ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids


Creative Commons License

Tanveer M., Khan A. U., Shah H., Alkhayyat A., Chaudhry S. A., Ahmad M.

IEEE Access, vol.9, pp.143366-143377, 2021 (SCI-Expanded) identifier

  • Publication Type: Article / Article
  • Volume: 9
  • Publication Date: 2021
  • Doi Number: 10.1109/access.2021.3121291
  • Journal Name: IEEE Access
  • Journal Indexes: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Compendex, INSPEC, Directory of Open Access Journals
  • Page Numbers: pp.143366-143377
  • Keywords: AEAD, Authenticated encryption, authentication, privacy, security, smart Grid
  • Istanbul Gelisim University Affiliated: Yes

Abstract

© 2013 IEEE.Internet of Things-enabled smart grid (SG) technology provides ample advantages to traditional power grids. In an SG system, the smart meter (SM) is the critical component that collects the power usage information related to users and delivers the accumulated vital information to the central service provider (CSP) via the Internet. The information is exposed to numerous pernicious security threats. Consequently, it is crucial to preserve the integrity of the communication between SMs and CSP for the smooth running of the SG system. Authentication protocol effectively enables SM and CSP to communicate securely by establishing a secure channel. Therefore, this paper presents an anonymous and reliable authentication protocol for SG (ARAP-SG) to enable secure and reliable information exchange between SM and CSP. The proposed ARAP-SG uses the hash function, elliptic curve cryptography, and symmetric encryption to complete the authentication phase. Consequently, ARAP-SG guarantees reliable information exchange during the authentication phase while conserving the anonymity of both SP and SM. Additionally, ARAP-SG authorizes CSP and SM to construct a session key (SK) after accomplishing the authentication phase for undecipherable information exchange in the future. We utilize the random oracle model to corroborate the security of the constructed SK in ARAP-SG. Moreover, by effectuating informal security analysis, it is manifested that ARAP-SG is proficient in thwarting covert security attacks. Furthermore, Scyther-based analysis is conducted to manifest that ARAP-SG is secure. Finally, through a comparative analysis with relevant authentication protocols, it is explained and shown that ARAP-SG entails 25.5-56.76% and 7.69-49.47% low computational and communication overheads, respectively, with improved security properties.