Skip to main content

A Lightweight PUF-Based Group Authentication Scheme for Privacy-Preserving Metering Data Collection in Smart Grid

  • Conference paper
  • First Online:
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2023)

Abstract

With the development of information and communication technologies, the services provided by smart grid attract more users to join smart grid. However, with the explosive growth of the number of smart meters, the transmission between the control center and smart meters has brought huge data transmission and computing costs to the smart grid, which is prone to network congestion, untimely power service supply and other network conditions. This paper proposes a Physically Unclonable Function (PUF)-based lightweight group authenticated metering data collection scheme with privacy protection in smart grid (PGAC). The PGAC scheme is designed with lightweight cryptographic primitives, which is suitable for resource-constrained devices. In addition, the PGAC scheme divides the users into groups and uses the gateway as the repeater and aggregator of the communication data of each group, which reduces signaling and communication costs for activating additional request messages from a large number of devices. Security analysis shows that the PGAC scheme maintains the security and privacy of the data collection process for large-scale smart meters. Functional analysis, theoretical analysis and performance analysis show that PGAC scheme has better authentication function and low communication cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cao, Y.N., Wang, Y., Ding, Y., Guo, Z., Wu, Q., Liang, H.: Blockchain-empowered security and privacy protection technologies for smart grid. Comput. Stand. Interf. 85, 103708 (2023)

    Article  Google Scholar 

  2. Cao, Y.N., Wang, Y., Ding, Y., Zheng, H., Guan, Z., Wang, H.: A puf-based lightweight authenticated metering data collection scheme with privacy protection in smart grid. In: 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30 - Oct. 3, 2021, pp. 876–883. IEEE (2021)

    Google Scholar 

  3. Delavar, M., Mirzakuchaki, S., Ameri, M., Mohajeri, J.: Puf-based solutions for secure communications in advanced metering infrastructure (ami): Puf-based solutions for secure communications in ami. Int. J. Commun. Syst. 30, e3195 (10 2016)

    Google Scholar 

  4. Delvaux, J., Peeters, R., Gu, D., Verbauwhede, I.: A survey on lightweight entity authentication with strong pufs. ACM Comput. Surv. 48(2) (oct 2015)

    Google Scholar 

  5. Devadas, S., Suh, E., Paral, S., Sowell, R., Ziola, T., Khandelwal, V.: Design and implementation of puf-based "unclonable" rfid ics for anti-counterfeiting and security applications. In: 2008 IEEE International Conference on RFID, pp. 58–64 (2008)

    Google Scholar 

  6. Ding, Y., Wang, B., Wang, Y., Zhang, K., Wang, H.: Secure metering data aggregation with batch verification in industrial smart grid. IEEE Trans. Industr. Inf. 16(10), 6607–6616 (2020)

    Article  Google Scholar 

  7. Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)

    Google Scholar 

  8. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) Advances in Cryptology - EUROCRYPT 2004, pp. 523–540. Springer, Berlin Heidelberg, Berlin, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Fan, H., Liu, Y., Zeng, Z.: Decentralizing privacy-preserving data aggregation scheme using blockchain in smart grid. In: Security and Privacy in Digital Economy: First International Conference, SPDE 2020, Quzhou, China, October 30-November 1, 2020, Proceedings 1, pp. 131–142. Springer (2020)

    Google Scholar 

  10. Fang, L., Li, M., Liu, Z., Lin, C., Ji, S., Zhou, A., Susilo, W., Ge, C.: A secure and authenticated mobile payment protocol against off-site attack strategy. IEEE Trans. Dependable Secure Comput. 19(5), 3564–3578 (2022). https://doi.org/10.1109/TDSC.2021.3102099

    Article  Google Scholar 

  11. Gope, P., Sikdar, B.: Privacy-aware authenticated key agreement scheme for secure smart grid communication. IEEE Trans. Smart Grid 10(4), 3953–3962 (2018)

    Article  Google Scholar 

  12. Guan, Z., Zhang, Y., Zhu, L., Wu, L., Yu, S.: Effect: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid. SCIENCE CHINA Inf. Sci. 62, 1–14 (2019)

    Article  Google Scholar 

  13. Guilley, S., Pacalet, R.: Soc security: a war against side-channels. Annals of Telecommunications-annales des télécommunications (2004)

    Google Scholar 

  14. Guo, Z., Qin, B., Guan, Z., Wang, Y., Zheng, H., Wu, Q.: A high-efficiency and incentive-compatible peer-to-peer energy trading mechanism. IEEE Transactions on Smart Grid, pp. 1–1 (2023)

    Google Scholar 

  15. Herder, C., Yu, M.D., Koushanfar, F., Devadas, S.: Physical unclonable functions and applications: a tutorial. Proc. IEEE 102(8), 1126–1141 (2014)

    Article  Google Scholar 

  16. Kaur, T., Kaur, M.: Cryptographic key generation from multimodal template using fuzzy extractor. In: 2017 Tenth International Conference on Contemporary Computing (IC3), pp. 1–6 (2017)

    Google Scholar 

  17. Khan, A.A., Kumar, V., Ahmad, M., Rana, S.: Lakaf: lightweight authentication and key agreement framework for smart grid network. J. Syst. Architect. 116, 102053 (2021)

    Article  Google Scholar 

  18. Kumar, N., Aujla, G.S., Das, A.K., Conti, M.: Eccauth: a secure authentication protocol for demand response management in a smart grid system. IEEE Trans. Industr. Inf. 15(12), 6572–6582 (2019)

    Article  Google Scholar 

  19. Li, X., et al.: A privacy-preserving lightweight energy data sharing scheme based on blockchain for smart grid. In: Gao, H., Wang, X., Wei, W., Dagiuklas, T. (eds.) Collaborative Computing: Networking, Applications and Worksharing - 18th EAI International Conference, CollaborateCom 2022, Hangzhou, China, October 15–16, 2022, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 461, pp. 91–110. Springer (2022). https://doi.org/10.1007/978-3-031-24386-8_6

  20. Liu, S., Zhang, Q., Liu, H.: Privacy protection of the smart grid system based on blockchain. J. Phys.: Conf. Series 1744(2), 022129 (Feb 2021)

    Google Scholar 

  21. Lu, W., Ren, Z., Xu, J., Chen, S.: Edge blockchain assisted lightweight privacy-preserving data aggregation for smart grid. IEEE Trans. Netw. Serv. Manage. 18(2), 1246–1259 (2021)

    Article  Google Scholar 

  22. M, N.B., Pushparajesh, V.: Review of internet of things: distributed power in smart grid. IOP Conf. Series: Mater. Sci. Eng. 1055(1), 012139 (feb 2021)

    Google Scholar 

  23. Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(5589), 2026–2030 (2002)

    Article  Google Scholar 

  24. Ren, X., Cao, J., Ma, M., Li, H., Zhang, Y.: A novel puf-based group authentication and data transmission scheme for nb-iot in 3g pp 5g networks. IEEE Internet Things J. 9(5), 3642–3656 (2022)

    Article  Google Scholar 

  25. Tuyls, P., Batina, L.: Rfid-tags for anti-counterfeiting. In: Topics in Cryptology-CT-RSA 2006: The Cryptographers’ Track at the RSA Conference 2006, San Jose, CA, USA, February 13–17, 2005. Proceedings. pp. 115–131. Springer (2006). https://doi.org/10.1007/11605805_8

  26. Zeng, X., Liu, Q., Huang, H., Jia, X.: A lightweight privacy-preserving scheme for metering data collection in smart grid. In: 2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6 (2017)

    Google Scholar 

  27. Zhang, L., Zhao, L., Yin, S., Chi, C.H., Liu, R., Zhang, Y.: A lightweight authentication scheme with privacy protection for smart grid communications. Futur. Gener. Comput. Syst. 100, 770–778 (2019)

    Article  Google Scholar 

Download references

Acknowledgments

This article is supported in part by the Guangxi Natural Science Foundation under grant 2019GXNSFGA245004 and 2023GXNSFAA026236, the National Natural Science Foundation of China under projects 61962012 and 62303037, the Zhejiang Soft Science Research Program under grant 2023C35081, and the special fund of the High-level Innovation Team and Outstanding Scholar Program for universities of Guangxi.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hai Liang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cao, YN., Wang, Y., Ding, Y., Guo, Z., Yang, C., Liang, H. (2024). A Lightweight PUF-Based Group Authentication Scheme for Privacy-Preserving Metering Data Collection in Smart Grid. In: Gao, H., Wang, X., Voros, N. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 562. Springer, Cham. https://doi.org/10.1007/978-3-031-54528-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-54528-3_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-54527-6

  • Online ISBN: 978-3-031-54528-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics