Cryptanalysis and improvement of a three-factor user authentication scheme for smart grid environment

被引:6
|
作者
Grover H.S. [1 ]
Adarsh [1 ]
Kumar D. [2 ]
机构
[1] Division of Computer Engineering, NSIT, New Delhi
[2] Department of Information Technology, NSUT, New Delhi
来源
关键词
ProVerif; Session key agreement; Smart grid; User authentication; User impersonation attack;
D O I
10.1007/s40860-020-00113-2
中图分类号
学科分类号
摘要
Nowadays, smart grid technology has become popular because it provides intelligent and distributed electrical power transmission systems. One of its main applications is to charge the electric vehicles. To provide a secure communication between a user and a smart meter and during the peak hours, authentication is necessary between them. Recently, Wazid et al. have discussed a three factor authentication (3FA) scheme for smart grid environment using ECC and showed that it is more secure than the related protocols. Here, we first cryptanalyze their scheme and find the user impersonation and stolen mobile terminal attacks in it. To remove these limitations, we design an improved authentication protocol for smart grid environment. We formally verify the security of our scheme using ProVerif tool. Also we present its informal security analysis to prove that it is invulnerable to many known attacks. In comparative study, we show that our scheme provides more security features than the existing schemes. © 2020, Springer Nature Switzerland AG.
引用
收藏
页码:249 / 260
页数:11
相关论文
共 50 条
  • [1] Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Rodrigues, Joel J. P. C.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (06) : 3144 - 3153
  • [2] Cryptanalysis and Extended Three-Factor Remote User Authentication Scheme in Multi-Server Environment
    Preeti Chandrakar
    Hari Om
    [J]. Arabian Journal for Science and Engineering, 2017, 42 : 765 - 786
  • [3] Cryptanalysis and Extended Three-Factor Remote User Authentication Scheme in Multi-Server Environment
    Chandrakar, Preeti
    Om, Hari
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (02) : 765 - 786
  • [4] Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks
    Xie, Qi
    Tang, Zhixiong
    Chen, Kefei
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 218 - 230
  • [5] Cryptanalysis and improvement of a two-factor user authentication scheme for smart home
    Kaur, Damandeep
    Kumar, Devender
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [6] Cryptanalysis of Improved and Provably Secure Three-Factor User Authentication Scheme for Wireless Sensor Networks
    Ryu, Jihyeon
    Song, Taeui
    Moon, Jongho
    Kim, Hyoungshick
    Won, Dongho
    [J]. COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 49 - 58
  • [7] Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment
    Lee, Hakjun
    Kang, Dongwoo
    Lee, Youngsook
    Won, Dongho
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [8] Cryptanalysis and Improvement of a Two-Factor User Authentication Scheme
    Kumar, Devender
    Chand, Satish
    Kumar, Bijendra
    [J]. INFOCOMMUNICATIONS JOURNAL, 2018, 10 (01): : 10 - 14
  • [9] Cryptanalysis and Improvement of a Remote User Authentication Scheme using Smart Cards
    Giri, Debasis
    Srivastava, P. D.
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 355 - 361
  • [10] Cryptanalysis and Improvement of Remote User Authentication Scheme Using Smart Card
    Madhusudhan, R.
    Hegde, Manjunath
    [J]. PROCEEDINGS OF 6TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE 2016), 2016, : 84 - 89