Skip to main content
Top
Published in: International Journal of Information Security 1/2024

31-08-2023 | Regular Contribution

Security assessment and improvement of smart grid NIKE protocol

Authors: Tao Feng, Wentao Jin, Minghu Zhang, Lu Zheng

Published in: International Journal of Information Security | Issue 1/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Advanced metering infrastructure (AMI) is a fundamental functional module of Smart Grid that supports mutual communication between customers and electric companies. In order to secure AMI communication, scholars have proposed many key management schemes, some of which suffer from security issues or high costs. Recently, Mohammadali et al. proposed a key establishment NIKE protocol based on Elliptic Curve Cryptography. In this paper, we demonstrate that the protocol is vulnerable to both replay and tampering attacks and does not provide user anonymity. For the security vulnerabilities of the NIKE protocol, we propose an improvement scheme. And the proposed scheme is analyzed and verified for security based on the random oracle model and formal tools. Finally, we perform performance analysis of the improved scheme and the results show that the scheme has low communication and computation costs.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Benmalek, M., Challal, Y.: Mk-ami: efficient multi-group key management scheme for secure communications in AMI systems. In: 2016 IEEE Wireless Communications and Networking Conference, pp. 1–6. IEEE, (2016) Benmalek, M., Challal, Y.: Mk-ami: efficient multi-group key management scheme for secure communications in AMI systems. In: 2016 IEEE Wireless Communications and Networking Conference, pp. 1–6. IEEE, (2016)
2.
go back to reference Anzalchi, A., Sarwat, A.: A survey on security assessment of metering infrastructure in smart grid systems. In: SoutheastCon 2015, pp. 1–4. IEEE, (2015) Anzalchi, A., Sarwat, A.: A survey on security assessment of metering infrastructure in smart grid systems. In: SoutheastCon 2015, pp. 1–4. IEEE, (2015)
3.
go back to reference Mohammed, A., George, G.: Vulnerabilities and strategies of cybersecurity in smart grid-evaluation and review. In: 2022 3rd International Conference on Smart Grid and Renewable Energy (SGRE), pp. 1–6. IEEE, (2022) Mohammed, A., George, G.: Vulnerabilities and strategies of cybersecurity in smart grid-evaluation and review. In: 2022 3rd International Conference on Smart Grid and Renewable Energy (SGRE), pp. 1–6. IEEE, (2022)
4.
go back to reference Mohammadali, A., Haghighi, M.S., Tadayon, M.H., Mohammadi-Nodooshan, A.: A novel identity-based key establishment method for advanced metering infrastructure in smart grid. IEEE Trans. Smart Grid 9(4), 2834–2842 (2018)CrossRef Mohammadali, A., Haghighi, M.S., Tadayon, M.H., Mohammadi-Nodooshan, A.: A novel identity-based key establishment method for advanced metering infrastructure in smart grid. IEEE Trans. Smart Grid 9(4), 2834–2842 (2018)CrossRef
5.
go back to reference Dapeng, W., Zhou, C.: Fault-tolerant and scalable key management for smart grid. IEEE Trans. Smart Grid 2(2), 375–381 (2011)CrossRef Dapeng, W., Zhou, C.: Fault-tolerant and scalable key management for smart grid. IEEE Trans. Smart Grid 2(2), 375–381 (2011)CrossRef
6.
go back to reference Xia, J., Wang, Y.: Secure key distribution for the smart grid. IEEE Trans. Smart Grid 3(3), 1437–1443 (2012)CrossRef Xia, J., Wang, Y.: Secure key distribution for the smart grid. IEEE Trans. Smart Grid 3(3), 1437–1443 (2012)CrossRef
7.
go back to reference Park, J.H., Kim, M., Kwon, D.: Security weakness in the smart grid key distribution scheme proposed by Xia and Wang. IEEE Trans. Smart Grid 4(3), 1613–1614 (2013)CrossRef Park, J.H., Kim, M., Kwon, D.: Security weakness in the smart grid key distribution scheme proposed by Xia and Wang. IEEE Trans. Smart Grid 4(3), 1613–1614 (2013)CrossRef
8.
go back to reference Liu, N., Chen, J., Zhu, L., Zhang, J., He, Y.: A key management scheme for secure communications of advanced metering infrastructure in smart grid. IEEE Trans Indus Electr 60(10), 4746–4756 (2012)CrossRef Liu, N., Chen, J., Zhu, L., Zhang, J., He, Y.: A key management scheme for secure communications of advanced metering infrastructure in smart grid. IEEE Trans Indus Electr 60(10), 4746–4756 (2012)CrossRef
9.
go back to reference Wan, Z., Wang, G., Yang, Y., Shi, S.: Skm: scalable key management for advanced metering infrastructure in smart grids. IEEE Trans. Indus. Electr. 61(12), 7055–7066 (2014)CrossRef Wan, Z., Wang, G., Yang, Y., Shi, S.: Skm: scalable key management for advanced metering infrastructure in smart grids. IEEE Trans. Indus. Electr. 61(12), 7055–7066 (2014)CrossRef
10.
go back to reference Tsai, J.-L., Lo, N.-W.: Secure anonymous key distribution scheme for smart grid. IEEE Trans. Smart Grid 7(2), 906–914 (2015) Tsai, J.-L., Lo, N.-W.: Secure anonymous key distribution scheme for smart grid. IEEE Trans. Smart Grid 7(2), 906–914 (2015)
11.
go back to reference Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Advances in Cryptology—EUROCRYPT 2001: International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6–10, 2001 Proceedings 20, pp. 453–474. Springer, (2001) Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Advances in Cryptology—EUROCRYPT 2001: International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6–10, 2001 Proceedings 20, pp. 453–474. Springer, (2001)
12.
go back to reference Odelu, V., Das, A.K., Goswami, A.: A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans. Inf. Foren. Secur. 10(9), 1953–1966 (2015)CrossRef Odelu, V., Das, A.K., Goswami, A.: A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans. Inf. Foren. Secur. 10(9), 1953–1966 (2015)CrossRef
13.
go back to reference Odelu, V., Das, A.K., Wazid, M., Conti, M.: Provably secure authenticated key agreement scheme for smart grid. IEEE Trans. Smart Grid 9(3), 1900–1910 (2016) Odelu, V., Das, A.K., Wazid, M., Conti, M.: Provably secure authenticated key agreement scheme for smart grid. IEEE Trans. Smart Grid 9(3), 1900–1910 (2016)
14.
go back to reference Mahmood, K., Chaudhry, S.A., Naqvi, H., Kumari, S., Li, X., Sangaiah, A.K.: An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Fut. Gener. Comput. Syst. 81, 557–565 (2018)CrossRef Mahmood, K., Chaudhry, S.A., Naqvi, H., Kumari, S., Li, X., Sangaiah, A.K.: An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Fut. Gener. Comput. Syst. 81, 557–565 (2018)CrossRef
15.
go back to reference Zhang, L., Zhao, L., Yin, S., Chi, C.-H., Liu, R., Zhang, Y.: A lightweight authentication scheme with privacy protection for smart grid communications. Fut. Gener. Comput. Syst. 100, 770–778 (2019)CrossRef Zhang, L., Zhao, L., Yin, S., Chi, C.-H., Liu, R., Zhang, Y.: A lightweight authentication scheme with privacy protection for smart grid communications. Fut. Gener. Comput. Syst. 100, 770–778 (2019)CrossRef
16.
go back to reference Kumar, P., Gurtov, A., Sain, M., Martin, A., Phuong, H.H.: Lightweight authentication and key agreement for smart metering in smart energy networks. IEEE Trans. Smart Grid 10(4), 4349–4359 (2018)CrossRef Kumar, P., Gurtov, A., Sain, M., Martin, A., Phuong, H.H.: Lightweight authentication and key agreement for smart metering in smart energy networks. IEEE Trans. Smart Grid 10(4), 4349–4359 (2018)CrossRef
17.
go back to reference Khan, A.A., Kumar, V., Ahmad, M., Rana, S., Mishra, D.: Palk: Password-based anonymous lightweight key agreement framework for smart grid. Int. J. Electr. Power Energy Syst. 121, 106121 (2020)CrossRef Khan, A.A., Kumar, V., Ahmad, M., Rana, S., Mishra, D.: Palk: Password-based anonymous lightweight key agreement framework for smart grid. Int. J. Electr. Power Energy Syst. 121, 106121 (2020)CrossRef
18.
go back to reference Chaudhry, S.A.: Correcting palk: password-based anonymous lightweight key agreement framework for smart grid. Int. J. Electr. Power Energy Syst. 125, 106529 (2021)CrossRef Chaudhry, S.A.: Correcting palk: password-based anonymous lightweight key agreement framework for smart grid. Int. J. Electr. Power Energy Syst. 125, 106529 (2021)CrossRef
19.
go back to reference Nyangaresi, V.O., Mohammad, Z.: Privacy preservation protocol for smart grid networks. In: 2021 International Telecommunications Conference (ITC-Egypt), pp. 1–4. IEEE, (2021) Nyangaresi, V.O., Mohammad, Z.: Privacy preservation protocol for smart grid networks. In: 2021 International Telecommunications Conference (ITC-Egypt), pp. 1–4. IEEE, (2021)
20.
go back to reference Srinivas, J., Das, A.K., Li, X., Khan, M.K., Jo, M.: Designing anonymous signature-based authenticated key exchange scheme for internet of things-enabled smart grid systems. IEEE Trans. Indus. Inf. 17(7), 4425–4436 (2020)CrossRef Srinivas, J., Das, A.K., Li, X., Khan, M.K., Jo, M.: Designing anonymous signature-based authenticated key exchange scheme for internet of things-enabled smart grid systems. IEEE Trans. Indus. Inf. 17(7), 4425–4436 (2020)CrossRef
21.
go back to reference Khan, A.A., Kumar, V., Ahmad, M., Rana, S.: Lakaf: lightweight authentication and key agreement framework for smart grid network. J. Syst. Archit. 116, 102053 (2021) Khan, A.A., Kumar, V., Ahmad, M., Rana, S.: Lakaf: lightweight authentication and key agreement framework for smart grid network. J. Syst. Archit. 116, 102053 (2021)
22.
go back to reference Baghestani, S.H., Moazami, F., Tahavori, M.: Lightweight authenticated key agreement for smart metering in smart grid. IEEE Syst. J. 16(3), 4983–4991 (2022)CrossRef Baghestani, S.H., Moazami, F., Tahavori, M.: Lightweight authenticated key agreement for smart metering in smart grid. IEEE Syst. J. 16(3), 4983–4991 (2022)CrossRef
23.
go back to reference Chai, S., Yin, H., Xing, B., Li, Z., Guo, Y., Zhang, D., Zhang, X., He, D., Zhang, J., Yu, X., et al.: Provably secure and lightweight authentication key agreement scheme for smart meters. IEEE Transactions on Smart Grid, (2023) Chai, S., Yin, H., Xing, B., Li, Z., Guo, Y., Zhang, D., Zhang, X., He, D., Zhang, J., Yu, X., et al.: Provably secure and lightweight authentication key agreement scheme for smart meters. IEEE Transactions on Smart Grid, (2023)
24.
go back to reference Ratzer, A.V., et al.: Cpn tools for editing, simulating, and analysing coloured petri nets. In: Applications and Theory of Petri Nets 2003: 24th International Conference, ICATPN 2003 Eindhoven, The Netherlands, June 23–27, 2003 Proceedings, pp. 450–462. Springer (2003) Ratzer, A.V., et al.: Cpn tools for editing, simulating, and analysing coloured petri nets. In: Applications and Theory of Petri Nets 2003: 24th International Conference, ICATPN 2003 Eindhoven, The Netherlands, June 23–27, 2003 Proceedings, pp. 450–462. Springer (2003)
25.
go back to reference Attia, H.B., Kahloul, L., Benhazrallah, S., Bourekkache, S.: Using hierarchical timed coloured petri nets in the formal study of TRBAC security policies. Int. J. Inf. Secur. 19(2), 163–187 (2020)CrossRef Attia, H.B., Kahloul, L., Benhazrallah, S., Bourekkache, S.: Using hierarchical timed coloured petri nets in the formal study of TRBAC security policies. Int. J. Inf. Secur. 19(2), 163–187 (2020)CrossRef
26.
go back to reference Yankson, B.: Continuous improvement process (CIP)-based privacy-preserving framework for smart connected toys. Int. J. Inf. Secur. 20(6), 849–869 (2021)CrossRef Yankson, B.: Continuous improvement process (CIP)-based privacy-preserving framework for smart connected toys. Int. J. Inf. Secur. 20(6), 849–869 (2021)CrossRef
27.
go back to reference Gong, X., Feng, T.: Lightweight anonymous authentication and key agreement protocol based on COAP of internet of things. Sensors 22(19), 7191 (2022)CrossRef Gong, X., Feng, T.: Lightweight anonymous authentication and key agreement protocol based on COAP of internet of things. Sensors 22(19), 7191 (2022)CrossRef
28.
go back to reference Sakurada, H.: Security evaluation of the plaid protocol using the proverif tool. NTT Commun. Sci. Lab. (2013) Sakurada, H.: Security evaluation of the plaid protocol using the proverif tool. NTT Commun. Sci. Lab. (2013)
29.
go back to reference Meier, S., Schmidt, B., Cremers, C., Basin, D.: The tamarin prover for the symbolic analysis of security protocols. In: Computer Aided Verification: 25th International Conference, CAV 2013, Saint Petersburg, Russia, July 13–19, 2013. Proceedings 25, pp. 696–701. Springer, (2013) Meier, S., Schmidt, B., Cremers, C., Basin, D.: The tamarin prover for the symbolic analysis of security protocols. In: Computer Aided Verification: 25th International Conference, CAV 2013, Saint Petersburg, Russia, July 13–19, 2013. Proceedings 25, pp. 696–701. Springer, (2013)
30.
31.
go back to reference Abbasinezhad-Mood, D., Ostad-Sharif, A., Nikooghadam, M., Mazinani, S.M.: A secure and efficient key establishment scheme for communications of smart meters and service providers in smart grid. IEEE Trans. Indus. Inf. 16(3), 1495–1502 (2019)CrossRef Abbasinezhad-Mood, D., Ostad-Sharif, A., Nikooghadam, M., Mazinani, S.M.: A secure and efficient key establishment scheme for communications of smart meters and service providers in smart grid. IEEE Trans. Indus. Inf. 16(3), 1495–1502 (2019)CrossRef
Metadata
Title
Security assessment and improvement of smart grid NIKE protocol
Authors
Tao Feng
Wentao Jin
Minghu Zhang
Lu Zheng
Publication date
31-08-2023
Publisher
Springer Berlin Heidelberg
Published in
International Journal of Information Security / Issue 1/2024
Print ISSN: 1615-5262
Electronic ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-023-00746-3

Other articles of this Issue 1/2024

International Journal of Information Security 1/2024 Go to the issue

Premium Partner