A lightweight authentication scheme with privacy protection for smart grid communications Source: Future Generation Computer Systems Volume 100, November.

Slides:



Advertisements
Similar presentations
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Advertisements

Cryptanalysis of a Communication-Efficient Three-Party Password Authenticated Key Exchange Protocol Source: Information Sciences in review Presenter: Tsuei-Hung.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 Security analysis of an enhanced authentication key exchange protocol Authors : H.Y. Liu, G.B. Horng, F.Y. Hung Presented by F.Y. Hung Date : 2005/5/20.
Cryptanalysis of Two Dynamic ID-based Authentication
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
多媒體網路安全實驗室 A novel user authentication and privacy preserving scheme with smartcards for wireless communications 作者 :Chun-Ta Li,Cgeng-Chi Lee 出處 :Mathematical.
Efficient remote mutual authentication and key agreement Improvement of Chien et al. ’ s remote user authentication scheme using smart cards An efficient.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks Hyeran Mun, Kyusuk Han, Yan Sun Lee, Chan Yeob Yeun, Hyo.
Department of Computer Engineering, Kyungpook National University Author : Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo Speaker : Wan-Soo Lee
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
SPEAKER: HONG-JI WEI DATE: Secure Anonymous Authentication Scheme with Roaming for Mobile Networks.
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
RFID Paper presentation The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/12 報告人:向峻霈.
Smart Card Based Authenticated Key Agreement Schemes
Reviews Rocky K. C. Chang 20 April 2007.
Lightweight Mutual Authentication for IoT and Its Applications
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Source : IEEE Access, In Press, 2016
Symmetric Cryptography
Author:YongBin Zhou, ZhenFeng Zhang, and DengGuo Feng Presenter:戴士桀
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
A secure and traceable E-DRM system based on mobile device
Source : Future Generation Computer Systems, Vol. 68, pp , 2017
Efficient password authenticated key agreement using smart cards
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data Source : IEEE INFOCOM IEEE International Conference on Computer Communications,
SAKAWP: Simple Authenticated Key Agreement Protocol Based on Weil Pairing Authors: Eun-Jun Yoon and Kee-Young Yoo Src: International Conference on Convergence.
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications, ahead of.
Security of a Remote Users Authentication Scheme Using Smart Cards
Chapter 8 Network Security.
Efficient Time-Bound Hierarchical Key Assignment Scheme
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Wei-Chi KU, Hao-Chuan TSAI, Maw-Jinn TSAUR
Privacy Preserving Ranked Multi-Keyword
Cryptography Basics and Symmetric Cryptography
Recent Developments on Multimedia and Secure Networking Technologies
Authors : Parwinder Kaur Dhillon and Sheetal Kalra
QR Code Authentication with Embedded Message Authentication Code
Source: Ad Hoc Networks, Vol. 71, pp , 2018
2018/7/28 GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid Authors: Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
A Novel Latin Square-based Secret Sharing for M2M Communications
Lightweight IoT-based authentication scheme in cloud computing circumstance Source: Future Generation Computer Systems Volume 91, February 2019, Pages.
Lightweight IoT-based authentication scheme in cloud computing circumstance Source: Future Generation Computer Systems Volume 91, February 2019, Pages.
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
An Improved Novel Key Management Protocol for RFID Systems
A lightweight biometrics based remote user authentication scheme for IoT services Source: Journal of Information Security and Applications Volume 34, Part.
Controllable and Trustworthy Blockchain-based Cloud Data Management
Authors: Yuh-Min TSENG, Tsu-Yang WU, Jui-DiWU
CSC 774 Advanced Network Security
Recent Developments on Multimedia and Secure Networking Technologies
A new chaotic algorithm for image encryption
Source: Computer Networks Volume 149, 11 February 2019, Pages 29-42
Source: Sensors, Volume 19, Issue 9 (May )
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Privacy Protection for E-Health Systems by
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
How to Use Charm Crypto Lib
Presentation transcript:

A lightweight authentication scheme with privacy protection for smart grid communications Source: Future Generation Computer Systems Volume 100, November 2019, Pages 770-778 Authors: Liping Zhang, Lanchao Zhao, Shuijun Yin, Chi-Hung Chi, Ran Liu, Yixin Zhang Speaker: Yao-Zhu Zheng Date: 2019/08/15

Outline Introduction Proposed scheme Experimental results Conclusions

Introduction The grid

Introduction Smart grid Smart meter

Proposed scheme Registration phase Authentication and key agreement phase

Proposed scheme - Notations Description SMi i th smart meter of the smart grid SPj j th service provider of the smart grid IDi Identity of SMi IDj Identity of SPj s Master key of SPj r1, r2, r3 High entropy random numbers h() Collision-resistant hash function ⊕ Exclusive-or operation || Concatenation operation Qi Unique identifier of SMi k Symmetric encryption key Ek()/Dk() Secure symmetric encryption/decryption algorithm with secret key k

Proposed scheme - Registration Smart Meter SMi Selects a random number r1 Service Provider SPj {IDi, r1}

Proposed scheme - Registration Smart Meter SMi Stores Mi, IDi, r1 Service Provider SPj Mi = Es((IDi⊕h(IDj || s)) || (r1⊕IDi)) Qi = h((IDi || IDj)⊕s⊕r1) Stores Qi into database {Mi}

Proposed scheme - Authentication and key agreement Smart Meter SMi Selects a random number r2 Xi = r2⊕h(IDi || r1) Service Provider SPj {Mi, Xi}

Proposed scheme - Authentication and key agreement Smart Meter SMi Service Provider SPj Ds(Mi) = (IDi⊕h(IDj || s)) || (r1⊕IDi) IDi* = IDi⊕h(IDj || s))⊕h(IDj || s) r1* = (r1⊕IDi)⊕IDi* Qi* = h((IDi* || IDj)⊕s⊕r1*) Searches Qi * in Qi dynamic string

Proposed scheme - Authentication and key agreement Smart Meter SMi Service Provider SPj r2* = Xi⊕h(IDi* || r1*) Mi’ = Es((IDi*⊕h(IDj || s)) || (r2*⊕ IDi*) Selects a random number r3 k = h(IDi*⊕r1*⊕r2*)

Proposed scheme - Authentication and key agreement Smart Meter SMi Service Provider SPj Authji = Ek((h((IDi*⊕r2*) || r1*)⊕r3) || h(IDi* || r1* || r2*) || Mi’) SKSP = h(IDi* || r1* || r2* || r3) {Authji}

Proposed scheme - Authentication and key agreement Smart Meter SMi k’ = h(IDi⊕r1⊕r2) Dk’(Authji) = (h((IDi*⊕r2*) || r1*)⊕r3) || h(IDi* || r1* || r2*) || Mi’ Checks h(IDi || r1 || r2) ?= h(IDi* || r1* || r2*) Service Provider SPj

Proposed scheme - Authentication and key agreement Smart Meter SMi r3* = (h((IDi*⊕r2*) || r1*)⊕r3)⊕ h((IDi⊕r2) || r1) SKSM = h(IDi || r1 || r2 || r3*) Authij = h(SKSM || r3*) Service Provider SPj {Authij}

Proposed scheme - Authentication and key agreement Smart Meter SMi Service Provider SPj Checks Authij ?= h(SKSP || r3) Qinew = h((IDi* || IDj)⊕s⊕r2*) Replaces (Qi, Qio) with (Qinew, Qi) Ackji = h(r2*⊕r3 || r1*) {Ackji}

Proposed scheme - Authentication and key agreement Smart Meter SMi Checks Ackji ?= h(r2⊕r3* || r1) Replaces (r1 , Mi) with (r2 , Mi’) Service Provider SPj

Experimental results - Security comparison Security property [9] [12] [16] [21] Proposed scheme Replay attack O Man-in-meddle attack Impersonation attack X Perfect forward secrecy Known-key security Session-key security Mutual authentication Smart meter anonymity - Smart meter untraceability De-synchronization attack Stolen verifier attack

Experimental results - Performance comparison Schemes Smart meter Service provider Total cost [9] 3Th + 1Td 3Th 6Th + 1Td [12] 3Th + 2Tm 4Th + 3Tm 7Th + 5Tm [16] 2Th + 3Tm+ 1Ta 5Th + 5Tm+ 1Ta [21] 3Th + 1Te +1Td + 2Tm+ 2Thmac 4Th + 1Te +1Td + 3Tm+ 2Thmac 7Th + 2Te +2Td + 5Tm+ 4Thmac Proposed scheme 7Th + 1Td 9Th + 1Td+ 2Te 16Th + 2Td+ 2Te Th : Time for the execution of a one-way hash function. Te / Td : Time for the execution of a symmetric encryption/ decryption operation. Tm : Time for the execution of a point multiplication operation of elliptic curve. Ta : Time for the execution of a point addition operation of elliptic curve. Thmac : Time for the execution of a Hash-based Message Authentication Code (HMAC) operation.

Experimental results - Performance comparison Schemes Smart meter Service provider Total cost [9] 0.047 ms 0.005 ms 0.052 ms [12] 14.868 ms 0.825 ms 15.693 ms [16] 15.014 ms 0.851 ms 15.965 ms [21] 16.346 ms 0.976 ms 17.306 ms Proposed scheme 0.245 ms 0.102 ms 0.347 ms Th : Time for the execution of a one-way hash function. Te / Td : Time for the execution of a symmetric encryption/ decryption operation. Tm : Time for the execution of a point multiplication operation of elliptic curve. Ta : Time for the execution of a point addition operation of elliptic curve. Thmac : Time for the execution of a Hash-based Message Authentication Code (HMAC) operation.

Experimental results - Performance comparison Operation BCM2836 Intel Pentium G850 SHA1 (16 Bytes) 7821 ns 1599 ns Xor (16 Bytes) 2561 ns 475 ns AES-128 encryption (16 Bytes) 17614 ns 3910 ns AES-128 decryption (16 Bytes) 23135 ns 4367 ns EC point multiplication (40 Bytes) 7396729 ns 270016 ns EC point addition (40 Bytes) 215588 ns 13670 ns EC point-to-hash (40 Bytes) 29229 ns 2806 ns

Experimental results - Communication cost comparison Schemes [9] [12] [16] [21] Proposed scheme Length(Bytes) 108 248 298 254 204 [9] Xia J., Wang Y. Secure key distribution for the smart grid IEEE Trans. Smart Grid, 3 (3) (2012), pp. 1437-1443 [12] Mohammadali A., Haghighi M., Tadayon M., Nodooshan A. A novel identity-based key establishment method for advanced metering infrastructure in smart grid IEEE Trans. Smart Grid, 9 (4) (2018), pp. 2834-2842 [16] Mahmood K., Chaudhry S.A., Naqvi H., Kumari S., Li X., Sangaiah A.K. An elliptic curve cryptography based lightweight authentication scheme for smart grid communication Future Gener. Comput. Syst., 81 (2018), pp. 557-565 [21] Kumar P., Gurtov A., Sain M., Martin A., Ha P. Lightweight authentication and key agreement for smart metering in smart energy networks IEEE Trans. Smart Grid (2018), pp. 1-11

Conclusions Anonymity and untraceability can be achieved with low computational cost. The proposed scheme is actually implemented on the Raspberry Pi and PC to show its feasibility and practicability.