]
- Kounev, V.; Tipper, D.; Yavuz, A.A.; Grainger, B.M.; Reed, G.F. A Secure Communication Architecture for Distributed Microgrid Control. IEEE Trans. Smart Grid 2015, 6, 2484–2492. [Google Scholar] [CrossRef]
- Khan, S.; Khan, R. Elgamal Elliptic Curve Based Secure Communication Architecture for Microgrids. Energies 2018, 11, 759. [Google Scholar] [CrossRef] [Green Version]
Parameters | Definition |
---|---|
Message delivery time | |
Time spent in cryptographic operations at the sender side | |
Time spent in the verification operation at the receiver side | |
Size of message in bits | |
Maximum acceptable communication delay | |
N | Nonce |
Utility server and smart grid device | |
Trusted third party | |
K, | EC public key and EC private key |
Symmetric key shared between and | |
Public key certificate | |
Key generation function | |
Second preimage resistant hash function | |
, | Access policy and access policy ID |
, | Authentication code and authentication key |
Session secret key | |
Token key | |
Common key among all devices of the |
Algorithm | Cost (bits) | No. of Messages |
---|---|---|
[5] | 6804 | 4 |
[6] | 4248 | 6 |
[7] | 2768 | 5 |
[9] | 3520 | 3 |
[10] | 3840 | 3 |
[11] | 1760 | 3 |
Ours (initial) | 1312 | 3 |
Ours (subsequent) | 352 | 2 |
Operation | MICAZ | 3-GHz Pentium IV PC |
---|---|---|
Key generation | 5.32 s | 3.88 ms |
Point multiplication | 2.45 s | 1.82 ms |
AES en/decryption | 0.023 ms | ∼0 ms |
Hash function | 0.023 ms | ∼0 ms |
Public encryption | 0.79 s | 0.57 ms |
Public decryption | 21.5 s | 16 ms |
Signature | 21.5s | 16 ms |
Signature verification | 0.79 s | 0.57 ms |
ECC point addition | 0.44 ms | ∼0 ms |
Algorithm | MICAZ (s) | Pentium IV PC (ms) |
---|---|---|
[6] | 41.91 | 31.1 |
[9] | 29.37 | 21.6 |
[10] | 24.47 | 18.0 |
[11] | 24.50 | 18.2 |
Proposed (initial) | 26.55 | 19.5 |
Proposed (subsequent) | 11.10 | 8.1 |
Algorithm | S1 | S2 | S3 | S4 | S5 | S6 | S7 |
---|---|---|---|---|---|---|---|
[5] | √ | √ | √ | √ | √ | √ | |
[6] | √ | √ | |||||
[7] | √ | √ | |||||
[9] | √ | √ | √ | √ | √ | √ | |
[10] | √ | √ | √ | √ | √ | √ | |
[11] | √ | √ | √ | √ | √ | √ | |
[12] | √ | √ | √ | √ | √ | √ | |
Ours | √ | √ | √ | √ | √ | √ | √ |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alfakeeh, A.S.; Khan, S.; Al-Bayatti, A.H. A Multi-User, Single-Authentication Protocol for Smart Grid Architectures. Sensors 2020, 20, 1581. https://doi.org/10.3390/s20061581
Alfakeeh AS, Khan S, Al-Bayatti AH. A Multi-User, Single-Authentication Protocol for Smart Grid Architectures. Sensors. 2020; 20(6):1581. https://doi.org/10.3390/s20061581
Chicago/Turabian StyleAlfakeeh, Ahmed S., Sarmadullah Khan, and Ali Hilal Al-Bayatti. 2020. "A Multi-User, Single-Authentication Protocol for Smart Grid Architectures" Sensors 20, no. 6: 1581. https://doi.org/10.3390/s20061581