Skip to main content

Advertisement

Log in

Secure and efficient mutual authentication protocol for smart grid under blockchain

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Smart grid has been acknowledged as the next-generation intelligent network that optimizes energy efficiency. Primarily through a bidirectional communication channel, suppliers and users can dynamically adjust power transmission in real time. Nonetheless, many security issues occur with the widespread deployment of smart grid, e.g., centralized register authority and potential Distributed-Denial-of-Service (DDoS) attack. These existing problems threaten the availability of smart grid. In this paper, we mainly focus on solving some identity authentication issues remained in the smart grid. Combined with blockchain, Elliptic Curve Cryptography (ECC), dynamic Join-and-Exit mechanism and batch verification, a reliable and efficient authentication protocol is proposed for smart meters and utility centers. Simultaneously, the provable security of this protocol is assured by the computational hard problem assumptions. Experiment results show that our protocol has achieved security and performance improvement compared with the other ECC related schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Huang H, Ding S, Zhao L, Huang H, Chen L, Gao H, Ahmed S H (2020) Real-time fault detection for iiot facilities using gbrbm-based dnn. IEEE Internet Things J 7(7):5713–5722

    Article  Google Scholar 

  2. Guan Z, Zhang Y, Zhu L, Wu L, Yu S (2019) Effect: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid. Sci China Inf Sci 62(3):32103

    Article  Google Scholar 

  3. Defense Use Case (2016) Analysis of the cyber attack on the Ukrainian power grid

  4. Garg S, Kaur K, Kaddoum G, Rodrigues JJPC, Guizani M (2019) Secure and lightweight authentication scheme for smart metering infrastructure in smart grid. IEEE Trans Ind Inf 16(5):3548–3557. IEEE

    Article  Google Scholar 

  5. Tsai J-L, Lo N-W (2015) Secure anonymous key distribution scheme for smart grid. IEEE Trans Smart Grid 7(2):906–914

    Google Scholar 

  6. He D, Wang H, Khan M K, Wang L (2016) Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun 10(14):1795–1802

    Article  Google Scholar 

  7. Song J, Zhong Q, Wang W, Su C, Tan Z, Liu Y (2020) FPDP: flexible privacy-preserving data publishing scheme for smart agriculture. IEEE Sens J. IEEE

  8. He D, Zeadally S, Xu B, Huang X (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans Inf Forens Secur 10(12):2681–2691

    Article  Google Scholar 

  9. Nakamoto S (2019) Bitcoin: a peer-to-peer electronic cash system. Technical report Manubot

  10. Huang H, Zhou S, Lin J, Zhang K, Guo S (2020) Bridge the trustworthiness gap amongst multiple domains: a practical blockchain-based approach. In: Proceedings of the 11th IEEE international conference on communications (ICC), pp 1–6

  11. Wang W, Su C (2020) Ccbrsn: a system with high embedding capacity for covert communication in bitcoin. In: IFIP international conference on ICT systems security and privacy protection. Springer, pp 324–337

  12. Zhang L, Zhang Z, Wang W, Waqas R, Zhao C, Kim S, Chen H (2020) A covert communication method using special bitcoin addresses generated by vanitygen. CMC-Comput Mater Contin 65(1):597–616

    Article  Google Scholar 

  13. Li Z, Yang Z, Xie S, Chen W, Liu K (2019) Credit-based payments for fast computing resource trading in edge-assisted internet of things. IEEE Internet Things J 6(4):6606–6617

    Article  Google Scholar 

  14. Singh A, Parizi RM, Zhang Q, Choo K-K R, Dehghantanha A (2020) Blockchain smart contracts formalization: approaches and challenges to address vulnerabilities. Comput Secur 88 :101654

    Article  Google Scholar 

  15. Odelu V, Das A K, Wazid M, Conti M (2016) Provably secure authenticated key agreement scheme for smart grid. IEEE Trans Smart Grid 9(3):1900–1910

    Google Scholar 

  16. Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 453–474

  17. Chan AC-F, Zhou J (2014) Cyber–physical device authentication for the smart grid electric vehicle ecosystem. IEEE J Sel Areas Commun 32(7):1509–1517

    Article  Google Scholar 

  18. Wazid M, Das A K, Kumar N, Rodrigues J JPC (2017) Secure three-factor user authentication scheme for renewable-energy-based smart grid environment. IEEE Trans Ind Inf 13(6):3144–3153

    Article  Google Scholar 

  19. Li X, Wu F, Kumari S, Xu L, Sangaiah A K, Choo K-K R (2019) A provably secure and anonymous message authentication scheme for smart grids. J Parallel Distrib Comput 132:242–249

    Article  Google Scholar 

  20. Wu L, Wang J, Zeadally S, He D (2019) Anonymous and efficient message authentication scheme for smart grid. Secur Commun Netw, 2019. Hindawi

  21. Kumar N, Aujla G S, Das A K, Conti M (2019) Eccauth: a secure authentication protocol for demand response management in a smart grid system. IEEE Trans Ind Inf 15(12):6572–6582

    Article  Google Scholar 

  22. Wang J, Wu L, Choo K-K R, He D (2019) Blockchain based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Trans Ind Inf 16(3):1984–1992. IEEE

    Article  Google Scholar 

  23. Lin C, He D, Huang X, Khan M K, Choo K-KR (2020) Dcap: a secure and efficient decentralized conditional anonymous payment system based on blockchain. IEEE Trans Inf Forens Secur 15:2440–2452

    Article  Google Scholar 

  24. Ma S, Yi D, He D, Zhang J, Xie X (2020) An efficient nizk scheme for privacy-preserving transactions over account-model blockchain. IEEE Trans Dependable Secure Comput. https://doi.org/10.1109/TDSC.2020.2969418

  25. Feng Q, He D, Zeadally S, Khan M K, Kumar N (2019) A survey on privacy protection in blockchain system. J Netw Comput Appl 126:45–58

    Article  Google Scholar 

  26. Lu Z, Yeh K-H, Hancke G, Liu Zhe, Su C (2018) Security and privacy for the industrial internet of things: an overview of approaches to safeguarding endpoints. IEEE Signal Process Mag 35(5):76–87

    Article  Google Scholar 

  27. Su C, Santoso B, Li Y, Deng R H, Huang X (2015) Universally composable rfid mutual authentication. IEEE Trans Depend Secure Comput 14(1):83–94

    Google Scholar 

  28. Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13 (3):361–396

    Article  Google Scholar 

  29. Jia X, He D, Kumar N, Choo K-K R (2019) A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst J 14(1):560–571

    Article  Google Scholar 

Download references

Acknowledgements

This work is partly supported by JSPS Kiban(B) 18H03240, JSPS Kiban(C) 18K11298, Natural Science Foundation of Heilongjiang Province of China under Grant No. LC2016024, Natural Science Foundation of the Jiangsu Higher Education Institutions under Grant No. 17KJB520044 and Six Talent Peaks Project in Jiangsu Province No.XYDXX-108, and the National Natural Science Foundation of China under Grant 62001126.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Huakun Huang or Chunhua Su.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article belongs to the Topical Collection: Special Issue on Blockchain for Peer-to-Peer Computing

Guest Editors: Keping Yu, Chunming Rong, Yang Cao, and Wenjuan Li

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, W., Huang, H., Zhang, L. et al. Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer-to-Peer Netw. Appl. 14, 2681–2693 (2021). https://doi.org/10.1007/s12083-020-01020-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-01020-2

Keywords

Navigation