An Efficient Lightweight Authentication Scheme for Smart Meter

Jingqi Du,Chengjing Dai,Pinshang Mao,Wenlong Dong,Xiujun Wang,Zhongwei Li
DOI: https://doi.org/10.3390/math12081264
IF: 2.4
2024-04-23
Mathematics
Abstract:With the rapid development of the information age, smart meters play an important role in the smart grid. However, there are more and more attacks on smart meters, which mainly focus on the identity authentication of smart meters and the security protection of electricity consumption data. In this paper, an efficient lightweight smart meter authentication scheme is proposed based on the Chinese Remainder Theorem (CRT), which can realize the revocation of a single smart meter user by publishing a secret random value bound to the smart meter identity. The proposed scheme not only protects the security of smart meter electricity consumption data by using encryption, but also resists identity attacks from both internal and external adversaries by using hash functions and timestamps. Experiment shows that the proposed scheme has lower computation overhead and communication overhead than other authentication schemes and is more suitable for smart meter authentication.
mathematics
What problem does this paper attempt to address?
The problem that this paper attempts to solve is that in the smart grid, the identity authentication of smart meters and the security protection of electricity consumption data are facing an increasing number of attack threats. Specifically, the paper focuses on the following aspects: 1. **Identity Authentication**: How to effectively verify the true identity of smart meters and prevent illegal users from impersonating legitimate users to carry out attacks. 2. **Data Security**: How to protect the electricity consumption data transmitted by smart meters from being tampered with or stolen. 3. **Internal and External Attacks**: How to resist identity attacks from internal users (such as malicious area managers) and external attackers. 4. **User Revocation**: How to efficiently revoke the identity authentication of a smart meter user after it is revoked, and prevent the revoked user from continuing to use the system. To solve the above problems, the paper proposes an efficient and lightweight smart meter identity authentication scheme based on the Chinese Remainder Theorem (CRT). The main features of this scheme include: - **Resistance to Collision Attacks by Internal Users**: By using the randomness, one - wayness and collision - resistance of the hash function, even if multiple smart meter users conspire, they cannot guess the random numbers or hash values of other smart meters. - **Resistance to Attacks by Malicious Area Managers**: Since the user's random number \(a_i\) is hidden in the hash function \(h = H(a_i, \text{Pow}, T_s')\), the area manager cannot obtain the corresponding \(a_i\), so it cannot forge a valid bill. - **Efficient User Revocation Mechanism**: The operation center (OC) can disclose the revoked user's secret random value \(a_i\), so that the area manager (RM) can reject the user's authentication request during the authentication process. - **Low Communication and Computation Overhead**: The experimental results show that this scheme is superior to other identity authentication schemes in terms of communication and computation overhead, and is more suitable for the identity authentication of smart meters. Through these measures, this scheme aims to provide an efficient and secure smart meter identity authentication method to ensure the data security and user privacy in the smart grid.