Skip to main content

Design Flaws and Cryptanalysis of Elliptic Curve Cryptography-Based Lightweight Authentication Scheme for Smart Grid Communication

  • Conference paper
  • First Online:
Advances in Data Sciences, Security and Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 612))

Abstract

An authentication framework gives security demand in communication between user to user, user to station, user to substation, substation to another substation, user to thrust authority, and substation to thrust authority in smart grid environment. In smart grid communications, a suitable authority provides electricity updation and secure power connectivity in smart cities. In smart grid communication, an elliptic curve cryptography-based authentication protocol for smart grid communication is published by Mahmood et al. (J Futur Gener Comput Syst 81:557–565, 2018 [1]). We reviewed their framework and found security weaknesses such as fails to protect the session key, guessing identity attack, insider attack, user anonymity, impersonation attack, stolen device attack, lack of login phase, lack of password information, and clock synchronization problem. Thus, Mahmood et al. scheme is not suitable for smart grid environment. Hence, we proposed a possible solution for Mahmood et al. scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mahmood K, Chaudhry SA, Naqvi H, Kumari S, Li X, Sangaiah AK (2018) An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Futur Gener Comput Syst 81:557–565. https://doi.org/10.1016/j.future.2017.05.002

    Article  Google Scholar 

  2. Thomas MS, McDonald JD (2015) Power system SCADA and smart grids. CRC Press

    Google Scholar 

  3. Vaidya B, Makrakis D, Mouftah H (2013) Secure communication mechanism for ubiquitous smart grid infrastructure. J Supercomput 64(2):435–455

    Article  Google Scholar 

  4. Fan C-I, Huang S-Y, Artan W (2013) Design and implementation of privacy preserving billing protocol for smart grid. J Supercomput 66(2):841–862

    Article  Google Scholar 

  5. Vaidya B, Makrakis D, Mouftah H (2013) Secure and robust multipath routings for advanced metering infrastructure. J Supercomput 66(2):1071–1092

    Article  Google Scholar 

  6. Al-Agtash S (2013) Electricity agents in smart grid markets. Comput Ind 64(3):235–241

    Article  Google Scholar 

  7. Gao Q (2012) Biometric authentication in smart grid. In: 2012 International energy and sustainability conference (IESC). IEEE, pp 1–5

    Google Scholar 

  8. Fouda MM, Fadlullah ZM, Kato N, Lu R, Shen XS (2011) A lightweight message authentication scheme for smart grid communications. IEEE Trans Smart Grid 2(4):675–685

    Article  Google Scholar 

  9. Chim TW, Yiu S-M, Hui LC, Li VO (2011) Pass: privacy-preserving authentication scheme for smart grid network. In: 2011 IEEE international conference on smart grid communications (SmartGridComm). IEEE, pp 196–201

    Google Scholar 

  10. Nicanfar H, Leung VC (2014) Password-authenticated cluster-based group key agreement for smart grid communication. Secur Commun Netw 7(1) :221–233

    Article  Google Scholar 

  11. Nicanfar H, Leung VC (2013) Multilayer consensus ecc-based password authenticated key-exchange (mcepak) protocol for smart grid system. IEEE Trans Smart Grid 4(1):253–264

    Article  Google Scholar 

  12. Kumar V, Jangirala S, Ahmad M (2018) An efficient mutual authentication framework for healthcare system in cloud computing. J Med Syst 42(8):142

    Article  Google Scholar 

  13. Kumar V, Ahmad M, Kumar P (2019) An identity-based authentication framework for big data security. In: Proceedings of 2nd international conference on communication, computing and networking. Springer, pp 63–71

    Google Scholar 

  14. Kumar V, Ahmad M, Kumari A, A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted tmis, Telematics and Informatics

    Google Scholar 

  15. Stallings W (2006) Cryptography and Network Security, 4/E, Pearson Education India

    Google Scholar 

  16. Kumar V, Ahmad M, Kumari A, Kumar P (2017) A study of pairing-free identity-based mutual authentication protocol for cloud computing. Int J Eng Res Appl 7(7):10–14 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vinod Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, V., Khan, A.A., Ahmad, M. (2020). Design Flaws and Cryptanalysis of Elliptic Curve Cryptography-Based Lightweight Authentication Scheme for Smart Grid Communication. In: Jain, V., Chaudhary, G., Taplamacioglu, M., Agarwal, M. (eds) Advances in Data Sciences, Security and Applications. Lecture Notes in Electrical Engineering, vol 612. Springer, Singapore. https://doi.org/10.1007/978-981-15-0372-6_13

Download citation

Publish with us

Policies and ethics