Design issues in "a secure and efficient key agreement framework for critical energy infrastructure using mobile device"

Zhengjun Cao
DOI: https://doi.org/10.1007/s11235-024-01127-4
2024-03-16
Telecommunication Systems
Abstract:We show that the scheme (Telecommun Syst 78:539–557, 2021) is flawed. It uses a symmetric key encryption to transfer data between vehicles and the grid. But the specified symmetric key is easily retrieved by an adversary, which results in the loss of data confidentiality, and makes it vulnerable to impersonation attack, man-in-the-middle attack, and replay attack. We also present a method to fix this flaw and remove some superfluous communications in its registration phase.
telecommunications
What problem does this paper attempt to address?