{"title":"基于椭圆曲线密码的智能电网通信轻量级认证方案的密码分析","authors":"Dipanwita Sadhukhan, Sangram Ray","doi":"10.1109/RAIT.2018.8389040","DOIUrl":null,"url":null,"abstract":"In 2017, Mahmood et al have proposed an authentication scheme for providing comprehensive security requirements in communication between consumer and substations of smart grid environment to enable appropriate adjustment in electricity generation and consistent power supply in smart cities [1]. It is claimed that the scheme provides a secure remote user authentication and key agreement for the smart grids and is able to withstand all the known security attacks. In this paper we have analyzed the Mahmood et al scheme and it is found that the scheme is vulnerable to some security flaws such as user impersonation attack, known session specific temporary information attack, server masquerading attack, privileged insider attack, stolen smart card/device attack, clock synchronization problem and inability to protect user anonymity.","PeriodicalId":219972,"journal":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Cryptanalysis of an elliptic curve cryptography based lightweight authentication scheme for smart grid communication\",\"authors\":\"Dipanwita Sadhukhan, Sangram Ray\",\"doi\":\"10.1109/RAIT.2018.8389040\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In 2017, Mahmood et al have proposed an authentication scheme for providing comprehensive security requirements in communication between consumer and substations of smart grid environment to enable appropriate adjustment in electricity generation and consistent power supply in smart cities [1]. It is claimed that the scheme provides a secure remote user authentication and key agreement for the smart grids and is able to withstand all the known security attacks. In this paper we have analyzed the Mahmood et al scheme and it is found that the scheme is vulnerable to some security flaws such as user impersonation attack, known session specific temporary information attack, server masquerading attack, privileged insider attack, stolen smart card/device attack, clock synchronization problem and inability to protect user anonymity.\",\"PeriodicalId\":219972,\"journal\":{\"name\":\"2018 4th International Conference on Recent Advances in Information Technology (RAIT)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 4th International Conference on Recent Advances in Information Technology (RAIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RAIT.2018.8389040\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RAIT.2018.8389040","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptanalysis of an elliptic curve cryptography based lightweight authentication scheme for smart grid communication
In 2017, Mahmood et al have proposed an authentication scheme for providing comprehensive security requirements in communication between consumer and substations of smart grid environment to enable appropriate adjustment in electricity generation and consistent power supply in smart cities [1]. It is claimed that the scheme provides a secure remote user authentication and key agreement for the smart grids and is able to withstand all the known security attacks. In this paper we have analyzed the Mahmood et al scheme and it is found that the scheme is vulnerable to some security flaws such as user impersonation attack, known session specific temporary information attack, server masquerading attack, privileged insider attack, stolen smart card/device attack, clock synchronization problem and inability to protect user anonymity.