{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:34:22Z","timestamp":1762508062002,"version":"build-2065373602"},"reference-count":25,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2020,3,12]],"date-time":"2020-03-12T00:00:00Z","timestamp":1583971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing from the smart grid devices to the utility servers, which may result in energy disruption or imbalance. Thus, an authentication is mandatory to efficiently authenticate the devices and the utility servers and avoid tampering attacks. To this end, a group authentication algorithm is proposed for preserving demand\u2013response security in a smart grid. The proposed mechanism also provides a fine-grained access control feature where the utility server can only access a limited number of smart grid devices. The initial authentication between the utility server and smart grid device in a group involves a single public key operation, while the subsequent authentications with the same device or other devices in the same group do not need a public key operation. This reduces the overall computation and communication overheads and takes less time to successfully establish a secret session key, which is used to exchange sensitive information over an unsecured wireless channel. The resilience of the proposed algorithm is tested against various attacks using formal and informal security analysis.<\/jats:p>","DOI":"10.3390\/s20061581","type":"journal-article","created":{"date-parts":[[2020,3,12]],"date-time":"2020-03-12T12:22:51Z","timestamp":1584015771000},"page":"1581","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Multi-User, Single-Authentication Protocol for Smart Grid Architectures"],"prefix":"10.3390","volume":"20","author":[{"given":"Ahmed S.","family":"Alfakeeh","sequence":"first","affiliation":[{"name":"Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6264-996X","authenticated-orcid":false,"given":"Sarmadullah","family":"Khan","sequence":"additional","affiliation":[{"name":"School of Computer Science and Informatics, De Montfort University, Leicester LE1 9BH, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8062-1258","authenticated-orcid":false,"given":"Ali Hilal","family":"Al-Bayatti","sequence":"additional","affiliation":[{"name":"School of Computer Science and Informatics, De Montfort University, Leicester LE1 9BH, UK"}]}],"member":"1968","published-online":{"date-parts":[[2020,3,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1016\/j.rser.2015.10.036","article-title":"A survey on the critical issues in smart grid technologies","volume":"54","author":"Colak","year":"2016","journal-title":"Renew. Sustain. Energy Rev."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1109\/TII.2011.2166794","article-title":"Smart Grid Technologies: Communication Technologies and Standards","volume":"7","author":"Gungor","year":"2011","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TII.2015.2414355","article-title":"Smart Electricity Meter Data Intelligence for Future Energy Systems: A Survey","volume":"12","author":"Alahakoon","year":"2016","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1109\/TII.2013.2277938","article-title":"Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid","volume":"10","author":"Fan","year":"2014","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1109\/TSG.2011.2160661","article-title":"A Lightweight Message Authentication Scheme for Smart Grid Communications","volume":"2","author":"Fouda","year":"2011","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1109\/TSG.2011.2120634","article-title":"Fault-Tolerant and Scalable Key Management for Smart Grid","volume":"2","author":"Wu","year":"2011","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1437","DOI":"10.1109\/TSG.2012.2199141","article-title":"Secure Key Distribution for the Smart Grid","volume":"3","author":"Xia","year":"2012","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1613","DOI":"10.1109\/TSG.2013.2258823","article-title":"Security Weakness in the Smart Grid Key Distribution Scheme Proposed by Xia and Wang","volume":"4","author":"Park","year":"2013","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_9","first-page":"906","article-title":"Secure Anonymous Key Distribution Scheme for Smart Grid","volume":"7","author":"Tsai","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_10","first-page":"1900","article-title":"Provably Secure Authenticated Key Agreement Scheme for Smart Grid","volume":"9","author":"Odelu","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1795","DOI":"10.1049\/iet-com.2016.0091","article-title":"Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography","volume":"10","author":"He","year":"2016","journal-title":"IET Commun."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2834","DOI":"10.1109\/TSG.2016.2620939","article-title":"A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid","volume":"9","author":"Mohammadali","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"doi-asserted-by":"crossref","unstructured":"Doh, I., Lim, J., and Chae, K. (2015, January 8\u201310). Secure Authentication for Structured Smart Grid System. Proceedings of the 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Santa Cantarina, Brazil.","key":"ref_13","DOI":"10.1109\/IMIS.2015.32"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"907","DOI":"10.1109\/TIFS.2015.2512525","article-title":"Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid","volume":"11","author":"Saxena","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1109\/SURV.2012.010912.00035","article-title":"A Survey on Cyber Security for Smart Grid Communications","volume":"14","author":"Yan","year":"2012","journal-title":"IEEE Commun. Surv. Tutor."},{"unstructured":"Tsang, P.P., and Smith, S.W. (2008, January 7\u201310). YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems. Proceedings of the Ifip Tc 11 23rd International Information Security Conference, Milano, Italy.","key":"ref_16"},{"unstructured":"Perrig, A., Canetti, R., Tygar, J.D., and Song, D. (2000, January 14\u201317). Efficient authentication and signing of multicast streams over lossy channels. In Proceeding of the 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, USA.","key":"ref_17"},{"doi-asserted-by":"crossref","unstructured":"Cairns, K., Hauser, C., and Gamage, T. (2013, January 21\u201324). Flexible data authentication evaluated for the smart grid. Proceedings of the 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm), Vancouver, BC, Canada.","key":"ref_18","DOI":"10.1109\/SmartGridComm.2013.6688006"},{"doi-asserted-by":"crossref","unstructured":"Dolev, D., and Yao, A.C. (1981, January 28\u201330). On the security of public key protocols. Proceedings of the 22nd Annual Symposium on Foundations of Computer Science, Nashville, TN, USA.","key":"ref_19","DOI":"10.1109\/SFCS.1981.32"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","article-title":"Automated Security Protocol Analysis With the AVISPA Tool","volume":"155","year":"2006","journal-title":"Electron. Notes Theor. Comput. Sci."},{"unstructured":"Automated Validation of Internet Security Protocols and Applications (AVISPA) (2019, September 26). Artificial Intelligence Laboratory, DIST, University of Genova: Genoa, Italy. Available online: http:\/\/www.avispa-project.org\/.","key":"ref_21"},{"doi-asserted-by":"crossref","unstructured":"Grainger, B.M., Reed, G.F., McDermott, T.E., Mao, Z.H., Kounev, V., and Tipper, D. (2014, January 14\u201317). Analysis of an offshore medium voltage DC microgrid environment Part I: Power sharing controller design. Proceedings of the 2014 IEEE PES T D Conference and Exposition, Chicago, IL, USA.","key":"ref_22","DOI":"10.1109\/TDC.2014.6863405"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/129902.129905","article-title":"Responses to NIST\u2019s Proposal","volume":"35","author":"Rivest","year":"1992","journal-title":"Commun. ACM"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2484","DOI":"10.1109\/TSG.2015.2424160","article-title":"A Secure Communication Architecture for Distributed Microgrid Control","volume":"6","author":"Kounev","year":"2015","journal-title":"IEEE Trans. Smart Grid"},{"doi-asserted-by":"crossref","unstructured":"Khan, S., and Khan, R. (2018). Elgamal Elliptic Curve Based Secure Communication Architecture for Microgrids. Energies, 11.","key":"ref_25","DOI":"10.3390\/en11040759"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/6\/1581\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:06:18Z","timestamp":1760173578000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/6\/1581"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,12]]},"references-count":25,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2020,3]]}},"alternative-id":["s20061581"],"URL":"https:\/\/doi.org\/10.3390\/s20061581","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,3,12]]}}}