Skip to main content
Log in

An anonymous key agreement protocol with robust authentication for smart grid infrastructure

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Conclusion

This letter claimed that Mahmood et al.’s scheme still exhibited some vulnerabilities. Concretely, their scheme cannot withstand an impersonation attack and fails to realize perfect forward secrecy and mutual authentication with the absence of the trusted authority. Moreover, their scheme could suffer from an ephemeral key compromise attack under the CK threat model. We, therefore, fixed those weaknesses and proposed a new security-enhanced scheme where we changed the session keys’ format and added robust authentication between the smart meter and utility control. The computation cost, however, is higher in the new scheme (seen in Appendix D) and we do not solve the key escrow problem. In the future, we wish to design protocol with computation cost declined and give solutions to the key escrow problem for the smart grid infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Wang Y. Password protected smart card and memory stick authentication against off-line dictionary attacks. In: Proceedings of IFIP International Information Security Conference. Berlin: Springer, 2012. 489–500

    Google Scholar 

  2. Tsai J L, Lo N W. Secure anonymous key distribution scheme for smart grid. IEEE Trans Smart Grid, 2015, 7: 906–914

    Google Scholar 

  3. Chen Y, Martinez J F, Castillejo P, et al. A bilinear map pairing based authentication scheme for smart grid communications: PAuth. IEEE Access, 2019, 7: 22633–22643

    Article  Google Scholar 

  4. Guan Z T, Zhang Y, Zhu L H, et al. EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid. Sci China Inf Sci, 2019, 62: 032103

    Article  Google Scholar 

  5. Mahmood K, Li X, Chaudhry S A, et al. Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure. Future Generation Comput Syst, 2018, 88: 491–500

    Article  Google Scholar 

  6. Canetti R, Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2001. 453–474

    MATH  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. U1708262, U1736203, 61872449).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinghua Li.

Supplementary File

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, T., Cheng, Q. & Li, X. An anonymous key agreement protocol with robust authentication for smart grid infrastructure. Sci. China Inf. Sci. 65, 199101 (2022). https://doi.org/10.1007/s11432-019-2736-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-019-2736-5

Navigation