智能计量基础设施认证方案的安全性研究

Khalid Yahya, Shehzad Ashraf Chaudhry, F. Al-turjman
{"title":"智能计量基础设施认证方案的安全性研究","authors":"Khalid Yahya, Shehzad Ashraf Chaudhry, F. Al-turjman","doi":"10.1109/ETCCE51779.2020.9350916","DOIUrl":null,"url":null,"abstract":"Recently, in 2019, Kumar et al. (IEEE Transactions on Smart Grid 10.4 (2018): 4349–4359) proposed an ECC based lightweight authentication and Key agreement scheme (LAKA) to secure the communication among a smart meter (SM) and a neighbourhood area network (NAN) gateway. The LAKA scheme was proved as secure and efficient as per the comparisons performed by Kumar et al. Specifically, it was argued through security analysis that LAKA provides anonymity and resistance to related attacks. However, the specific analysis in this paper contradicts their claim and it is shown here that in addition to ephemeral secret leakage attack and lack of untraceability, the LAKA is also vulnerable to stolen verifier attack.","PeriodicalId":234459,"journal":{"name":"2020 Emerging Technology in Computing, Communication and Electronics (ETCCE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"On the Security of an Authentication Scheme for Smart Metering Infrastructure\",\"authors\":\"Khalid Yahya, Shehzad Ashraf Chaudhry, F. Al-turjman\",\"doi\":\"10.1109/ETCCE51779.2020.9350916\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, in 2019, Kumar et al. (IEEE Transactions on Smart Grid 10.4 (2018): 4349–4359) proposed an ECC based lightweight authentication and Key agreement scheme (LAKA) to secure the communication among a smart meter (SM) and a neighbourhood area network (NAN) gateway. The LAKA scheme was proved as secure and efficient as per the comparisons performed by Kumar et al. Specifically, it was argued through security analysis that LAKA provides anonymity and resistance to related attacks. However, the specific analysis in this paper contradicts their claim and it is shown here that in addition to ephemeral secret leakage attack and lack of untraceability, the LAKA is also vulnerable to stolen verifier attack.\",\"PeriodicalId\":234459,\"journal\":{\"name\":\"2020 Emerging Technology in Computing, Communication and Electronics (ETCCE)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 Emerging Technology in Computing, Communication and Electronics (ETCCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ETCCE51779.2020.9350916\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Emerging Technology in Computing, Communication and Electronics (ETCCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETCCE51779.2020.9350916","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

最近,在2019年,Kumar等人(IEEE Transactions on Smart Grid 10.4(2018): 4349-4359)提出了一种基于ECC的轻量级身份验证和密钥协议方案(LAKA),以保护智能电表(SM)和邻居局域网(NAN)网关之间的通信。根据Kumar等人的比较,LAKA方案被证明是安全有效的。具体来说,通过安全分析认为LAKA提供了匿名性和抵抗相关攻击的能力。然而,本文的具体分析与他们的说法相矛盾,这里表明,除了短暂的秘密泄漏攻击和缺乏不可追溯性之外,LAKA还容易受到被盗验证器攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
On the Security of an Authentication Scheme for Smart Metering Infrastructure
Recently, in 2019, Kumar et al. (IEEE Transactions on Smart Grid 10.4 (2018): 4349–4359) proposed an ECC based lightweight authentication and Key agreement scheme (LAKA) to secure the communication among a smart meter (SM) and a neighbourhood area network (NAN) gateway. The LAKA scheme was proved as secure and efficient as per the comparisons performed by Kumar et al. Specifically, it was argued through security analysis that LAKA provides anonymity and resistance to related attacks. However, the specific analysis in this paper contradicts their claim and it is shown here that in addition to ephemeral secret leakage attack and lack of untraceability, the LAKA is also vulnerable to stolen verifier attack.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信