You are on page 1of 9

This article has been accepted for inclusion in a future issue of this journal.

Content is final as presented, with the exception of pagination.

IEEE TRANSACTIONS ON SMART GRID 1

Secure Anonymous Key Distribution


Scheme for Smart Grid
Jia-Lun Tsai and Nai-Wei Lo, Member, IEEE

Abstract—To fully support information management among data to a designated receiving service server. As smart grid
various stakeholders in smart grid domains, how to establish brings huge and mutual benefits among utility companies, ser-
secure communication sessions has become an important issue vice providers, and electricity consumers, information security
for smart grid environments. In order to support secure com-
munications between smart meters and service providers, key between smart meters and backend service servers has become
management for authentication becomes a crucial security topic. a very important and practical issue [4]–[11].
Recently, several key distribution schemes have been proposed to As a smart meter is usually installed at the front of a house
provide secure communications for smart grid. However, these and only protected with a physical lock, it is relatively easy to
schemes do not support smart meter anonymity and possess be attacked by malicious attackers in comparison with back-
security weaknesses. This paper utilizes an identity-based signa-
ture scheme and an identity-based encryption scheme to propose end service servers. An intruder may break the physical lock
a new anonymous key distribution scheme for smart grid environ- of a smart meter and then compromise and control this smart
ments. In the proposed scheme, a smart meter can anonymously meter. As a result, this malicious attacker might be able to
access services provided by service providers using one private forge sensed data such as the amount of electricity usage at
key without the help of the trusted anchor during authentication. this house before sending these forged data back to the cor-
In addition, the proposed scheme requires only a few of com-
putation operations at the smart meter side. Security analysis is responding service server. In addition, it is also possible for
conducted to prove the proposed scheme is secure under random an adversary to eavesdrop, modify, and interrupt data (or mes-
oracle model. sages) transmitted from a smart meter, since insecure wireless
Index Terms—Identity-based encryption, identity-based signa- environment is usually adopted by smart meter to establish
ture, key distribution, privacy, smart grid. communication sessions with designated services.
Privacy protection of citizens [12], [13] is another security
concern for smart grid. An adversary compromising a smart
meter of a citizen’s house can link personal information of
I. I NTRODUCTION
this citizen with the status or statistics of his/her electric-
HE SMART grid is an advanced metering infrastruc-
T ture for automatically gathering and utilizing information
generated from different stakeholders in order to replace tradi-
ity usage. With data analysis tools and proper deduction, the
adversary can profile the daily life of the targeted citizen or
even predict when the citizen will be at home. Based on the
tional electricity infrastructure [1], [2]. This new infrastructure information, the adversary could break into the citizen’s house
makes electricity grids more efficient, secure, and reliable when the citizen is absent. Thus, secure message/data trans-
through bidirectional transmission flows of electric power and mission with anonymity property between meters and backend
data communication. A smart grid usually contains four com- servers is the key factor for service providers to prevent
ponents: 1) sensing; 2) communication; 3) control; and 4) actu- data leakage and protect user privacy. However, it is difficult to
ation systems [3]. Usually, end user devices for smart grid design such scheme, since a smart meter cannot afford heavy
such as smart meter are composed of sensing and communica- cryptographic operations due to the limitation of embedded
tion modules. Service systems from service providers contain computing resources. One of the best ways to build a secure
communication, control, and actuation modules. Nowadays, anonymous communication session between a smart meter and
thousands of smart meter are installed in homes to monitor its designated service server is to utilize authenticated key
energy consumption in real time and to provide power pric- management scheme.
ing information to consumers. A smart meter has a processing Key management schemes generally are divided into two
chip and a small, nonvolatile memory space to perform crypto- categories [8]: 1) public key infrastructure (PKI) [14] for
graphic operations on sensed data before sending the processed key management; and 2) symmetric key management. In
PKI, a trusted certificate authority (CA) is required to gen-
Manuscript received October 2, 2014; revised January 7, 2015 and erate certificates for communicating parties; two commu-
April 20, 2015; accepted May 28, 2015. This work was supported in part nicating parties authenticate each other by verifying the
by the Taiwan Information Security Center, and in part by the National
Science Council of Taiwan under Grant MOST 103-2221-E-011-091-MY2. validity of received certificate sent from its peer. In sym-
Paper no. TSG-00977-2014. (Corresponding author: Jia-Lun Tsai.) metric key management, a secret key is shared between two
The authors are with the Department of Information Management, National or more communicating parties. Usually, the secret key is
Taiwan University of Science and Technology, Taipei 106, Taiwan (e-mail:
crousekimo@yahoo.com.tw; nwlo@cs.ntust.edu.tw). stored in a tamper-proof hardware at each communicating
Digital Object Identifier 10.1109/TSG.2015.2440658 party. Communicating parties use this shared secret key to
1949-3053 c 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

2 IEEE TRANSACTIONS ON SMART GRID

encrypt/decrypt messages transmitted between them to achieve a symmetric key cryptosystem are used in their scheme to sim-
secure communication. plify key management. The symmetric key cryptosystem used
PKI may be one of the promising solutions for smart in their scheme is based on the Needham–Schroeder authenti-
grid. It is feasible for service providers to provide smart cation protocol and the public key cryptosystem used in their
meter anonymity using PKI mechanism, since the service scheme is based on ECC. The key management scheme of
server can decrypt received encrypted messages using its Wu and Zhou [20] supports strong security, scalability, fault-
master private key directly without the need of knowing cor- tolerance, accessibility, and efficiency. Since both PKI and
responding smart meter identity in advance. Unfortunately, a trusted anchor are used in their scheme, their scheme requires
PKI usually requires more computing resources for certificate at least two distinct servers. In addition, certificate verifica-
verification and management operation of certificate revoca- tion from PKI usually consumes heavy computing resources
tion list (CRL) [4], [14]. The ever-growing size of CRLs and in which a smart meter might not be affordable.
heavy certificate verification computation will become two Xia and Wang [21] found the scheme of Wu and Zhou [20]
practical challenges for smart grid to adopt PKI-based key is vulnerable to man-in-the-middle attacks. They then pro-
management schemes. Symmetric key management is usually posed a new key distribution scheme for smart grid. In the
efficient. However, it is dangerous if all smart meters share scheme of Xia and Wang [21], a lightweight directory access
the same key for secure communication. If an adversary has protocol (LDAP) server is used as the trusted third party. The
found a way to learn the shared key, communication secu- advantage of this scheme is that the operation cost is less than
rity between each smart meter and backend servers will be others since the LDAP server is cheaper. In addition, multi-
in danger. To overcome this weakness, it is better to intro- ple LDAP servers can be deployed to prevent single point of
duce a trusted third party to distribute distinct private key to failure on the LDAP server. However, Park et al. [22] showed
every smart meter, respectively. However, this approach often that the scheme of Xia and Wang [21] is vulnerable to imper-
requires this trusted third party participating in online mutual sonation attack and unknown key share (UKS) attack. The
authentication process, so it offers an opportunity for an adver- scheme of Xia and Wang [21] does not support smart meter
sary to attack the trusted third party via network to learn smart anonymity and perfect forward secrecy of smart meters and
meters’ keys. In addition, it is troublesome for symmetric key service servers. Hence, if an adversary can get the private key
management scheme to support smart meter anonymity with- of a smart meter, the adversary can learn the session keys
out spending extra computing resources for key search and constructed in previous communicating sessions of this smart
identification. In order to overcome those identified perfor- meter (or this service server). In addition, this paper discovers
mance and security issues, a new anonymous key distribution that all these schemes reveal that the trusted anchor has to
scheme based on identity-based public key cryptosystems is participate in each authentication process between two com-
developed in this paper. municating parties. The trusted anchor involving in online
The concept of identity-based public key cryptosystem was session authentication may raise security risk of the whole
first introduced by Shamir [15]. The main idea of identity- system. If the trusted anchor was compromised, an adversary
based cryptosystem is to use user identities as their public can easily learn the master key and then generate the same
keys such that certificate management can be simplified. In private keys assigned to all communicating parties. This secu-
identity-based cryptosystems, a trusted third party is required. rity risk can be reduced by removing the trusted anchor from
This trusted third party utilizes a user identity and the chosen online session authentication.
master secret key to generate a corresponding private key for In recent years, several identity-based authenticated key
this user, where the user identity is also his/her public key. agreement protocols [23], [24] have been proposed. These
In recent years, elliptic curve cryptosystem (ECC) [16], [17] protocols allow two parties to authenticate each other and share
has become one of the most popular public key cryptosys- a session key after authentication. However, they are unsuit-
tems. Compared with other public key cryptosystems based able for smart grid, since they do not consider parties with
on RSA and discrete logarithm problem (DLP), ECC achieves limited computing resources such as smart meters, and do not
the same level of security strength with smaller key size and support user (smart meter) anonymity. Wang [25] proposed
less computational cost [18]. Therefore, ECC is more suitable four new authentication schemes using smart card. The first
for devices with limited computing resources such as smart one is a symmetric key-based scheme. The second and fourth
meters. Unfortunately, ECC can only be used to construct ones are based on identity-based key authenticated agreement
identity-based signature schemes. Boneh and Franklin [19] protocol. The third one is based on HMQV protocol [26].
first used bilinear pairings to construct an identity-based However, all of them do not support user (smart meter)
encryption scheme, where bilinear pairing is a mathemati- anonymity.
cal function on elliptic curve. The proposed key distribution
scheme utilizes identity-based cryptosystems to fulfill anony-
mous secure communication between two communicating B. Our Contributions
parties. This paper proposes a new anonymous key distribution
scheme for smart grid. The proposed scheme adopts identity-
A. Related Works based encryption scheme [27] and identity-based signature
A new key management scheme for smart grid was pro- scheme [28] such that a smart meter can anonymously access
posed by Wu and Zhou [20]. A public key cryptosystem and services provided by service providers using one private key
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

TSAI AND LO: SECURE ANONYMOUS KEY DISTRIBUTION SCHEME FOR SMART GRID 3

TABLE I
without the help of the trusted anchor. In addition, this scheme S YMBOL N OTATIONS
does not require heavy computing resources at smart meter
side, while achieving mutual authentication and smart meter
anonymity at the same time. With security analysis, we also
show that the proposed scheme is secure under random ora-
cle model. Comparisons on security and efficiency among the
proposed scheme and other existing ones indicate that the
proposed scheme is secure without sacrificing performance
efficiency.

II. P RELIMINARIES
We briefly introduce fundamental cryptography used for our
proposed scheme including properties of bilinear pairings and
mathematical problems as follows.

A. Bilinear Pairings A. System Components


The properties of bilinear pairings are defined as follows. This paper focuses on secure communication between smart
Let G1 be an additive cyclic group, G2 be a multiplicative meters and service providers in a smart grid. Hence, there
cyclic group, and P be a generator of G1 , where G1 and G2 are three roles in our scheme: 1) a trust anchor; 2) multi-
have the prime order q. The bilinear pairing equation e : ple service providers SP = {SPj | j = 1, . . . , m}; and 3) a set
G1 × G1 → G2 satisfies the following properties [27]–[30]. of remote smart meters SM = {SMi |i = 1, . . . , n}. A smart
1) Bilinear: Given P1 , P2 , Q1 , Q2 ∈ G1 , e(P1 + meter is responsible for collecting the data from sensors
P2 , Q1 ) = e(P1 , Q1 )e(P2 , Q1 ), and e(P1 , Q1 + Q2 ) = installed in a household, and then sends the collected data to
e(P1 , Q1 )e(P1 , Q2 ). its corresponding service provider. A service provider is the
Besides, given a, b ∈ Zq , e(aP, bQ) = e(abP, Q) = data aggregator in our proposed scheme, so it is responsi-
e(P, abQ) = e(P, Q)ab = e(bP, aQ). ble for monitoring the electric flows and sending real-time
2) Nondegenerate: There exists P ∈ G1 and Q ∈ G1 such electric information to a user or a smart meter. The trusted
that e(P, Q) = 1, where 1 is the identity element of G2 . anchor is a trusted third party in our scheme; it is responsible
3) Computable: For any P, Q ∈ G1 , the value e(P, Q) is for distributing the private keys of smart meters and service
efficiently computed. providers during registration. When a smart meter or a service
provider learns a private key from the trusted anchor, it stores
the learned private key into its tamper-proof module.
B. Mathematical Problems
Let G1 be a cyclic additive group, let G2 be a cyclic mul-
tiplicative group and let e : G1 × G1 → G2 be a bilinear map B. Proposed Scheme
function, where G1 and G2 have the same prime order q and P We present the proposed scheme in this section. Our
is the generator of G1 . The mathematical problems used in this scheme is divided into three phases: 1) system setup;
paper are introduced as follows [27]–[30]. 2) extraction; and 3) mutual authentication phases. Details of
Definition 1 Collusion Attack Algorithm With k-Traitors each phase are described as follows. The notations are defined
(k-CAA Problem): Given P ∈ G1 , sP ∈ G1 , {e1 , e2 , . . . , in Table I.
ek ∈ Zq∗ } and {(1/s + e1 )P, (1/s + e2 )P, . . . , (1/s + ek )P} for 1) System Setup: Let G1 be a cyclic additive group, P be the
an integer k and s ∈ Zq∗ , P ∈ G1 , it is infeasible to compute generator of G1 , and let G2 be a cyclic multiplicative group,
(s + e)−1 P, where e ∈ / {e1 , e2 , . . . , ek }. where G1 and G2 have the same prime order q. First of all, the
Definition 2 Computational Diffie-Hellman Problem (CDH trust anchor chooses a bilinear map e : G1 ×G1 → G2 and five
problem): Given P, xP, yP, ∈ G1 for x, y ∈ Zq∗ , it is infeasible one-way hash functions H : {0, 1}∗ → G1 , H1 : {0, 1}∗ → Zq∗ ,
to compute xyP. H2 : {0, 1}∗ → Zq∗ , H3 : {0, 1}∗ → Zq∗ , H4 : {0, 1}∗ → Zq∗ ,
Definition 3 Modified Bilinear Inverse Diffie-Hellman With and H5 : {0, 1}∗ → Zq∗ . Next, the trust anchor chooses a ran-
k Values (k-mBIDH) Problem: Given P, sP, tP ∈ G1 , dom number s as its master private key and then computes
h, h1 , h2 , . . . , hk ∈ Zq∗ , (1/s + h1 )P, (1/s + h2 )P, . . . , and g = e(P, P) and Ppub = sP, where Ppub is the mas-
−1
(1/s + hk )P, it is infeasible to compute e(P, P)(s+h) t . ter public key of the trust anchor. Next, the trust anchor
publishes {G1 , G2 , P, e, H, H1 , H2 , H3 , H4 , q, Ppub , g} as the
public parameters and keeps s as its secret.
III. S YSTEM C OMPONENTS AND THE P ROPOSED S CHEME 2) Extraction: In our scheme, smart meters and service
We present the proposed anonymous key distribution providers are required to register on the trust anchor in
scheme in this section. In Section III-A, we describe the sys- advanced; therefore, the extraction phase includes smart meter
tem components of the proposed scheme. Then, we introduce extraction process and service provider extraction process.
the proposed scheme in Section III-B. Details of each process are described as follows.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

4 IEEE TRANSACTIONS ON SMART GRID

Fig. 1. Mutual authentication of the proposed scheme.

3) Smart Meter Extraction: If a smart meter SMi wants to where ai and NC are two random numbers. SMi
register on the trust anchor, the smart meter SMi sends its iden- then sends (C1 , C2 ) to SPj .
tity IDi to the trust anchor via a secure channel. Upon receiving Step 2: Upon receiving (C1 , C2 ) from SMi , SPj retrieves
IDi from a smart meter SMi , the trust anchor computes the IDi by computing the following equations:
private key
 
1 1
Di = P (1) ki = e   P, C1 (5)
s + qi s + H1 SIDj
for the corresponding smart meter SMi , where qi = H1 (IDi )  
Vi = H2 ki , SIDj (6)
is the corresponding public key of the smart meter SMi .
Next, the trust anchor sends Di and {G1 , G2 , P, e, H, H1 , H2 , (IDi , NC ) = C2 ⊕ Vi . (7)
H3 , H4 , q, Ppub , g} to the smart meter SMi via a secure
channel. Upon receiving Di and {G1 , G2 , P, e, H, H1 , H2 , After retrieving (IDi , NC ) from C2 , SPj computes
H3 , H4 , q, Ppub , g} from the trust anchor, the smart meter SMi
stores them into its tamper-proof module. SK = bi C1 (8)
4) Service Provider Extraction: If a service provider SPj    
R1 = bi H1 SIDj P + Ppub (9)
joins the system, SPj also needs to send its identity SIDj to  
the trust anchor. The trust anchor uses the service provider’s R2 = H3 qi , qj , NC , IDi , SIDj , SK (10)
identity SIDj and the trust anchor’s master private key s to
compute the master private key of the service provider SPj and then sends (R1 , R2 ) back to SMi , where
1 bi is a random number. Notice that the value
Kj = P (2) H1 (SIDj )P + Ppub can be computed and stored in
s + hj
advance, so SPj does not have to compute the value
where hj = H1 (SIDj ) is the corresponding public key of every time within a mutual authentication session.
the service provider SPj . Next, the trust anchor sends K Step 3: Upon receiving (R1 , R2 ) from SPj , SMi computes
and {G1 , G2 , P, e, H, H1 , H2 , H3 , H4 , q, Ppub , g} to the ser-
vice provider SPj via a secure channel. Upon receiving Kj
SK = H5 (ai · R1 ) (11)
and {G1 , G2 , P, e, H, H1 , H2 , H3 , H4 , q, Ppub , g} from the trust  
anchor, the service provider SPj computes H1 (SIDj )P + Ppub , R2 = H3 qi , qj , NC , IDi , SIDj , SK (12)
and then stores {G1 , G2 , P, e, H, H1 , H2 , H3 , H4 , q, Ppub , g},
Kj , and H1 (SIDj )P + Ppub into its tamper-proof module. and then checks whether the computed R2 is equal
5) Mutual Authentication: The mutual authentication phase to the received R2 . If both values are equivalent,
of our scheme is depicted in Fig. 1. In this phase, a smart SPj is authenticated. Next, SMi computes
meter SMi and a service provider SPj authenticate each other
  
without the help of the trust anchor. The smart meter SMi and C3 = ai + H4 SIDj , SK, R2 , C1
the service provider SPj perform the following steps.  
1
Step 1: SMi computes × P (13)
    s + H1 (IDi )
C1 = ai · Ppub + H1 SIDj P (3)
 a 
C2 = H2 g , SIDj ⊕ (IDi , NC )
i (4) and then returns C3 to SPj .
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

TSAI AND LO: SECURE ANONYMOUS KEY DISTRIBUTION SCHEME FOR SMART GRID 5

Step 4: Upon receiving C3 from SMi , SPj verifies the valid- Two definitions are introduced as follows.
ity of the signature C3 by checking whether the Definition 4: An oracle SMi and an oracle SPj are partners if
following equation holds: they authenticate each other and then construct a session key.
   Definition 5: An oracle SMi constructs a fresh session key
e C3 , Ppub + H1 (IDi )P = ki · gH4 (SIDj ,SK,R2 ,C1 ) .
with an oracle SPj if the following conditions hold.
(14) 1) The session key SK(= NULL) is accepted by
If (12) holds, SMi is authenticated. SMi and SPj if neither SMi nor SPj has been operated
by the adversary A through reveal queries.
IV. S ECURITY A NALYSIS 2) No corrupt query is invoked by the adversary A before
calling queries Send(M, SMi ) or Send(M, SPj ).
The security model and security analysis of the proposed Pr[Succ] is defined as the probability that the adver-
scheme are described as follows. sary A wins the game. Let SM2SP be an event which
will be generated when an adversary successfully compro-
A. Security Model mises smart meter-to-service provider authentication and let
This section defines the security model of ID-based mul- SP2SM be an event which will be generated when an adver-
tiservice provider authentication scheme in smart grids. The sary successfully compromises service provider-to-smart meter
proposed security model is based on the security model authentication. The advantage of the multiservice provider
of [31]–[33]. In the multiservice provider authentication authentication scheme (MSAS) for the adversary A is defined
scheme, a participant is one of the following roles: 1) legal as AdvMSAS (A) = |2 · Pr [Succ] − 1|. An MSAS supports
smart meter SMi ; 2) service provider SPj ; and 3) the trust mutual authentication, if both Pr[SM2SP] and Pr[SP2SM] are
anchor RC. For each P ∈ {SMi , SPj , RC}, where SMi is negligible during an authentication session.
the instance i of smart meter and SPj is the instance j of
service provider, the probabilistic polynomial time adver-
sary A knows the all public parameters and can invoke B. Security Analysis
queries that are defined as follows. Notice that, all hash lists This section shows that our scheme supports smart meter-
LH1 , LH2 , LH3 , LH4 , and LH5 are initially empty. to-service provider authentication, service provider-to-smart
1) Extract (IDi ): This query operation is used to simulate meter authentication, and key agreement under the random
an ID attack. In this query, the adversary A sends a cho- oracle model as follows. Hash, extract, execute, reveal, send,
sen IDi to the oracle. The oracle checks whether the corrupt, and test queries are invoked based on different attack
value pair [IDi , H1 (IDi )] exists in the list LH1 . If the patterns to simulate real attacks.
oracle cannot find the value pair in LH1 , the oracle then Theorem 1: Adversary A can break smart meter-to-service
calculates H1 (IDi ) and returns the public key H1 (IDi ) provider authentication successfully if adversary B can utilize
of corresponding smart meter or corresponding service adversary A for solving the k-CAA problem.
provider according to the identity IDi . Proof: First of all, an instance {P, sP, {e1 , e2 , . . . , ek ∈ Zq∗ },
2) Hi (M): When an adversary A invokes this query on {(1/s + e1 )P, (1/s + e2 )P, . . . , (1/s + ek )P}} of the k-CAA
a message M, the oracle returns the hashed message to problem is given to adversary B. Adversary B then tries to
the adversary A and then stores it into the hash list LHi . compute (1/s + e0 )P in order to solve the k-CAA problem.
3) Send(M, P): This query simulates an active attack, in To achieve this goal, adversary B simulates the attack envi-
which the adversary A can modify the message transmit- ronment with adversary A. First, adversary B runs the system
ted between a smart meter SMi and a service provider setup algorithm to generate all the public parameters, and then
SPj . When the adversary A sends a modified message M returns them to adversary A. Next, A can perform the following
to the oracle P through this query, the oracle P returns queries with B.
a corresponding reply to the adversary A. 1) H1 Hash Query: If A invokes an H1 query for IDi
4) Execute(P, M): This query simulates passive attacks. (or SIDj ), B returns H1 (IDi ) (or H1 (SIDj )) to A if
This query allows the adversary A to learn all commu- H1 (IDi ) (or H1 (SIDj )) exists in LH1 . Otherwise, B calcu-
nication messages between a smart meter and service lates and returns H1 (IDi ) (or H1 (SIDj )) and then stores
provider. {IDi , H1 (IDi )} (or {SIDj , H1 (SIDj )}) in LH1 .
5) Reveal(P): This query allows the adversary A to learn 2) H2 Hash Query, H3 Hash Query, H4 Hash Query, and
the session key held by the oracle P. H5 Hash Query: If A invokes an Hk query on a mes-
6) Corrupt(P): This query is used to evaluate the property sage m, B finds whether m exists in LHk , where k = 2−5.
preservation of forward secrecy on the oracle P; it allows If the message m is in LHk , B then returns hk to A; other-
the adversary A to compromise the long-term private key wise, B calculates and returns hk and then stores a new
of the oracle P. tuple (m, hk ) into LHk .
7) Test(P): This query simulates semantic security of ses- 3) Extract: When an extract query on IDi (or SIDj ) is
sion key. In this query, the oracle P flips a coin b. If invoked by A, B finds qi (or qj ) from LH1 according
b = 1, the oracle P returns the real session key to the to IDi (or SIDj ). Then, adversary B computes Di =
adversary A. Otherwise, the adversary A learns a random (1/s + H1 (IDi ))P (or Kj = (1/s + H1 (SIDj ))P) and then
bits string from the oracle P. sends it back to A.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

6 IEEE TRANSACTIONS ON SMART GRID

4) Send: Adversary A can invoke the following send queries IDi and NC from the received C2 . Next, B com-
during smart meter-to-service provider authentication. putes SK, R1, and R2 and then sends them back
a) Send(“start,” SM i ): If A invokes a Send(“start,” to A.
SMi ) query, B computes a login request (C1 , C2 ) b) Send((C3 ), SPj ): If A invokes a Send((C3 ), SPj )
and then returns it back to A. query, B verifies the validity of the received C3 . If
b) Send((R1 , R2 ), SMi ): When adversary A calls C3 is valid, B accepts the login session. Otherwise,
a Send((R1 , R2 ), SMi ) query, adversary B computes B returns a failure message to A.
SK and R2 , and checks whether the computed R2 is 5) Corrupt: If A invokes a corrupt query for SIDj ,
equal to the received R2 . If both values are equivalent, B finds {IDi , H1 (IDi )} from the hash list LH1 accord-
B computes C3 and then returns it to A. Otherwise, ing to IDi . Next, B then sends (1/s + H1 (IDi ))P to
adversary B returns a failure message to A. adversary A.
5) Analysis: According to forking lemma [34], adversary 6) Reveal: Upon receiving a reveal query from A, B sends
A outputs two valid signatures {C1 , C3 } and {C1 , C3 }, a random number back to A.
where H4 (SIDj , SK, R2 , C1 ) = H4 (SIDj , SK, R2 , C1 ). 7) Test: If A invokes a test query, B checks whether adver-
Adversary B can compute sary A asked in the lth session. If the condition does not
C1 − C1 hold, B terminates the simulation. Otherwise, B selects
    a bit b. If b = 1, B sends a session key back to A.
H4 SIDj , SK, R2 , C1 − H4 SIDj , SK, R2 , C1
Otherwise, B returns a random bits string.
1
= P 8) Analysis: Let qu be the number of instances of smart
s + q0 meter invoked in the game, n be the size of the point,
and then solves the k-CAA problem. The probability k be the output size of the H4 query, ε be the prob-
that adversary B returns the correct values of h and h ability of adversary A correctly guessing the value of
is only (1/qH1 )2 . Thus, we prove that the probability b when calling a test query and ε be the probabil-
of breaking our scheme is equal to the probability of ity that the adversary B solves the k-mBIDH problem.
solving the k-CAA problem. Notice that, we have shown We claim that adversary A can break smart meter-to-
that the signature used in our scheme is secure under service provider authentication if adversary A makes the
random oracle as well. authentic message R2 = H3 (qi , qj , NC , IDi , SIDj , SK)
Theorem 2: Adversary A can break service provider-to-smart successfully. There are three scenarios for adversary A
meter authentication successfully if adversary B is able to use to get correct R2 .
adversary A for solving the k-mBIDH problem. a) Adversary A correctly guesses R2 = H3 (qi , qj ,
Proof: Adversary B is given an instance of the NC , IDi , SIDj , SK) without asking H3 hash query
k-mBIDH problem. To solve the k-mBIDH problem, adver- and knowing session key SK = ai R1 . The
sary B runs adversary A and then simulates our authen- probability for this situation to occur is less
tication scheme. Adversary B first runs the system setup than 1/k.
algorithm to generate all the public parameters {G1 , G2 , P, e, b) The tuple value (C1 , C2 , R1 , R2 , IDi , SIDj ) in the
H, H1 , H2 , H3 , H4 , q, Ppub , g} and then returns these public current session is equal to the tuple value
parameters to adversary A. In order to break service provider- (C1 , C2 , R1 , R2 , IDi , SIDj ) in a previous session.
to-smart meter authentication, adversary A needs to com- The probability for this situation to occur is less
pute R2 = H3 (hi , NC , IDi , SIDj , SK) to pass the verification than (qu /l2 ).
process. c) Adversary A invokes test query in the
1) H1 Hash Query: If A makes an H1 query for IDi (or SIDj ), lth session to learn a secret value ki =
B sends qi (or qj ) back to A if qi (or qj ) exists in LH1 . e((1/s + H1 (SIDj ))P, C1 ). The probability
Otherwise, B computes qi (or qj ) and then stores {IDi , qi } that A invokes test query in the lth session is ε .
(or {SIDj , qj }) in LH1 . Next, B returns qi (or qj ) to A. In summary, the probability for adversary B to solve the
2) H2 Hash Query, H3 Hash Query, H4 Hash Query, and H5 k-mBIDH problem is ε ≥ ε − 1/k − (qu /l2 ).
Hash Query: If A invokes an Hk query on a message m, Theorem 3: Adversary B can use adversary A to solve the
B checks whether m exists in LHk , where k = 2 − 5. CDH problem if adversary A can correctly guess the value of
If the message m is in LHk , B sends hk = Hk (m) back coin b tossed in a test query.
to A. Otherwise, B computes hk and then sends it back Proof: Let Pr[SM2SP] be the probability for an adversary
to A. Next, a new tuple (m, hk ) is stored in LHk by B. to break smart meter-to-service provider authentication and
3) Extract: If A invokes an extract query for IDi (or SIDj ), SM2SP be the event that the smart meter-to-service provider
B finds qi (or qj ) from the hash list LH1 according to authentication scheme is under adversary attack. Based on our
IDi (or SIDj ). Next, B computes Di = (1/s + H1 (IDi ))P previous analysis, adversary A must invoke H3 hash query
(or Kj = (1/s + H1 (SIDj ))P) and then returns it to A. with the tuple (qi , qj , NC , IDi , SIDj , SK) to gain advantage
4) Send: Adversary A can invoke the following send queries ε for correctly guessing the value of coin b when calling
during service provider-to-smart meter authentication. a test query. Let Ask be the event that the query (bi C1 ) corre-
a) Send((C1 , C2 ), SPj ): If A invokes a Send((C1 , C2 ), sponding to the test query has been asked to H5 ; then the
SPj ) query, B computes ki and Vi , and then retrieves probability for the event Ask to occur is Pr [Ask ] ≥ ε/2.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

TSAI AND LO: SECURE ANONYMOUS KEY DISTRIBUTION SCHEME FOR SMART GRID 7

TABLE II
Thus, we have C OMPARISON ON S ECURITY F EATURES
  
Pr[Ask ∧ Test(SMi )] + Pr Ask ∧ Test SPj ∧ SM2SP
   ε
+ Pr Ask ∧ Test SPj ∧ ¬SM2SP ≥ .
2
The equation can be further derived as
  
Pr[Ask ∧ Test(SMi )] + Pr Ask ∧ Test SPj ∧ ¬SM2SP
ε
≥ − Pr [SM2SP].
2
Since event Test(SPj ) ∧ ¬SM2SP implies event Test(SMi ),
we have
ε
Pr[Ask ∧ Test(SMi )] ≥ − Pr [SM2SP].
2
The value of probability Pr[SM2SP] is negligible and advan-
tage ε is non-negligible based on Theorems 1 and 2; therefore,
the value (ε/2) − Pr [SM2SP] is also non-negligible. Thus, the
CDH problem can be solved if A can correctly guess the coin scheme [21], and the second scheme of Wang [25] have
b tossed in a test query. a number of shortcomings.
1) They do not support perfect forward secrecy. The sec-
V. C OMPARISONS ond scheme of Wang [25] only supports weak perfect
This section compares the proposed scheme with other forward secrecy.
related schemes, including the scheme of Wu and Zhou [20], 2) Wu and Zhou’s scheme [20] and Xia and Wang’s
the scheme of Xia and Wang [21], and the second scheme of scheme [21] require the trusted anchor participates in
Wang [25]. Notice that, we select the second scheme in [25] the authentication process. If the trusted anchor was
because this scheme is based on identity-based authenticated compromised, an adversary can easily learn the master
key agreement protocol. The last (fourth) scheme of Wang [25] key and then generate the same private keys assigned
is also based on identity-based cryptosystem, but it requires to all communicating parties. This security risk can be
a database at the server side to store all password validation reduced by removing the trusted anchor from online
data. In addition, this scheme does not support smart meter session authentication as our proposed scheme does.
anonymity. The other two schemes in [25] are not quite suitable 3) The scheme proposed of Wu and Zhou [20] is vulnera-
for multiservice provider environment such as smart grid. Based ble to man-in-the-middle attack.
on the design of these two schemes, each smart meter requires 4) The scheme of Xia and Wang [21] is vulnerable to an
storing all public keys from different service providers in a smart impersonating service provider attack and a UKS attack.
grid environment. It is difficult for smart meters to manage and 5) In the scheme of Wu and Zhou [20], the certificate can
maintain these public keys. Therefore, we do not include the be used to find out who logs into the service provider;
first, third, and fourth schemes in [25] into our comparison. therefore, the scheme does not support anonymity.
The proposed scheme is based on an identity-based sig- 6) In the scheme of Xia and Wang [21], a smart meter iden-
nature scheme and an identity-based encryption scheme such tity is sent to the trusted anchor; therefore, this scheme
that a smart meter and a service provider can authenticate does not support anonymity, either. The second scheme
each other without the involvement of the trusted anchor. It of Wang [25] also does not support anonymity as it user
is also impossible for an adversary to masquerade as a smart uses (smart meter) identity through its authentication
meter, a service provider (or a backend server) or the trusted process. Next, we give the efficiency comparison among
anchor in our scheme, since the adversary would need to break these three existing schemes and the proposed one in
these two identity-based cryptosystems that are secure against terms of computation cost.
known attacks under random oracle. Man-in-the-middle attack Let Tb be the time to perform one bilinear pairing operation,
and UKS attack also cannot succeed their assaults on our Tmp be the time to perform one multiplication point operation,
scheme due to these identity-based cryptosystems. The pro- Tm be the time to perform one multiplication operation, Te be
posed scheme also supports smart meter anonymity as an the time to perform one modular exponentiation operation, Ts
identity-based encryption scheme is adopted to protect smart be the time to perform one symmetric encryption/decryption
meter identities. Without knowledge of the service provider’s operation, Tcert be the time to perform a certificate generation
private key, it is impossible for an adversary to retrieve the operation, Tcert_ver be the time to perform a certificate verifi-
identity of communicating smart meter from authentic mes- cation operation, TH be the time for performing a MapToPoint
sages. In addition, the Diffie–Hellman key agreement protocol operation, and Th be the time to perform one one-way
is applied in our scheme; therefore, the proposed scheme hash operation. Since execution time for the point addition
supports perfect forward secrecy. As shown in Table II, the operation and time for XOR operation are much less than time
proposed scheme achieves all required security properties. On required by other operations; therefore, the computation time
the contrary, Wu and Zhou’s scheme [20], Xia and Wang’s consumed by these two operations is ignored. In our scheme,
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

8 IEEE TRANSACTIONS ON SMART GRID

TABLE III
C OMPARISON ON C OMPUTATION C OSTS [8] H. Khurana, M. Hadley, N. Lu, and D. A. Frincke, “Smart grid security
issues,” IEEE Security Privacy, vol. 8, no. 1, pp. 71–85, Jan./Feb. 2010.
[9] Nat. Inst. Stand. Technol. (Aug. 2010). Guidelines for Smart Grid Cyber
Security: Vol. 3 Supportive Analyses and References. [Online]. Available:
http://csrc.nist.gov/publications/nistir/ir7628/nistir-7628v ol3.pdf
[10] Y. Strengers, “Smart metering demand management programs:
Challenging the comfort and cleanliness habitus of households,” in
Proc. 20th Australasian Conf. Comput.-Human Interact. Design. Habitus
Habitat, vol. 8. Cairns, QLD, Australia, 2010, pp. 41–48.
[11] S. Finster, “Smart meter speed dating, short-term relationships for
improved privacy in smart metering,” in Proc. IEEE Int. Conf. Smart
Grid Commun. (SmartGridComm), Vancouver, BC, Canada, 2013,
pp. 426–431.
[12] J. L. Tsai, N. W. Lo, and T. C. Wu, “Novel anonymous authentication
scheme using smart cards,” IEEE Trans. Ind. Informat., vol. 9, no. 4,
pp. 2004–2013, Nov. 2013.
[13] J. L. Tsai, “An improved cross-layer privacy-preserving authentication
in WAVE-enabled VANETs,” IEEE Commun. Lett., vol. 18, no. 11,
a smart meter requires 3Tmp +Te +3Th and Tmp +2Th to authen- pp. 1931–1934, Nov. 2014.
[14] M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams. (Jun. 1999).
ticate the corresponding service provider in steps 1 and 3 of the X.509 Internet Public Key Infrastructure Online Certificate Status
mutual authentication phase, respectively. The service provider Protocol—OCSP. [Online]. Available: http://www.ietf.org/rfc/rfc2560.txt
requires 2Tb + 3Tmp + Te + 5Th to perform steps 2 and 4 of [15] A. Shamir, “Identity-based cryptosystems and signature schemes,”
in Proc. Adv. Cryptol. (CRYPTO), Santa Barbara, CA, USA, 1984,
the mutual authentication phase. The trusted anchor does not pp. 47–53.
consume any time, since it does not participate in the mutual [16] N. Koblitz, “Elliptic curve cryptosystems,” Math. Comput., vol. 48,
authentication phase. Table III illustrates the computation costs no. 177, pp. 203–209, 1987.
[17] V. Miller, “Use of elliptic curves in cryptography,” in Proc. Adv.
for our scheme and the others. Based on [35], the computation Cryptol. (CRYPTO), Santa Barbara, CA, USA, 1985, pp. 417–426.
cost to perform one pairing operation is approximately equal [18] Recommendation for Key Management, Part 1: General, NIST
to the computation cost of computing three scalar multiplica- Standard SP 800-57, 2007.
[19] D. Boneh and M. K. Franklin, “Identity-based encryption from the
tions. From Table III, Xia and Wang’s scheme [21] has the Weil pairing,” in Proc. CRYPTO, Santa Barbara, CA, USA, 2001,
best performance at smart meter side, followed by the pro- pp. 213–229.
posed scheme. However, all comparing schemes in Table III [20] D. Wu and C. Zhou, “Fault-tolerant and scalable key management
for smart grid,” IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 371–378,
are vulnerable to certain attacks and do not support smart Jun. 2011.
meter anonymity and perfect forward secrecy. Hence, the pro- [21] J. Xia and Y. Wang, “Secure key distribution for the smart grid,” IEEE
posed scheme is more practical and suitable for smart grid Trans. Smart Grid, vol. 3, no. 3, pp. 1437–1443, Aug. 2012.
[22] J. H. Park, M. Kim, and D. Kwon, “Security weakness in the smart grid
than other related schemes. key distribution proposed by Xia and Wang,” IEEE Trans. Smart Grid,
vol. 4, no. 3, pp. 1613–1614, Sep. 2013.
[23] Y. Wang. (2005). Efficient Identity-Based and Authenticated Key
VI. C ONCLUSION Agreement Protocol. [Online]. Available: http://eprint.iacr.org/2005/108
This paper introduced a new secure key distribution scheme [24] Y. Wang, “Efficient identity-based and authenticated key agreement
protocol,” in Transactions on Computational Science XVI. Berlin,
for smart grid environments. The proposed scheme allows Germany: Springer-Verlag, 2013, pp. 172–197.
a smart meter to anonymously access services from ser- [25] Y. Wang, “Password protected smart card and memory stick authentication
vice providers with one private key. The advantage of the against off-line dictionary attacks,” in Information Security and Privacy
Research. Berlin, Germany: Springer-Verlag, 2012, pp. 489–500.
proposed scheme is that a smart meter can be quickly authen- [26] H. Krawczyk, “HMQV: A high-performance secure Diffie–Hellman pro-
ticated by responding service providers without involving the tocol,” in Proc. CRYPTO, Santa Barbara, CA, USA, 2005, pp. 546–566.
trusted anchor, because two identity-based cryptosystems are [27] R. Sakai and M. Kasahara, “ID based cryptosystems with pairing on
elliptic curve,” Cryptol. ePrint Archive, Report 2003/054, 2003. [Online].
adopted in our scheme. Unlike other existing schemes, the Available: http://eprint.iacr.org/2003/054.pdf
proposed scheme supports mutual authentication and smart [28] P. S. L. M. Barreto, B. Libert, N. McCullagh, and J. J. Quisquater,
meter anonymity. We also conduct security analysis to prove “Efficient and provably-secure identity-based signatures and signcryp-
tion from bilinear maps,” in Advances in Cryptology—ASIACRYPT.
the proposed scheme is secure under random oracle model. Berlin, Germany: Springer-Verlag, 2005, pp. 515–532.
[29] H. J. Yoon, J. H. Cheon, and Y. D. Kim, “Batch verifications with
R EFERENCES ID-based signatures,” in Information Security and Cryptology—ICISC.
Berlin, Germany: Springer-Verlag, 2005, pp. 233–248.
[1] The Smart Grid: An Introduction, U.S. Dept. Energy, Washington, DC, [30] K. A. Shim, “An ID-based aggregate signature scheme with constant pair-
USA, 2008. ing computations,” J. Syst. Softw., vol. 83, no. 10, pp. 1873–1880, 2010.
[2] National Institute of Standards and Technology Draft, NIST [31] M. Bellare, D. Pointcheval, and P. Rogaway, “Authenticated key
Standard 1.0 SP 800-52, 2009. agreement secure against dictionary attacks,” in Proc. Adv.
[3] S. Amin, “For the good of the grid,” IEEE Power Energy Mag., vol. 6, Cryptol. (EUROCRYPT), Bruges, Belgium, 2000, pp. 139–155.
no. 6, pp. 48–59, Nov./Dec. 2008. [32] M. Jakobsson and D. Pointcheval, “Mutual authentication for low-power
[4] P. McDaniel and S. McLaughlin, “Security and privacy challenges mobile devices,” in Proc. Int. Conf. Financ. Cryptography (FC), 2001,
in the smart grid,” IEEE Security Privacy, vol. 7, no. 3, pp. 75–77, pp. 178–195.
May/Jun. 2009. [33] E. Bresson, O. Chevassut, and D. Pointcheval, “Security proofs for
[5] X. Wang and P. Yi, “Security framework for wireless communications an efficient password-based key exchange,” in Proc. 10th ACM Conf.
in smart distribution grid,” IEEE Trans. Smart Grid, vol. 2, no. 4, Comput. Commun. Security, Washington, DC, USA, 2003, pp. 241–250.
pp. 809–818, 2011. [34] D. Pointcheval and J. Stern, “Security arguments for digital signatures
[6] T. Flick, “Hacking the smart grid,” in Proc. Black Hat, Las Vegas, NV, and blind signatures,” J. Cryptol., vol. 13, no. 3, pp. 361–396, 2000.
USA, 2009, pp. 1–7. [35] P. S. L. M. Barreto, H. Y. Kim, B. Lynn, and M. Scott, “Efficient algo-
[7] Guidelines for Smart Grid Cyber Security, NIST Standard IR 7628, rithms for pairing-based cryptosystems,” in Advances in Cryptology—
Aug. 2010. CRYPTO. Berlin, Germany: Springer-Verlag, 2002, pp. 354–369.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

TSAI AND LO: SECURE ANONYMOUS KEY DISTRIBUTION SCHEME FOR SMART GRID 9

Jia-Lun Tsai received the M.S. degree in e-learning Nai-Wei Lo (S’94–M’99) received the B.S. degree
from National Chiao Tung University, Hsinchu, in engineering science from National Cheng Kung
Taiwan, in 2007, and the Ph.D. degree in infor- University, Tainan, Taiwan, in 1988, and the M.S.
mation management from the National Taiwan and Ph.D. degrees in computer science and electrical
University of Science and Technology (NTUST), engineering from the State University of New York,
Taipei, Taiwan, in 2013. Stony Brook, NY, USA, in 1992 and 1998, respec-
He is currently with the Department of tively.
Information Management and the Taiwan He is currently an Associate Professor with the
Information Security Center, NTUST. His cur- Department of Information Management, National
rent research interests include cryptography, Taiwan University of Science and Technology,
wireless security, and network security. He has Taipei, Taiwan. His current research interests include
authored/co-authored over 20 papers in journals and at conferences. cryptography, radio-frequency identification applications and security, wireless
network routing and security, Web technology, and fault tolerance.

You might also like