IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v11y2022i1p48-d1012265.html
   My bibliography  Save this article

Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids

Author

Listed:
  • Masoumeh Safkhani

    (Faculty of Computer Engineering, Shahid Rajaee Teacher Training University, Tehran 16788-15811, Iran)

  • Nasour Bagheri

    (Electrical Engineering Department, Shahid Rajaee Teacher Training University, Tehran 16788-15811, Iran)

  • Saqib Ali

    (Department of Information Systems, College of Economics and Political Science, Sultan Qaboos University, Al Khoudh, Muscat P. C. 123, Oman)

  • Mazhar Hussain Malik

    (School of Computing and Creative Technologies, College of Arts, Technology and Environment (CATE), University of the West of England, Frenchay Campus, Coldharbour Lane, Bristol BS16 1QY, UK)

  • Omed Hassan Ahmed

    (Department of Information Technology, University of Human Development, Sulaymaniyah 0778-6, Iraq)

  • Mehdi Hosseinzadeh

    (Pattern Recognition and Machine Learning Lab, Gachon University, 1342 Seongnamdaero, Sujeong-gu, Seongnam 13120, Republic of Korea)

  • Amir H. Mosavi

    (John von Neumann Faculty of Informatics, Obuda University, 1034 Budapest, Hungary
    Institute of Information Engineering, Slovak University of Technology in Bratislava, 81243 Bratislava, Slovakia
    Institute of the Information Society, University of Public Service, 1083 Budapest, Hungary)

Abstract

Authentication protocols are often used in smart grids to deliver the necessary level of security. A huge number of clients in such a system, however, provides the attacker with the ability to clone them, for example. Device fingerprints, or Physically Unclonable Functions (PUF), have been investigated as an authentication feature to thwart such attacks. In order to accomplish the necessary security in smart grid neighborhood area network communications and to prevent unwanted physical access to smart meters, a former study designed a lightweight authentication system in this way. The suggested protocol uses PUFs to reduce physical attacks. As a consequence, the server/meter impersonation attack is one of the many assaults that this protocol is thought to be secure against. On the other hand, it is generally acknowledged that no security solution should be trusted unless its security has been verified by independent researchers. As a result, this paper assesses the security of this protocol against a typical adversary who has access to or influences over the messages carried over the public channel. This study demonstrates that the attacker is simply capable of impersonating the server for the meter and vice versa. In addition, the suggested attacks desynchronize them, making the adversary the only one capable of interacting with the meter in the role of the legal server rather than the latter. Each of the proposed attacks is extremely effective, and their success probability is almost 1. Finally, a modification is suggested that successfully fixes the protocol’s security weaknesses. The security proof of the improved protocol has been done through the Scyther tool. The computational cost comparison shows that the overhead of the proposed protocol compared to the former scheme is 4.85%, while it withstands various attacks, including traceability, desynchronization, impersonation, man-in-the-middle, and secret disclosure attacks.

Suggested Citation

  • Masoumeh Safkhani & Nasour Bagheri & Saqib Ali & Mazhar Hussain Malik & Omed Hassan Ahmed & Mehdi Hosseinzadeh & Amir H. Mosavi, 2022. "Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids," Mathematics, MDPI, vol. 11(1), pages 1-14, December.
  • Handle: RePEc:gam:jmathe:v:11:y:2022:i:1:p:48-:d:1012265
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/11/1/48/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/11/1/48/
    Download Restriction: no
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Hisham Alasmary & Muhammad Tanveer, 2023. "ESCI-AKA: Enabling Secure Communication in an IoT-Enabled Smart Home Environment Using Authenticated Key Agreement Framework," Mathematics, MDPI, vol. 11(16), pages 1-25, August.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:11:y:2022:i:1:p:48-:d:1012265. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.