Lightweight and secure PUF-based authenticated key agreement scheme for smart grid

  • PDF / 1,565,291 Bytes
  • 13 Pages / 595.276 x 790.866 pts Page_size
  • 57 Downloads / 204 Views

DOWNLOAD

REPORT


Lightweight and secure PUF-based authenticated key agreement scheme for smart grid Mahdi Tahavori 1 & Farokhlagha Moazami 1 Received: 10 July 2019 / Accepted: 26 March 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract Smart Grid technology with the help of Information Technology (IT) adds many benefits to the traditional grids, but security concerns and especially privacy preserving of users is still a major practical issue. Establishing a secure and reliable communication channel between smart meters and service provider can guarantee data privacy in AMI network. This secure channel can be established with data encryption using a session key which is generated during an authentication scheme. This scheme should be enough lightweight to implement on resource constrained smart meters in delay sensitive AMI network. In this work, we analyze proposed PUF-based authenticated key agreement scheme by Gope et al. and show that their scheme is vulnerable in CK-adversary model and does not provide session key secrecy and backward secrecy. We propose an end-to-end PUF-based key agreement scheme between smart meters and service provider in AMI network which is secure against physical tampering attack and also it provides security in CKAdversary model for ephemeral leakage attack. Our scheme imposes low communication and computational costs to smart meters. We analyze the security of our proposed scheme against popular attacks and verify its security by using widely accepted scyther tool. Keywords Smart Grid . Authenticated session key . Resource constrained smart meters . CK-Adversary model . Physically Uncloneable Function . Tampering . Scyther tool

1 Introduction Smart Grid is predicted to significantly improve efficiency of existing electric grid through the incorporation of data networking and communication technologies. At the generation and consumer sides, via incorporation of renewable energy sources into the grid, it provides more accurate real-time monitoring, optimization of power flows and more environmentally green energy generation [1, 2]. Since maximum utilization of information technology is done in smart grid for achieving a more reliable power generation and delivery [3], vulnerability of data network to various kinds of cyber

* Farokhlagha Moazami [email protected] Mahdi Tahavori [email protected] 1

Cyberspace Research Institute, University of Shahid Beheshti (SBU), Tehran, Iran

security attacks may result different levels of damage to the devices and even worse to the society at large [4]. Smart meters in smart homes, aggregators in data network and the Meter Data Management System (MDMS) in management layer are the most important parts of Advanced Metering Infrastructure (AMI) in smart grid which connects millions of homes to smart grid [5–7]. It is obvious that the impact of cyber attacks can cause a significant loss or harm, e.g., by altering the customer billing information or changing the pricing information sent to the customers and even causing a domain