Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Security Analysis of Two Recent Pairing-Free Certificateless Two-Party Authenticated Key Agreement Protocols for Smart Grid release_l4dhsjhuhndshpkdmwctjhgq3y

by Yong-Jin Kim, Dok-Jun An, Kum-Sok Sin, You-Jin Jong, Ok-Chol Ri

Released as a article .

2022  

Abstract

Smart grids are intelligent power transmission networks that monitor and control communication participants and grid nodes to ensure bidirectional flow of information and power between all nodes. To secure the smart grid, it is very important to design the key agreement protocol. The pairing-free certificateless two-party authenticated key agreement protocol has been widely studied and applied as a basic core protocol to protect the security of the smart grid. Until now, various protocols have been proposed, and these protocols are being introduced and operated not only in smart grid, but also in smart cities, healthcare, and vehicle ad hoc networks. In this paper, we analyzed the security properties of two recently proposed pairing-free certificateless two-party authenticated key agreement protocols for Smart grid. According to our analysis, these two protocols are insecure against basic impersonation attacks of malicious key-generator centers, man-in-the-middle attacks of malicious key generator centers, and key offset attacks. We also found and pointed out some errors in the descriptions of these protocols.
In text/plain format

Archived Content

There are no accessible files associated with this release. You could check other releases for this work for an accessible version.

"Dark" Preservation Only
Save Paper Now!

Know of a fulltext copy of on the public web? Submit a URL and we will archive it

Type  article
Stage   submitted
Date   2022-03-03
Version   v1
Language   en ?
arXiv  2203.01504v1
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: 165ff5f6-c5fa-42ef-a2e4-175387ecb1ad
API URL: JSON