Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Internet of Things (IoTs) is a promising technology that combines communication and data networking. Integration of Smart Grids (SGs) and IoT will fulfill an increased demand for energy requirements by transforming the reliable and efficient traditional power grids. The SG enables bi-directional transmission between the Service Provider (SP) and Smart Meter (SM) to send and receive information regarding electricity consumption over a public channel. The public channel allows an adversary to intercept the information exchanged between them and tamper with the SM as it is installed outside which leads to forging or modification of the messages and privacy violation. In addition, the SM has limited computational and storage capacity. To protect SM privacy and securely communicate in the SG network, Physically Unclonable Functions (PUFs) based Authentication and Key Agreement (AKA) schemes were suggested in the literature. However, they may suffer from the machine learning modeling attack and several other security issues. Thus, we propose a finite state machine enabled controlled PUF based AKA (PF-AKA) Framework for the IoT based SG (IoT-SG) network. The PF-AKA framework is verified formally using the Real-or-Random (RoR) model, AVISPA tool, and BAN logic. It shows that PF-AKA achieves the security requirements along with protection from the SM physical and modeling attacks. The performance analysis is carried out and it represents that the PF-AKA yields competitive computation and communication costs compared to AKA schemes in the literature for the IoT-SG network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

Not applicable

References

  1. Goudarzi, A., Ghayoor, F., Waseem, M., Fahad, S., Traore, I.: A survey on IoT-enabled smart grids: Emerging, applications, challenges, and outlook. Energies 15(19), 6984 (2022)

    Article  Google Scholar 

  2. Alavikia, Z., Shabro, M.: A comprehensive layered approach for implementing internet of things-enabled smart grid: a survey. Digit. Commun. Netw. 8(3), 388–410 (2022)

    Article  Google Scholar 

  3. Gunduz, M.Z., Das, R.: Cyber-security on smart grid: threats and potential solutions. Comput. Netw. 169, 107094 (2020)

    Article  Google Scholar 

  4. Sakhnini, J., Karimipour, H., Dehghantanha, A., Parizi, R.M., Srivastava, G.: Security aspects of internet of things aided smart grids: a bibliometric survey. Internet Things 14, 100111 (2021)

    Article  Google Scholar 

  5. Dharmadhikari, S.C., Gampala, V., Rao, C.M., Khasim, S., Jain, S., Bhaskaran, R.: A smart grid incorporated with ml and IoT for a secure management system. Microprocess. Microsyst. 83, 103954 (2021)

    Article  Google Scholar 

  6. Tomar, A., Tripathi, S.: Blockchain-assisted authentication and key agreement scheme for fog-based smart grid. Clust. Comput. 25, 1–18 (2022)

    Article  Google Scholar 

  7. Kimani, K., Oduol, V., Langat, K.: Cyber security challenges for IoT based smart grid networks. Int. J. Crit. Infrastruct. Prot. 25, 36–49 (2019)

    Article  Google Scholar 

  8. Halle, P.D., Shiyamala, S.: Secure advance metering infrastructure protocol for smart grid power system enabled by the internet of things. Microprocess. Microsyst. 95, 104708 (2022)

    Article  Google Scholar 

  9. Mahmood, K., Chaudhry, S.A., Naqvi, H., Shon, T., Ahmad, H.F.: A lightweight message authentication scheme for smart grid communications in power sector. Comput. Electr. Eng. 52, 114–124 (2016)

    Article  Google Scholar 

  10. Zahoor, A., Mahmood, K., Shamshad, S., Saleem, M.A., Ayub, M.F., Conti, M., Das, A.K.: An access control scheme in IoT-enabled smart-grid systems using blockchain and PUF. Internet Things 22, 100708 (2023)

    Article  Google Scholar 

  11. Al-Turjman, F., Abujubbeh, M.: IoT-enabled smart grid via SM: an overview. Future Gener. Comput. Syst. 96, 579–590 (2019)

    Article  Google Scholar 

  12. Tahavori, M., Moazami, F.: Lightweight and secure PUF-based authenticated key agreement scheme for smart grid. Peer Peer Netw. Appl. 13(5), 1616–1628 (2020)

    Article  Google Scholar 

  13. Mahmood, K., Chaudhry, S.A., Naqvi, H., Shon, T., Ahmad, H.F.: A lightweight message authentication scheme for smart grid communications in power sector. Comput. Electr. Eng. 52, 114–124 (2016)

    Article  Google Scholar 

  14. Safkhani, M., Kumari, S., Shojafar, M., Kumar, S.: An authentication and key agreement scheme for smart grid. Peer Peer Netw. Appl. 15(3), 1595–1616 (2022)

    Article  Google Scholar 

  15. Gope, P., Sikdar, B.: A privacy-aware reconfigurable authenticated key exchange scheme for secure communication in smart grids. IEEE Trans. Smart Grid 12(6), 5335–5348 (2021)

    Article  Google Scholar 

  16. Tsai, J.L., Lo, N.W.: Secure anonymous key distribution scheme for smart grid. IEEE Trans Smart Grid 7(2), 906–914 (2015)

    Google Scholar 

  17. Yu, S., Park, K.: ISG-SLAS: secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor. J. Syst. Archit. 131, 102698 (2022)

    Article  Google Scholar 

  18. Shukla, S., Patel, S.J.: A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture. Clust. Comput. (2023). https://doi.org/10.1007/s10586-023-04034-6

    Article  Google Scholar 

  19. Khan, A.A., Kumar, V., Ahmad, M., Rana, S., Mishra, D.: PALK: password-based anonymous lightweight key agreement framework for smart grid. Int. J. Electr. Power Energy Syst. 121, 106121 (2020)

    Article  Google Scholar 

  20. Roy, S., Das, D., Mondal, A., Mahalat, M.H., Sen, B., Sikdar, B.: PLAKE: PUF based secure lightweight authentication and key exchange protocol for IoT. IEEE Internet Things J. (2022). https://doi.org/10.1109/JIOT.2022.3202265

    Article  Google Scholar 

  21. Zheng, Y., Liu, W., Gu, C., Chang, C.H.: PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications. IEEE Trans. Dependable Secur. Comput. (2022). https://doi.org/10.1109/TDSC.2022.3193570

    Article  Google Scholar 

  22. Gope, P., Sikdar, B.: Privacy-aware authenticated key agreement scheme for secure smart grid communication. IEEE Trans. Smart Grid 10(4), 3953–3962 (2018)

    Article  Google Scholar 

  23. Bian, W., Gope, P., Cheng, Y., Li, Q.: Bio-AKA: an efficient fingerprint based two factor user authentication and key agreement scheme. Future Gener. Comput. Syst. 109, 45–55 (2020)

    Article  Google Scholar 

  24. Gope, P.: PMAKE: privacy-aware multi-factor authenticated key establishment scheme for advance metering infrastructure in smart grid. Comput. Commun. 152, 338–344 (2020)

    Article  Google Scholar 

  25. Rührmair, U., Sehnke, F., Sölter, J., Dror, G., Devadas, S., Schmidhuber, J.: In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 237–249 (2010)

  26. Anandakumar, N.N., Hashmi, M.S., Sanadhya, S.K.: Efficient and lightweight FPGA-based hybrid PUFS with improved performance. Microprocess. Microsyst. 77, 103180 (2020)

    Article  Google Scholar 

  27. Fard, S.S., Kaveh, M., Mosavi, M.R., Ko, S.B.: An efficient modeling attack for breaking the security of XOR-arbiter PUFS by using the fully connected and long-short term memory. Microprocess. Microsyst. 94, 104667 (2022)

    Article  Google Scholar 

  28. Mahmood, K., Li, X., Chaudhry, S.A., Naqvi, H., Kumari, S., Sangaiah, A.K., Rodrigues, J.J.: Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure. Future Gener. Comput. Syst. 88, 491–500 (2018)

    Article  Google Scholar 

  29. Garg, S., Kaur, K., Kaddoum, G., Rodrigues, J.J., Guizani, M.: Secure and lightweight authentication scheme for smart metering infrastructure in smart grid. IEEE Trans. Ind. Inf. 16(5), 3548–3557 (2019)

    Article  Google Scholar 

  30. Odelu, V., Das, A.K., Wazid, M., Conti, M.: Provably secure authenticated key agreement scheme for smart grid. IEEE Trans. Smart Grid 9(3), 1900–1910 (2016)

    Google Scholar 

  31. Chim, T.W., Yiu, S.M., Hui, L.C., Li, V.O.: In: 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 196–201. IEEE (2011)

  32. Fouda, M.M., Fadlullah, Z.M., Kato, N., Lu, R., Shen, X.S.: A lightweight message authentication scheme for smart grid communications. IEEE Trans. Smart Grid 2(4), 675–685 (2011)

    Article  Google Scholar 

  33. Abbasinezhad-Mood, D., Nikooghadam, M.: An anonymous ECC-based self-certified key distribution scheme for the smart grid. IEEE Trans. Ind. Electron. 65(10), 7996–8004 (2018)

    Article  Google Scholar 

  34. Khan, A.A., Kumar, V., Ahmad, M., Rana, S.: LAKAF: lightweight authentication and key agreement framework for smart grid network. J. Syst. Archit. 116, 102053 (2021)

  35. Mahmood, K., Chaudhry, S.A., Naqvi, H., Kumari, S., Li, X., Sangaiah, A.K.: An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Gener. Comput. Syst. 81, 557–565 (2018)

    Article  Google Scholar 

  36. Gope, P., Millwood, O., Sikdar, B.: A scalable protocol level approach to prevent machine learning attacks on physically unclonable function based authentication mechanisms for internet of medical things. IEEE Trans. Ind. Inf. 18(3), 1971–1980 (2021)

    Article  Google Scholar 

  37. Gassend, B., Dijk, M.V., Clarke, D., Torlak, E., Devadas, S., Tuyls, P.: Controlled physical random functions and applications. ACM Trans. Inf. Syst. Secur. (TISSEC) 10(4), 1–22 (2008)

    Article  Google Scholar 

  38. Gassend, B., Clarke, D., Van Dijk, M., Devadas, S.: In: 18th Annual Computer Security Applications Conference Proceedings, pp. 149–160. IEEE (2002)

  39. Gao, Y., Ma, H., Al-Sarawi, S.F., Abbott, D., Ranasinghe, D.C.: PUF-FSM: a controlled strong PUF. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(5), 1104–1108 (2017)

    Google Scholar 

  40. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)

    Article  MathSciNet  Google Scholar 

  41. Sadhukhan, D., Ray, S., Obaidat, M.S., Dasgupta, M.: A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography. J. Syst. Archit. 114, 101938 (2021)

    Article  Google Scholar 

  42. Viganò, L.: Automated security protocol analysis with the AVISPA tool. Electron. Notes Theor. Comput. Sci. 155, 61–86 (2006)

    Article  Google Scholar 

  43. Khalid, B., Qureshi, K.N., Ghafoor, K.Z., Jeon, G.: An improved biometric based user authentication and key agreement scheme for intelligent sensor based wireless communication. Microprocess. Microsyst. 96, 104722 (2023)

    Article  Google Scholar 

Download references

Funding

Not applicable

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prarthana J. Mehta.

Ethics declarations

Conflict of interest

This is the original work of the authors and has not been submitted simultaneously elsewhere. All the authors have checked the manuscript and have agreed to the submission in Cluster Computing Journal. There is no conflict of interest between the authors. The authors have not disclosed any conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix A: The role of smart meter and service provider are defined in HLPSL code

Appendix A: The role of smart meter and service provider are defined in HLPSL code

figure d
figure e
figure f
figure g
figure h

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mehta, P.J., Parne, B.L. & Patel, S.J. PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks. Cluster Comput 27, 8099–8117 (2024). https://doi.org/10.1007/s10586-024-04395-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-024-04395-6

Keywords