scholarly journals A Lightweight Authentication Scheme for V2G Communications: A PUF-Based Approach Ensuring Cyber/Physical Security and Identity/Location Privacy

Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1479
Author(s):  
Masoud Kaveh ◽  
Diego Martín ◽  
Mohammad Reza Mosavi

Vehicle-to-grid (V2G) technology has become a promising concept for the near future smart grid eco-system. V2G improves smart grid resiliency by enabling two-way communication and electricity flows while reducing the greenhouse gases emission. V2G practicality and stability is strongly based on the exchanged data between electrical vehicles (EVs) and the grid server (GS). However, using communication protocols to exchange vital information leads grid to being vulnerable against various types of attack. To prevent the well-known attacks in V2G network, this paper proposes a privacy-aware authentication scheme that ensures data integrity, confidentiality, users’ identity and location privacy, mutual authentication, and physical security based on physical unclonable function (PUF). Furthermore, the performance analysis shows that the proposed scheme outperforms the state-of-the-art, since EVs only use lightweight cryptographic primitives for every protocol execution.


2017 ◽  
Vol 13 (2) ◽  
pp. 155014771769417 ◽  
Author(s):  
Lili Yan ◽  
Yan Chang ◽  
Shibin Zhang

Smart grid is a modernized electrical grid. It is used to collect information about behaviors of suppliers and consumers and improve the efficiency, reliability, and economics of electricity. Recently, advanced metering infrastructure is proposed as a critical part of the smart grid. The security of advanced metering infrastructure is special importance for smart grid. In order to achieve data confidentiality, privacy, and authentication in advanced metering infrastructure, a lightweight authentication and key agreement scheme is proposed in this article. The scheme provides mutual authentication, key agreement, key refreshment, and multicast mechanism which can prevent various attacks. Furthermore, we analyze the security and performance of the scheme. The analysis shows that the proposed scheme is suitable for smart grid.



2019 ◽  
Vol 100 ◽  
pp. 770-778 ◽  
Author(s):  
Liping Zhang ◽  
Lanchao Zhao ◽  
Shuijun Yin ◽  
Chi-Hung Chi ◽  
Ran Liu ◽  
...  


IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Saeed Aghapour ◽  
Masoud Kaveh ◽  
Mohammad Reza Mosavi ◽  
Diego Martin


2018 ◽  
Vol 81 ◽  
pp. 557-565 ◽  
Author(s):  
Khalid Mahmood ◽  
Shehzad Ashraf Chaudhry ◽  
Husnain Naqvi ◽  
Saru Kumari ◽  
Xiong Li ◽  
...  


2020 ◽  
Vol 10 (5) ◽  
pp. 1758 ◽  
Author(s):  
SungJin Yu ◽  
KiSung Park ◽  
JoonYoung Lee ◽  
YoungHo Park ◽  
YoHan Park ◽  
...  

With the development in wireless communication and low-power device, users can receive various useful services such as electric vehicle (EV) charging, smart building, and smart home services at anytime and anywhere in smart grid (SG) environments. The SG devices send demand of electricity to the remote control center and utility center (UC) to use energy services, and UCs handle it for distributing electricity efficiently. However, in SG environments, the transmitted messages are vulnerable to various attacks because information related to electricity is transmitted over an insecure channel. Thus, secure authentication and key agreement are essential to provide secure energy services for legitimate users. In 2019, Kumar et al. presented a secure authentication protocol for demand response management in the SG system. However, we demonstrate that their protocol is insecure against masquerade, the SG device stolen, and session key disclosure attacks and does not ensure secure mutual authentication. Thus, we propose a privacy-preserving lightweight authentication protocol for demand response management in the SG environments to address the security shortcomings of Kumar et al.’s protocol. The proposed protocol withstands various attacks and ensures secure mutual authentication and anonymity. We also evaluated the security features of the proposed scheme using informal security analysis and proved the session key security of proposed scheme using the ROR model. Furthermore, we showed that the proposed protocol achieves secure mutual authentication between the SG devices and the UC using Burrows–Abadi–Needham (BAN) logic analysis. We also demonstrated that our authentication protocol prevents man-in-the-middle and replay attacks utilizing AVISPA simulation tool and compared the performance analysis with other existing protocols. Therefore, the proposed scheme provides superior safety and efficiency other than existing related protocols and can be suitable for practical SG environments.



2021 ◽  
Vol 21 (3) ◽  
pp. 1-19
Author(s):  
Shehzad Ashraf Chaudhry ◽  
Azeem Irshad ◽  
Khalid Yahya ◽  
Neeraj Kumar ◽  
Mamoun Alazab ◽  
...  

The advancements in the internet of things (IoT) require specialized security protocols to provide unbreakable security along with computation and communication efficiencies. Moreover, user privacy and anonymity has emerged as an integral part, along with other security requirements. Unfortunately, many recent authentication schemes to secure IoT-based systems were either proved as vulnerable to different attacks or prey of inefficiencies. Some of these schemes suffer from a faulty design that happened mainly owing to undue emphasis on privacy and anonymity alongside performance efficiency. This article aims to show the design faults by analyzing a very recent hash functions-based authentication scheme for cloud-based IoT systems with misunderstood privacy cum efficiency tradeoff owing to an unadorned design flaw, which is also present in many other such schemes. Precisely, it is proved in this article that the scheme of Wazid et al. cannot provide mutual authentication and key agreement between a user and a sensor node when there exists more than one registered user. We then proposed an improved scheme and proved its security through formal and informal methods. The proposed scheme completes the authentication cycle with a minor increase in computation cost but provides all security goals along with privacy.



2021 ◽  
Vol 34 (8) ◽  
Author(s):  
Jegadeesan Subramani ◽  
Dhamodaran Muneeswaran ◽  
Azees Maria ◽  
Murugan Arunachalam ◽  
Ramesh Babu Neelagandan


Sign in / Sign up

Export Citation Format

Share Document