Khalid Yahya, Shehzad Ashraf Chaudhry, F. Al-turjman
{"title":"智能计量基础设施认证方案的安全性研究","authors":"Khalid Yahya, Shehzad Ashraf Chaudhry, F. Al-turjman","doi":"10.1109/ETCCE51779.2020.9350916","DOIUrl":null,"url":null,"abstract":"Recently, in 2019, Kumar et al. (IEEE Transactions on Smart Grid 10.4 (2018): 4349–4359) proposed an ECC based lightweight authentication and Key agreement scheme (LAKA) to secure the communication among a smart meter (SM) and a neighbourhood area network (NAN) gateway. The LAKA scheme was proved as secure and efficient as per the comparisons performed by Kumar et al. Specifically, it was argued through security analysis that LAKA provides anonymity and resistance to related attacks. However, the specific analysis in this paper contradicts their claim and it is shown here that in addition to ephemeral secret leakage attack and lack of untraceability, the LAKA is also vulnerable to stolen verifier attack.","PeriodicalId":234459,"journal":{"name":"2020 Emerging Technology in Computing, Communication and Electronics (ETCCE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"On the Security of an Authentication Scheme for Smart Metering Infrastructure\",\"authors\":\"Khalid Yahya, Shehzad Ashraf Chaudhry, F. Al-turjman\",\"doi\":\"10.1109/ETCCE51779.2020.9350916\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, in 2019, Kumar et al. (IEEE Transactions on Smart Grid 10.4 (2018): 4349–4359) proposed an ECC based lightweight authentication and Key agreement scheme (LAKA) to secure the communication among a smart meter (SM) and a neighbourhood area network (NAN) gateway. The LAKA scheme was proved as secure and efficient as per the comparisons performed by Kumar et al. Specifically, it was argued through security analysis that LAKA provides anonymity and resistance to related attacks. However, the specific analysis in this paper contradicts their claim and it is shown here that in addition to ephemeral secret leakage attack and lack of untraceability, the LAKA is also vulnerable to stolen verifier attack.\",\"PeriodicalId\":234459,\"journal\":{\"name\":\"2020 Emerging Technology in Computing, Communication and Electronics (ETCCE)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 Emerging Technology in Computing, Communication and Electronics (ETCCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ETCCE51779.2020.9350916\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Emerging Technology in Computing, Communication and Electronics (ETCCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETCCE51779.2020.9350916","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
摘要
最近,在2019年,Kumar等人(IEEE Transactions on Smart Grid 10.4(2018): 4349-4359)提出了一种基于ECC的轻量级身份验证和密钥协议方案(LAKA),以保护智能电表(SM)和邻居局域网(NAN)网关之间的通信。根据Kumar等人的比较,LAKA方案被证明是安全有效的。具体来说,通过安全分析认为LAKA提供了匿名性和抵抗相关攻击的能力。然而,本文的具体分析与他们的说法相矛盾,这里表明,除了短暂的秘密泄漏攻击和缺乏不可追溯性之外,LAKA还容易受到被盗验证器攻击。
On the Security of an Authentication Scheme for Smart Metering Infrastructure
Recently, in 2019, Kumar et al. (IEEE Transactions on Smart Grid 10.4 (2018): 4349–4359) proposed an ECC based lightweight authentication and Key agreement scheme (LAKA) to secure the communication among a smart meter (SM) and a neighbourhood area network (NAN) gateway. The LAKA scheme was proved as secure and efficient as per the comparisons performed by Kumar et al. Specifically, it was argued through security analysis that LAKA provides anonymity and resistance to related attacks. However, the specific analysis in this paper contradicts their claim and it is shown here that in addition to ephemeral secret leakage attack and lack of untraceability, the LAKA is also vulnerable to stolen verifier attack.