Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

An efficient heterogeneous signcryption for smart grid

  • Chunhua Jin ,

    Contributed equally to this work with: Chunhua Jin, Guanhua Chen, Changhui Yu, Jinsong Shan, Jianyang Zhao, Ying Jin

    Roles Investigation

    xajch0206@163.com

    Affiliation Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huai’an, China

  • Guanhua Chen ,

    Contributed equally to this work with: Chunhua Jin, Guanhua Chen, Changhui Yu, Jinsong Shan, Jianyang Zhao, Ying Jin

    Roles Formal analysis

    Affiliation Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huai’an, China

  • Changhui Yu ,

    Contributed equally to this work with: Chunhua Jin, Guanhua Chen, Changhui Yu, Jinsong Shan, Jianyang Zhao, Ying Jin

    Roles Formal analysis, Validation

    Affiliation Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huai’an, China

  • Jinsong Shan ,

    Contributed equally to this work with: Chunhua Jin, Guanhua Chen, Changhui Yu, Jinsong Shan, Jianyang Zhao, Ying Jin

    Roles Project administration

    Affiliation Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huai’an, China

  • Jianyang Zhao ,

    Contributed equally to this work with: Chunhua Jin, Guanhua Chen, Changhui Yu, Jinsong Shan, Jianyang Zhao, Ying Jin

    Roles Supervision

    Affiliation Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huai’an, China

  • Ying Jin

    Contributed equally to this work with: Chunhua Jin, Guanhua Chen, Changhui Yu, Jinsong Shan, Jianyang Zhao, Ying Jin

    Roles Validation

    Affiliation Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huai’an, China

Abstract

A smart grid, considered the next-generation type of power grid, combines a traditional power grid with information and communication technologies to effectively facilitate power generation and ensure transmission security and reliability in real-time. Only authorized consumers should be able to access the smart grid because the information gathered by smart meters includes users’ private information. However, smart grid security is still a challenge. Motivated by this challenge, in this paper, we propose a heterogeneous signcryption (HSC) scheme for secure communication between smart meters and the utility. We demonstrate that this scheme is indistinguishable against adaptive chosen-ciphertext attacks (IND-CCA2), existentially unforgeable against adaptive chosen-message attacks (EUF-CMA) and ciphertext-anonymous against adaptive chosen ciphertext attacks (ANON-CCA2) under the computational Diffie-Hellman (CDH) problem in the random oracle model. Our scheme simultaneously achieves confidentiality, integrity, authentication, non-repudiation and ciphertext anonymity in a single logical step. It supports heterogeneous systems, allowing a meter in an identity-based cryptography (IBC) environment to transmit electrical usage data to a utility in a public key infrastructure (PKI) environment. Compared with other existing related schemes, our scheme has the lowest communication overhead and energy consumption for the smart grid. Based on these features, our scheme is highly suitable for secure power transmissions in a smart grid.

Introduction

Smart grid is envisioned as a next-generation power grid that aims to provide users with electricity in a more reliable and efficient manner [15]. The main feature of a traditional power grid is one-way electricity distribution from power plants to consumers. In contrast, a smart grid integrates advanced communication technologies into the traditional grid, allowing two-way energy and information flow. In addition, a smart grid provides consumers with tools to optimize their energy consumption.

Smart meters, which include processors and storage, are key components of a smart grid. Smart meters can communicate with household appliances as well as with facilities at the utility. A smart grid equipped with smart meters can monitor electricity distribution and consumption information in real-time, provide subscribed users with power and fulfill advanced demands as well as manage power usage and outages [6] through a reliable communication network. A smart meter at each home collects electrical usage data from all the electric appliances at the home and transmits these data to the utility company. Thus, a smart grid can provide specific real-time power usage details through the communications between the smart meters and the utility. Then, the utility can change the price of power accordingly. Moreover, it also can adjust users’ power usage using preset load controls to flatten peak demands and avoid potential blackouts. Customers can obtain information about their electricity usage from the smart meters, and thus reschedule their current electric power usage, transferring power usage from peak times to non-peak times to control their costs.

A smart grid provides large benefits for both consumers and the utility. However, its success heavily relies upon communications systems, and the vulnerabilities inherent to communications systems can clearly affect the smart grid, cause severe harm to the entire infrastructure, and damage the economy, the society and affect people’s lives. Thus, communications security is a primary concern in smart grids [715]. In this paper, we concentrate primarily on sending power consumption information from smart meters to a utility in a secure manner. The basic considerations are as follows. 1) The power consumption data should be obtainable only by the smart meters and the utility. No other entities should be able to obtain the power consumption data because these data are sensitive. 2) The power consumption data must be authenticated. Without authentication, power consumption data are potentially fake. 3) The power consumption data must not have been altered during transmission. If the power consumption data have been modified, malicious operations have been detected. 4) After a smart meter has sent a consumer’s data to the utility, it cannot retroactively deny its action. 5) The power usage data include no extractable information that can help a third party to identify either the meter or the utility.

It is difficult to propose a scheme that simultaneously meets all the abovementioned properties. Additionally, we must consider that the computational and communication resources of a smart meter are limited. However, the utility has strong computational and communication resources. Thus, the resources available to smart meters and to the utility are not equivalent. Thus, we propose a heterogeneous secure signcryption scheme that accords with such characteristics. The advantage of this heterogeneous scheme is that smart meters have no certificate management problem, but the utility can afford the overhead involved in certificate management.

To ensure secure communications from smart meters to the utility, in this paper, we design a secure HSC scheme. This scheme supports heterogeneous operations on the communication entities. There are three primary innovative points made in this paper.

  • First, based on the fact that energy usage data must be well protected, we propose a secure HSC scheme to simultaneously achieve confidentiality, authentication, integrity, non-repudiation and ciphertext anonymity in a logical single step.
  • Second, to analyze the security strength of our scheme, a provable security technique is employed to formally prove the proposed scheme’s security. This scheme has the properties of IND-CCA2 [16] and EUF-CMA [16] under the CDH problem in the random oracle model. According to this performance analysis, we conclude that the proposed scheme is more efficient than any other existing HSC schemes [1719].
  • Third, we adopt the heterogeneous communication system. Specifically, we require that a smart meter working in an IBC system be able to send a message to a utility belonging to a PKI system. This heterogeneous characteristic allows our scheme to be used for power information transmission in a smart grid because smart meters have no certificate management ability.

The reminder of the paper is arranged as follows. Related works are reviewed in Section 2. The system model, security requirements, design goal and bilinear pairings are introduced in Section 3. Then, the HSC scheme is designed in Section 4. We discuss its security and performance in Sections 5 and 6, respectively. Finally, Section 7 provides conclusions.

Related work

Signcryption [20] is a cryptographic primitive that can simultaneously fulfill the functions of a digital signature and public key encryption in a logical single step. Meanwhile, its cost is significantly lower, and its performance exceeds those of the traditional sign-then-encrypt approach. These advantages make signcryption particularly beneficial in environments with limited resources because the properties of confidentiality, authentication, integrity and non-repudiation can be achieved simultaneously at a lower cost. Some PKI-based signcryption schemes [16, 2123] and some IBC-based signcryption [2428] schemes have been proposed. But these signcryption schemes are homogeneous; in other words, both the sender and the receiver must be working in the same environment. This requirement of homogeneity is unsuitable for heterogeneous communications.

To employ signcryption in heterogeneous systems, efficient and secure signcryption schemes must be constructed that support heterogeneous communications. Sun and Li [17] presented two HSC schemes. The first HSC scheme permits a sender that belongs to a PKI to transmit a message to a receiver that belongs to an IBC, while the second HSC scheme permits a sender that belongs to an IBC to transmit a message to a receiver that belongs to a PKI. However, these two schemes are not secure from insider attacks because such signcryption schemes have no non-repudiation guarantees. The notion of insider security is stronger than that of outsider security [29], and has two requirements: (1) if the private key of a sender is revealed, an attacker cannot obtain the original message; and (2) if the private key of a receiver is revealed, an attacker cannot counterfeit a ciphertext.

Regarding insider security, Huang et al. [18] presented an HSC scheme that permits a sender who belongs to an IBC to transmit a message to a receiver that belongs to a PKI. This approach is very promising and has triggered considerable followup research [19, 3032]. For example, Li and Xiong(hereafter called LX) [19] presented a heterogeneous online/offline signcryption (HOOSC) scheme that splits the SC into two phases: an offline phase and an online phase. The offline phase has no knowledge of messages, and most of the complex computations are implemented in this phase. In contrast, the online phase has knowledge of messages and performs only simpler calculations. In 2013, Li et al. [30] presented two SC schemes that support heterogeneous communication. The first HSC permits a sender belonging to a PKI environment to send a message to a receiver belonging to an IBC environment, while the second HSC permits a sender belonging to an IBC environment to send a message to a receiver belonging to the PKI environment. Recently, Li et al.(hereafter termed LZJ) [31] constructed a heterogeneous ring signcryption (HRSC) scheme that works from sensors to servers. The proposed scheme can protect the privacy of the sensor nodes. It permits a sensor node belonging to an IBC environment to send a message to a server belonging to a PKI environment. In 2016, Li et al.(hereafter called LHJ) [32] constructed an HSC scheme intended for communications from wireless sensor networks (WSNs) to an Internet server. In [32], the WSNs belong to a certificateless cryptography environment while the server works in a PKI environment.

Motivation and contribution

The motivation of this paper is to design a secure heterogeneous signcryption for smart grid. In our scheme, we adopt heterogeneous system which allows smart meters belonging to an IBC environment to transmit electrical usage data to a utility belonging to a PKI environment. The heterogeneity makes our scheme be suited to smart grid. We show that the proposed heterogeneous signcryption is indistinguishable against adaptive chosen-ciphertext attacks (IND-CCA2), existentially unforgeable against adaptive chosen-message attacks (EUF-CMA) and ciphertext-anonymous against adaptive chosen ciphertext attacks (ANON-CCA2) under the computational Diffie-Hellman (CDH) problem in the random oracle model. Our scheme can attain the insider security for confidentiality, integrity, authentication, non-repudiation and ciphertext anonymity in a single logical step. For performance analysis, our scheme has the lowest communication overhead and energy consumption for the smart grid.

System model, security requirements and design goals

In this section, we describe the system model, security requirements and design goals.

System model

Our heterogeneous system model, which includes three entity types: a PKG (Private Key Generator), a smart meter and a utility. The PKG is responsible for smart meter registration; it allocates an identity and a corresponding private key to every smart meter. It is always assumed to be trustworthy and never compromised. The smart meter is responsible for collecting electrical usage data and sending the collected data to the utility. The utility is responsible for detecting, responding, adjusting, and storing the power data.

Security requirements

Security is important for smart grid communications. In our system model, we assume that both the PKG and the certificate authority (CA) are trustable. However, an adversary exists who may eavesdrop or intercept users’ power data and the utility’s management control messages. The adversary may also perform attacks that affect data integrity. Moreover, the smart meters cannot deny any data they have previously transmitted. Therefore, to protect the electrical usage data, a smart grid must satisfy the following security requirements.

  • Confidentiality: Power usage information and management control messages should be kept secret to protect consumers’ privacy and the utility’s business information from anyone except the smart meters and the utility.
  • Authentication: Only a valid smart meter should be able to send electrical usage data to the utility and receive the corresponding utility services.
  • Integrity: The smart grid should be able to ensure that electrical usage data from smart meters and management messages from the utility have not been modified by unauthorized entities.
  • Non-repudiation: Once a smart meter has sent electrical usage data to the utility, that action cannot be retroactively denied (i.e., the smart meter cannot deny having transmitted the previous electrical usage data).
  • Scalability: Every smart meter sends its electronic data to the utility which realize one to one communication. We add a data collector in the sender to achieve multiple to one communication.

Design goals

Based on the system model described above and the security requirements, our design goal is to construct an efficient HSC scheme to ensure smart grid security. Specifically, we must achieve the following three objectives.

  • Heterogeneous systems could participate in the constructed scheme. As noted above, smart meters have limited computing capacity and storage resources, while the utility has strong computing, energy, bandwidth and storage capacities. Therefore, the proposed scheme should match these characteristics.
  • Our proposed scheme should achieve all the security requirements. We know that security is important for smart grids. If security is not ensured, the electricity usage data from the smart meters and the management messages from the utility could conceivably be forged and/or modified by an adversary. Therefore, our constructed scheme should achieve confidentiality, authentication, integrity and non-repudiation simultaneously.
  • The proposed scheme should achieve effective communications. Because the power transmission between the smart meter and the utility must meet real-time requirements, our constructed scheme must satisfy the requirements for effective communication.

Preliminaries

In this section, the bilinear pairings and the CDH problem are outlined.

Let G1 and GT be a cyclic additive group and a cyclic multiplicative group. The generator of G1 is P. G1 and GT have the same order q. A bilinear pairing is a map with the following three properties:

  1. Bilinear: On inputting , we have .
  2. Non-degeneracy: There exists a P, QG1 such that .
  3. Computability: On inputting P, QG1, an efficient algorithm exists to compute .

A bilinear pairing that satisfies the abovementioned properties is called an admissible bilinear pairing. The modified Weil pairing or Tate pairing are admissible maps of this type. For more details, readers can refer to [33].

On inputting a cyclic addition group G1, its prime order q and generator P, the CDH problem in G1 involves computing abP given (P, aP, bP) ∈ G1.

Definition 1. The (ϵ, t)-CDH assumption holds when no t-polynomial time adversary exists who has advantage of at least ϵ in solving the CDH problem.

An HSC scheme

In this section, we first provide the syntax and security notions for an HSC scheme that permits only a sender belonging to an IBC system to transmit a message to a receiver belonging to a PKI system. Here, we employ IP-HSC to denote the following SC, in which “I” denotes IBC and “P” denotes PKI. Then, we describe our proposed HSC scheme.

Syntax

A generic IP-HSC scheme comprises the following five algorithms.

  1. Setup: On inputting a security parameter k, this algorithm, which executes on a PKG, outputs a master private key s as well as the system parameters params.
  2. IBC-KE: On inputting the master key s and an identity ID of a user, this algorithm, which executes on a PKG, outputs a secret key SID. The PKG securely transmits the secret key to the corresponding user.
  3. PKI-KG: This algorithm is executed by PKI users. The user selects a secret key x and calculates a corresponding public key y which is signed by its CA.
  4. SC: On inputting a message m, a sender’s secret key and a receiver’s public key yr, this algorithm (executed by the sender) returns a ciphertext σ.
  5. USC: On inputting a ciphertext σ, the identity IDs of a sender as well as the receiver’s private key xr, this algorithm (executed by the receiver) returns a message m when σ is valid or a symbol ⊥ when σ is not valid.

For consistency, the algorithm should satisfy the following requirement: if then we have

Security notions

Both confidentiality and unforgeability should be satisfied in a signcryption scheme. Here, we slightly amend the notions in [2426, 34, 35] to adjust IP-HSC.

For confidentiality, the following game is enacted between a challenger and an adversary .

  1. Initial: On inputting a security parameter k, executes the Setup algorithm and sends a master private key s as well as the system parameters params to the adversary . Additionally, also runs the PKI-KG algorithm to generate the receiver’s private key xr and public key yr. It transmits yr to .
  2. Phase 1: requests USC queries adaptively. For a USC query, chooses a ciphertext σ as well as the identity IDs of a sender. runs USC(σ, IDs, xr) and transmits the result to .
  3. Challenge: determines when Phase 1 ends. produces two equal-length messages, m0 and m1, as well as the challenge identity of a sender. first runs the IBC-KE algorithm to obtain the secret key . Then, picks a random bit β ∈ {0, 1} and transmits to .
  4. Phase 2: As in phase 1, again performs USC queries in an adaptive manner. Nevertheless, it cannot perform a USC query on () to obtain the corresponding message this time.
  5. Guess: Therefore, generates a bit β′ and wins the game if β = β′.

’s advantage is defined as Adv() = |2Pr[β′ = β] − 1|, where Pr[β′ = β] denotes the probability that β′ = β.

Definition 2(Confidentiality). An IP-HSC scheme is (ϵ, t, qu)-IND-CCA2 secure when no PPT (probabilistic polynomial time) adversary succeeds with an advantage of at least ϵ after at most qu USC queries.

Notice that the aforementioned definition obtains the confidentiality’s insider security because is aware of the master private key and all senders’ private keys [29]. This corresponds to the insider security requirements that the signcryption scheme’s forward security must be ensured, and means that confidentiality is maintained even if the sender’s secret key is compromised.

For unforgeability, we consider the following game interacted between a challenger and an adversary .

  1. Initial: On inputting a security parameter k, executes the Setup algorithm and transmits the system parameters to . Additionally, executes the PKI-KG algorithm to obtain the receiver’s private key xr and public key yr and transmits them to .
  2. Attack: requests key extraction queries and signcryption queries adaptively. In a key extraction query, first chooses an identity ID and transmits it to . Then, executes the IBC-KE algorithm and transmits the corresponding secret key to . In a signcryption query, generates an identity IDs of a sender as well as a message m. first runs IBC-KE algorithm to obtain the private key of the sender. Then, sends to .
  3. Forgery: generates a challenge identity of a sender as well as a challenge ciphertext σ*. It succeeds if the following conditions hold:
    1. .
    2. has not requested a key extraction query on identity .
    3. has not requested a signcryption query on ().

The advantage of is defined as the probability that it wins.

Definition 3(Unforgeability) An IP-HSC scheme is (ϵ, t, qk, qs)-EUF-CMA secure, if no PPT (probabilistic polynomial time) adversary succeeds with an advantage of at least ϵ after at most qk key extraction queries and qs signcryption queries.

In the above definition, note that the adversary is aware of the receiver’s private key xr. This corresponds to the insider security requirement for the unforgeability of a signcryption scheme [29].

Proposed IP-HSC scheme

In this section, we present an efficient IP-HSC scheme for secure smart grid communications that mainly comprises five algorithms: Setup, IBC-KE, PKI-KG, SC and USC. Then, we present the design of IP-HSC. We list the main notations of our scheme in Table 1.

  1. Setup: On inputting a security parameter k, the PKG selects the bilinear map groups (G1, G2) of prime order q, a generator P for G1 and a bilinear map G1 × G1G2. It then chooses a master private key , a master public key Ppub = sP, and the hash functions H1: {0, 1}* → G1, , . Here, n denotes the size of a message to be signcrypted. The public parameters are {G1, G2, e, q, P, Ppub, n, H1, H2, H3}.
  2. IBC-KE: A sender belonging to an IBC transmits its identity IDs to PKG. The PKG calculates and sends the private key to the sender.
  3. PKI-KG: A receiver in a PKI selects a random value as its private key and computes yr = xrP as the corresponding public key.
  4. SC: On inputting a message m, the sender’s private key , and the receiver’s public key yr, the sender executes the following procedures.
    1. Choose randomly and compute U = rP.
    2. Compute h2 = H2(m, U, IDs, yr).
    3. Compute .
    4. Compute W = mIDsH3(U, yr, ryr).
    5. Output the ciphertext σ = (U, V, W).
  5. USC: On inputting a ciphertext σ, a sender’s public key , and a receiver’s private key xr, the receiver executes the following procedures.
    1. Compute T = xrU.
    2. Compute mIDs = WH3(U, yr, T).
    3. Compute h2 = H2(m, U, IDs, yr).
    4. Check whether . If so, output the message m. Otherwise, reject and output a failure symbol ⊥.

Our IP-HSC scheme is heterogeneous, which is different from HSC [2426, 34, 35]. In our proposed scheme, the sender is in an IBC system while the receiver is in a PKI system. Therefore, the characteristics of heterogeneous systems are highly suitable for power usage data transmission in a smart grid. A smart meter belonging to the IBC system employs the SC algorithm to obtain a ciphertext and transmits it to a utility belonging to the PKI system. Notice that we use the IBC technique in smart meters, which have no certificate management problem; thus, the computational burden of the smart meters is decreased. We employ the PKI technique at the utility, which has no key escrow problem.

In our scheme, every smart meter sends its electronic data to the utility which realize one to one communication. In smart grid, there will be many smart meters to communicate with the utility. Therefore, in order to achieve scalability, we add a data collector in the sender, which collect data from lots of smart meters. The utility does not need to establish a single communication channel to each smart meter. Thus, we can achieve multiple to one communication. To realize efficiency, the limited computation ability of smart meter does not perform many expensive calculation.

Security analysis

In this section, we analyze the confidentiality and unforgeability of our proposed IP-HSC scheme by following Theorem 1 and 2, respectively.

Theorem 1 (Confidentiality) In the random oracle model, if an adversary exists that can break the IND-CCA2 security of our proposed IP-HSC scheme with a nonnegligible advantage ϵ, running in a given time t and making at most qu unsigncryption queries and oracle Hi (i = 1, 2, 3) queries, then there exists a PPT algorithm that settles the CDH problem with an advantage in a given time , where te is the time of a pairing operation.

  1. Proof: It is assumed that we construct an algorithm that employs as a subroutine to settle the random instance (P, aP, bP) of the CDH problem.
  2. Initial: randomly selects a master private key s and calculates a master public key Ppub = sP. also calculates a receiver’s public key yr = aP. Here a simulates the receiver’s private key, and is not aware of the value of a.
  3. Phase 1: acts as the challenger to in the confidentiality game defined in Section 4. Three lists are kept to simulate the hash oracles H1, H2, H3, respectively. Assume that H1 queries are distinct. We also assume that will issue an H1(ID) query before employing ID in any other queries.
    • H1 queries: For an H1 query on the identity IDi, first examines whether H1’s value is already in the list L1. If yes, the existing value is returned; otherwise, selects randomly, set tiP as the value and inserts the tuple (IDi, ti) into the list L1.
    • H2 queries: For an H2 query on (m, U, IDs, yr), first determines whether H2’s value is already in the list L2. If so, the existing value is returned; otherwise, picks a random value , sets eiP as the answer and inserts the tuple (m, U, IDs, yr, eiP) into the list L2.
    • H3 queries: For an H3 query on (U, yr, T), performs the following steps.
      1. If e(aP, bP) = e(T, P), outputs T and stops. On this occasion, has settled the given CDH problem.
      2. If a tuple of the form (U, yr, *, h3,i) exists in list L3 such that e(U, yr) = e(T, P), outputs h3,i and regenerates the symbol * with T.
      3. If reaches the execution point, it selects h3,i ∈ {0, 1}n randomly and gives it to . Then, saves the query and inserts the response into the list L3.
  4. Unsigncryption queries: selects a sender’s identity IDs and a ciphertext σ = (U, W). performs the following steps.
    1. searches for a tuple of the form (U, yr, T) for different T values, such that e(U, yr) = e(T, P). If such an entry exists, h3,i’s correct value can be obtained, and employs this value h3,i to decrypt the ciphertext (i.e., m = Wh3). If no such entry exists in L3, randomly selects h3,i ∈ {0, 1}n and adds the tuple (U, yr, *, h3,i) to the list L3. Then, decrypts the ciphertext using the random value h3,i.
    2. asks an H2 query and obtains h2,i = H2(m, U, IDs, yr). Then, it checks whether . When the conditions hold, message m is returned to . Otherwise, rejects the ciphertext.
  5. Challenge: produces two equal length plaintexts (m0andm1) and a challenge identity of a sender. In response, first sets U* = bP and selects W* from {0, 1}n. Then, transfers the ciphertext σ* = (U*, W*) to .
  6. Phase 2: adaptively performs an unsigncryption query again as in Phase 1. There is a restriction that cannot issue an unsigncryption query on () to obtain the corresponding plaintext. replies to ’s queries following the same approach as in Phase 1.
  7. Guess: generates a bit β′ that is neglected by .

The simulation is perfect except that requests an H3 query on the entry (u*, yr, aT*). If no such entry exists in the list L3, has no advantage. Nevertheless, if that happens, because of the first step in H3’s simulation, will solve the CDH problem. Throughout this entire simulation, the failure probability for unsigncryption queries is at most qu/2k.

Theorem 2 (Unforgeability) Under the random oracle model, if an adversary exists that can break the EUF-CMA security of our proposed IP-HSC scheme, running in a given time t and making at most qk key extraction queries, qs signcryption queries, and oracle Hi (i = 1, 2, 3) queries with a nonnegligible advantage ϵ, then there exists an algorithm that settles the CDH problem with an advantage in a time of O(t).

  1. Proof: Assume that we construct an algorithm that employs as a subroutine to solve the random instance (P, aP, bP) of the CDH problem.
  2. Initial: randomly selects a receiver’s secret key xr from and calculates the corresponding public key yr = xrP. Then, sends the receiver’s key pair (xr, yr) and the system parameters params with Ppub = aP to . Notice that is not aware of the a value that simulates the PKG’s master private key.
  3. Attack: acts as the challenger to in the unforgeability game defined in Section 4. Three lists are kept to simulate the hash oracles H1, H2, andH3. It is assumed that H1 queries are distinct. We also assume that will re-query H1(ID) before utilizing ID in any other queries.
    • H1 queries: performs H1 queries on identity IDi, as in the proof technique by Coron [36]. spins a coin T ∈ {0, 1} that takes a value of 0 with the probability of ξ and a value of 1 with the probability 1 − ξ. If T = 0, then picks ni from and defines H1(IDi) = niP. If T = 1, then outputs H1(IDi) = nibP. In these two cases, adds a triple (IDi, ni, T) to the list L1.
    • H2 queries: For an H2(m, U, IDs, yr) query, first examines whether the H2 value is already in list L2 for the entry (m, U, IDs, yr). If so, it outputs the existing value; otherwise, outputs h2,i from G1 as the answer. Then, inserts the tuple (m, U, IDs, yr, h2,i) into list L2.
    • H3 queries: For an H3(U, yr, T) query, first determines whether the H3 value is already in list L3 for the entry (U, yr, T). If so, it returns the existing value; otherwise, outputs a random value h3,i from {0, 1}n as the answer. Then, inserts the tuple (U, yr, T, h3,i) into the list L3.
    • Key extraction queries: When performs a key extraction query on an identity IDi, obtains the corresponding triple (IDi, ni, T) from list L1. When T = 1, fails and stops because it cannot compute the private key. Otherwise, outputs the private key niaP.
    • Signcryption queries: selects a message m and a sender’s identity IDs. In response, performs the following steps.
      1. Select randomly and compute U = tPpub, V = rPpub.
      2. Set and add the tuple (m, U, IDs, yr) to the list L2.
      3. Define h3 = H3(U, yr, T) and insert the tuple (U, yr, T) into the list L3.
      4. Compute W = mh3.
      5. Return the ciphertext σ = (U, W).

Eventually, outputs a challenge ciphertext σ* = (U*, W*) and a challenge identity of a sender. Then, retrieves the tuple from the list L1. If T* = 0, fails and stops. Otherwise, it continues and list L2 must contain an item with an overwhelming probability. Because was defined as , if succeeds in the game, realizes that with , for . Then, is aware of that and that is the solution of the CDH problem.

Now we evaluate the ρ value. ’s successful probability in all key extraction queries is at most . During the forgery phase, the probability that has not asked a key extraction query for an identity is 1 − ρ. In addition, ’s probability of success for all key extraction queries is . The value is maximized at ρ′ = qk/(qk + 1). Utilizing this value, ρ′, we obtain

Additionally, utilizing the result limλ→0(1 + λ)1/λ = e, we have for large qk values. Hence, the probability that will succeeds in key extraction queries is at most , while the probability of failing at all signcryption queries is is because a conflict exists on H2. Therefore, we obtain

Performance evaluation

Table 2 shows the performance of the proposed scheme, which is evaluated based on comparing the major computational cost, security, and communication overhead of our scheme with those of existing schemes SL-II [17], HWY-I [18], HWY-II [18] and LX-II [19], which are representative HSC schemes. In these four schemes, the senders work in the IBC setting and the receivers work in the PKI setting. They are denoted by PM, E, PC, the point multiplication in G1, the exponentiation, and the pairing operation in G2. Since hash function operation and XOR operations are much cheaper than PM or PC, we ignore those two operations. We assume that the sender in an IBC system has limited computation and storage capability but that the receiver in the PKI system has sufficient computation and storage resources. Therefore, we compare only the computational cost for signcryption. From Table 2, we can see that the computational cost of signcryption in these five schemes is considerable. In the “security” column, CCA2, CMA, and IS, denote IND-CCA2, EUF-CMA, and insider security, respectively. we can see that SL-II [17] does not meet CMA and IS security requirements. HWY-I [18], HWY-II [18], LX [19] and our scheme meet the requirements of insider security. In the “Communication overhead” column, our scheme is the shortest at 432 bits.

Here we give a quantitative analysis for SL-II [17], HWY-I [18], HWY-II [18], LX-II [19] and our scheme. We also only consider the smart meter part which has limited capacity. The experiment in [37] is adopted on MICA2 which is equipped with an ATmega128 8-bit processor clocked at 7.3728 MHz, 4 KB RAM and 128 KB ROM. According to [37], a PC needs 1.9s and an E needs 0.9s utilizing the supersingular curve y2 + y = x3 + x with an embedding degree 4 and implementing ηT pairing: E(F2271) × E(F2271)→F24⋅271 at an 80-bit security level. From [38], a PM operation in the extension field F24⋅271 takes about 0.81s. As in [37, 38], we can see that the computational time on the meter of SL-II [17], HWY-I [18], HWY-II [18], LX-II [19] and our scheme are 1 * 1.9 = 1.9s, 3 * 0.81 = 2.43s, 2 * 0.81 = 1.62s, 2 * 0.81 + 1 * 0.9 = 2.52s and 3 * 0.81 = 2.43s, respectively. Fig 1 shows the relationship between the computational cost of smart meters and the related protocols. From Fig 1, we can see that the computational cost of our scheme is not the least, which is lower than LX-II [19], but higher than SL-II [17] and HWY-II [18].

thumbnail
Fig 1. The computational cost of smart meters versus related protocols.

https://doi.org/10.1371/journal.pone.0208311.g001

According to [37, 39], let us suppose that the current draw in active mode is 8.0mA, the current draw in receiving mode is 10mA, the current draw in transmitting mode is 27mA, the power level of MICA2 is 3.0V, and the data rate is 12.4kbps. For energy consumption, as in [40, 41], a PC operation consumers 3.0 * 8.0 * 1.9 = 45.6mJ, an E operation in G2 consumers 3.0 * 8.0 * 0.9 = 21.6mJ and a PM consumers 3.0 * 8.0 * 0.81 = 19.44mJ. Hence, the computational energy cost on the meter of SL-II [17], HWY-I [18], HWY-II [18], LX-II [19] and our scheme are 1.9 * 45.6 = 86.64mJ, 3 * 0.81 * 19.44 = 47.24mJ, 2 * 0.81 * 19.44 = 31.49mJ, 2 * 0.81 * 21.16 + 0.9 * 19.44 = 51.78mJ and 3 * 0.81 * 19.44 = 47.24mJ, respectively.

For the communication cost, let us suppose that |ID| = 80bits as well as |m| = 160bits. Because we employ a subgroup G1 of the 252-bit prime order, which is based on the supersingular curve y2 + y = x3 + x over F2271, an element’s size in group G1 is 542bits and can be reduced to 272bits (34 bytes) by means of standard compression technique [37] and an element’s size in group G2 is 1084bits. Therefore, the meter in SL-II [17], HWY-I [18], HWY-II [18], LX-II [19] and the proposed scheme needs to transmit 560bits = 70bytes, 1328bits = 166bytes, 1328bits = 166bytes, 704bits = 88bytes and 432bits = 54bytes messages. From [37], we can see that the meter consumers 3 * 27 * 8/12400 = 0.052mJ to transmit one byte messages. Hence, the communication energy consumption of the meter in SL-II [17], HWY-I [18], HWY-II [18], LX-II [19] and our scheme are 0.025 * 70 = 1.75mJ, 0.025 * 166 = 4.15mJ, 0.025 * 166 = 4.15mJ, 0.025 * 88 = 2.2mJ, 0.025 * 54 = 1.35mJ. Therefore, the total energy consumption of SL-II [17], HWY-I [18], HWY-II [18], LX-II [19] and our scheme are 86.84 + 1.75 = 88.39mJ, 47.24 + 4.15 = 51.39mJ, 31.49 + 4.15 = 35.64mJ, 51.78 + 2.2 = 53.98mJ and 47.24 + 1.35 = 48.59mJ.

The communication energy consumption at the meter is summarized in Fig 2, from which we can see that the proposed scheme requires the least energy consumption for communication among the five tested schemes. We can also see that the proposed scheme needs only 1.35mJ to transmit a message. This energy cost is highly suitable for practical use in a smart grid.

thumbnail
Fig 2. The communication energy consumption versus transmit a message.

https://doi.org/10.1371/journal.pone.0208311.g002

Conclusion

In this paper, we proposed an efficient HSC scheme for secure smart grid communications that allows a sender to belong to an IBC environment but to transmit a message to a receiver belonging to a PKI environment. The proposed scheme is proved to have IND-CCA2 as well as EUF-CMA properties under the CDH problem in the random oracle model, and it achieves confidentiality, integrity, authentication and non-repudiation simultaneously in a single logical step. Compared with existing HSC schemes that support a sender working in an IBC setting and a receiver working in a PKI setting, our scheme greatly enhances the communication efficiency, which meets the demand for real-time power usage data transmission in smart grid communications. A performance analysis is provided to demonstrate the efficiency improvement.

Supporting information

S1 Fig. The computational cost of smart meters versus related protocols.

https://doi.org/10.1371/journal.pone.0208311.s001

(PDF)

S2 Fig. The communication energy consumption versus transmit a message.

https://doi.org/10.1371/journal.pone.0208311.s002

(PDF)

S1 File. The minimal underlying data set.

https://doi.org/10.1371/journal.pone.0208311.s003

(DOCX)

Acknowledgments

The authors thank the anonymous reviewers and the Editor for the constructive comments and generous feedback.

References

  1. 1. Ren K, Li Z, Qiu R. Guest editorial cyber, physical, and system security for smart grid. IEEE Transactions on Smart Grid. 2011; 2(4): 643–644.
  2. 2. Su W, Eichi H, Zeng W, Chow MY. A survey on the electrification of transportation in a smart grid environment. IEEE Transactions on Industrial Informatics. 2012; 8(1): 1–10
  3. 3. Liang H, Choi BJ, Zhuang W, Shen X. Towards optimal energy store-carry-and-deliver for PHEVs via V2G system. Proc. INFOCOM: 2012; 1674–1682.
  4. 4. Mets K, Ojea JA, Develder C. Combining power and communication network simulation for cost-effective smart grid analysis. IEEE Communications Surveys & Tutorials. 2014; 16(3): 1771–1796
  5. 5. Erol-Kantarci M, Mouftah HT. Energy-efficient information and communication infrastructures in the smart grid: A survey on interactions and open issues. IEEE Transactions on Industrial Informatics. 2012; 8(1): 1–10
  6. 6. Li F, Luo B, Liu P. Secure information aggregation for smart grids using homomorphic encryption. Proc. Smart Grid Communications (SmartGridComm). 2010; 327–332
  7. 7. Lu R, Liang X, Li X, Lin X, Shen X. Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems. 2012; 23(9): 1621–1631
  8. 8. Komninos N, Philippou E, Pitsillides A. Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Communications Surveys & Tutorials. 2014; 16(4): 1933–1954
  9. 9. Liu T, Liu Y, Mao Y, Sun Y, Guan X, Gong W, Xiao S. A dynamic secret-based encryption scheme for smart grid wireless communication. IEEE Transactions on Smart Grid. 2014; 5(3): 1175–1182
  10. 10. Hu B, Gharavi H. Smart grid mesh network security using dynamic key distribution with merkle tree 4-way handshaking. IEEE Transactions on Smart Grid. 2014; 5(2): 550–558
  11. 11. Chim TW, Yiu SM, Li VO, Hui LC, Zhong J. PRGA: Privacy-preserving recording & gateway-assisted authentication of power usage information for smart grid. IEEE Transactions on Dependable and Secure Computing. 2015; 12(1): 85–97
  12. 12. Diao F, Zhang F, Cheng X. A privacy-preserving smart metering scheme using linkable anonymous credential. IEEE Transactions on Smart Grid. 2015; 6(1): 461–467
  13. 13. He D, Kumar N, Lee JH. Privacy-preserving data aggregation scheme against internal attackers in smart grids. Wireless Networks. 2016; 22(2): 491–502
  14. 14. Liu Y, Cheng C, Gu T, Jiang T, Li X. A Lightweight Authenticated Communication Scheme for Smart Grid. IEEE Sensors Journal. 2016; 16(3): 836–842
  15. 15. Saxena N, Choi BJ, Lu R. Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid. IEEE Transactions on Information Forensics and Security. 2015; 11(5): 907–921
  16. 16. Li CK, Yang G, Wong DS, Deng X, Chow SS. An efficient signcryption scheme with key privacy and its extension to ring signcryption. Journal of Computer Security. 2010; 18(3): 451–473
  17. 17. Sun Y, Li H. Heterogeneous signcryption with key privacy. The Computer Journal. 2010; 53(3): 557–566
  18. 18. Huang Q, Wong DS, Yang G. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. Science China Information Sciences. 2011; 54(4): 525–536
  19. 19. Li F, Xiong P. Practical secure communication for integrating wireless sensor networks into the internet of things. IEEE Sensors Journal. 2013; 13(10): 3677–3684
  20. 20. Zheng Y. Digital signcryption or how to achieve cost (signature & encryption)+ cost (signature)+ cost (encryption). Proc. Annual International Cryptology Conference. 1997; 165–179
  21. 21. Bao F, Deng RH. Asigncryption scheme with signature directly verifiable by public key. Proc. Public Key Cryptography. 1998; 55–59
  22. 22. Gamage C, Leiwo J, Zheng Y. Encrypted message authentication by firewalls. Proc. Public Key Cryptography. 1999; 69–81
  23. 23. Malone-Lee J, Mao W. Two birds one stone: signcryption using RSA. Proc. RSA Conference. 2003; 211–226
  24. 24. Boyen X. Multipurpose identity-based signcryption. Proc. Annual International Cryptology Conference. 2003; 383–399
  25. 25. Barreto PS, Libert B, McCullagh N, Quisquater JJ. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. Proc. the Theory and Application of Cryptology and Information Security. 2005; 515–532
  26. 26. Chen L, Malone-Lee J. Improved identity-based signcryption. Proc. Public Key Cryptography. 2005; 362–379
  27. 27. So HKH, Kwok SH, Lam EY, Lui KS. Zero-configuration identity-based signcryption scheme for smart grid. Proc. Smart Grid Communications (SmartGridComm). 2010; 321–326
  28. 28. Jo HJ, Paik JH, Lee DH. Efficient privacy-preserving authentication in wireless mobile networks. IEEE Transactions on Mobile Computing. 2014; 13(7): 1469–1481
  29. 29. An JH, Dodis Y, Rabin T. On the security of joint signature and encryption. Proc. the Theory and Applications of Cryptographic Techniques. 2002; 83–107
  30. 30. Li F, Zhang H, Takagi T. Efficient signcryption for heterogeneous systems. IEEE Systems Journal. 2013; 7(3): 420–429
  31. 31. Li F, Zheng Z, Jin C. Secure and efficient data transmission in the Internet of Things. Telecommunication Systems. 2016; 62(1): 111–122
  32. 32. Li F, Han Y, Jin C. Practical Signcryption for Secure Communication of Wireless Sensor Networks. Wireless Personal Communications. 2016; 1–22
  33. 33. Boneh D, Franklin M. Identity-based encryption from the Weil pairing. Proc. Annual International Cryptology Conference. 2003; 213–229
  34. 34. Libert B, Quisquater JJ. New identity based signcryption schemes from pairings. IACR Cryptology ePrint Archive. 2003, 23
  35. 35. Chow SS, Yiu SM, Hui LC, Chow KP. Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. Proc. Information Security and Cryptology. 2003, 352–369
  36. 36. Coron JS. On the exact security of full domain hash. Proc. Annual International Cryptology Conference. 2000, 229–235
  37. 37. Shim KA, Lee YR, Park CM. EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Networks. 2000; 11(1): 182–189
  38. 38. Gura N, Patel A, Wander A, Eberle H, Shantz SC. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. Proc. Cryptographic Hardware and Embedded Systems. 2004; 119–132
  39. 39. Cao X, Kou W, Dang L, Zhao B. IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks. Computer communications. 2008; 31(4): 659–667
  40. 40. Ma C, Xue K, Hong P. Distributed access control with adaptive privacy preserving property for wireless sensor networks. Security and Communication Networks. 2014; 7(4): 759–773
  41. 41. Shim KA. S2DRP: secure implementations of distributed reprogramming protocol for wireless sensor networks. Ad Hoc Networks. 2014; 19: 1–8