{"title":"Cryptanalysis of an elliptic curve cryptography based lightweight authentication scheme for smart grid communication","authors":"Dipanwita Sadhukhan, Sangram Ray","doi":"10.1109/RAIT.2018.8389040","DOIUrl":null,"url":null,"abstract":"In 2017, Mahmood et al have proposed an authentication scheme for providing comprehensive security requirements in communication between consumer and substations of smart grid environment to enable appropriate adjustment in electricity generation and consistent power supply in smart cities [1]. It is claimed that the scheme provides a secure remote user authentication and key agreement for the smart grids and is able to withstand all the known security attacks. In this paper we have analyzed the Mahmood et al scheme and it is found that the scheme is vulnerable to some security flaws such as user impersonation attack, known session specific temporary information attack, server masquerading attack, privileged insider attack, stolen smart card/device attack, clock synchronization problem and inability to protect user anonymity.","PeriodicalId":219972,"journal":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RAIT.2018.8389040","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
In 2017, Mahmood et al have proposed an authentication scheme for providing comprehensive security requirements in communication between consumer and substations of smart grid environment to enable appropriate adjustment in electricity generation and consistent power supply in smart cities [1]. It is claimed that the scheme provides a secure remote user authentication and key agreement for the smart grids and is able to withstand all the known security attacks. In this paper we have analyzed the Mahmood et al scheme and it is found that the scheme is vulnerable to some security flaws such as user impersonation attack, known session specific temporary information attack, server masquerading attack, privileged insider attack, stolen smart card/device attack, clock synchronization problem and inability to protect user anonymity.