{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T11:30:35Z","timestamp":1775129435719,"version":"3.50.1"},"reference-count":35,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T00:00:00Z","timestamp":1676764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Deanship of Scientific Research at King Khalid University","award":["RGP.2\/201\/43"],"award-info":[{"award-number":["RGP.2\/201\/43"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Smart grid (SG) recently acquired considerable attention due to their utilization in sustaining demand response management in power systems. Smart meters (SMs) deployed in SG systems collect and transmit data to the server. Since all communications between SM and the server occur through a public communication channel, the transmitted data are exposed to adversary attacks. Therefore, security and privacy are essential requirements in the SG system for ensuring reliable communication. Additionally, an AuthentiCation (AC) protocol designed for secure communication should be lightweight so it can be applied in a resource-constrained environment. In this article, we devise a lightweight AC protocol for SG named LACP-SG. LACP-SG employs the hash function, \u201cEsch256\u201d, and \u201cauthenticated encryption\u201d to accomplish the AC phase. The proposed LACP-SG assures secure data exchange between SM and server by validating the authenticity of SM. For encrypted communication, LACP-SG enables SM and the server to establish a session key (SEK). We use the random oracle model to substantiate the security of the established SEK. Moreover, we ascertain that LACP-SG is guarded against different security vulnerabilities through Scyther-based security validation and informal security analysis. Furthermore, comparing LACP-SG with other related AC protocols demonstrates that LACP-SG is less resource-intensive while rendering better security characteristics.<\/jats:p>","DOI":"10.3390\/s23042309","type":"journal-article","created":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T02:29:08Z","timestamp":1676860148000},"page":"2309","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["LACP-SG: Lightweight Authentication Protocol for Smart Grids"],"prefix":"10.3390","volume":"23","author":[{"given":"Muhammad","family":"Tanveer","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Management and Technology, Lahore 54770, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6482-3968","authenticated-orcid":false,"given":"Hisham","family":"Alasmary","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computer Science, King Khalid University, Abha 61421, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2023,2,19]]},"reference":[{"key":"ref_1","first-page":"549","article-title":"A Lightweight Authenticated Key Establishment Scheme for Secure Smart Grid Communications","volume":"10","author":"Salem","year":"2020","journal-title":"Int. J. Saf. Secur. Eng."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2886","DOI":"10.1109\/COMST.2019.2899354","article-title":"Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues","volume":"21","author":"Kumar","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"22633","DOI":"10.1109\/ACCESS.2019.2898376","article-title":"A bilinear map pairing based authentication scheme for smart grid communications: Pauth","volume":"7","author":"Chen","year":"2019","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1016\/j.jpdc.2017.11.008","article-title":"A provably secure and anonymous message authentication scheme for smart grids","volume":"132","author":"Li","year":"2019","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"177447","DOI":"10.1109\/ACCESS.2020.3026923","article-title":"A Survey of Denial-of-Service Attacks and Solutions in the Smart Grid","volume":"8","author":"Bicakci","year":"2020","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"3953","DOI":"10.1109\/TSG.2018.2844403","article-title":"Privacy-aware authenticated key agreement scheme for secure smart grid communication","volume":"10","author":"Gope","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_7","first-page":"103336","article-title":"A new anonymous authentication framework for secure smart grids applications","volume":"71","author":"Tanveer","year":"2022","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2578","DOI":"10.1109\/JIOT.2021.3085595","article-title":"LAKE-6SH: Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes","volume":"9","author":"Tanveer","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"143366","DOI":"10.1109\/ACCESS.2021.3121291","article-title":"ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids","volume":"9","author":"Tanveer","year":"2021","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"6855","DOI":"10.1109\/JIOT.2021.3113469","article-title":"A Robust Access Control Protocol for the Smart Grid Systems","volume":"9","author":"Tanveer","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"6572","DOI":"10.1109\/TII.2019.2922697","article-title":"ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System","volume":"15","author":"Kumar","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"4535","DOI":"10.1109\/JSYST.2019.2963235","article-title":"A lightweight mutual authentication for smart grid neighborhood area network communications based on physically unclonable function","volume":"14","author":"Kaveh","year":"2020","journal-title":"IEEE Syst. J."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2370","DOI":"10.1109\/TPWRD.2011.2158671","article-title":"A secure smart-metering protocol over power-line communication","volume":"26","author":"Kim","year":"2011","journal-title":"IEEE Trans. Power Deliv."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.future.2018.02.034","article-title":"Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications","volume":"84","author":"Nikooghadam","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/s10916-018-1120-5","article-title":"A robust and efficient ECC-based mutual authentication and session key generation scheme for healthcare applications","volume":"43","author":"Nikooghadam","year":"2019","journal-title":"J. Med. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"5000","DOI":"10.1109\/TII.2021.3119685","article-title":"A Privacy Enhanced Authentication Scheme for Securing Smart Grid Infrastructure","volume":"18","author":"Chaudhry","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1389","DOI":"10.1007\/s11276-020-02523-9","article-title":"LAPTAS: Lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT","volume":"27","author":"Far","year":"2021","journal-title":"Wirel. Netw."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Tanveer, M., Abbas, G., Abbas, Z.H., Waqas, M., Muhammad, F., and Kim, S. (2020). S6AE: Securing 6LoWPAN using authenticated encryption scheme. Sensors, 20.","DOI":"10.3390\/s20092707"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1109\/TSG.2011.2120634","article-title":"Fault-tolerant and scalable key management for smart grid","volume":"2","author":"Wu","year":"2011","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1016\/j.future.2017.05.002","article-title":"An elliptic curve cryptography based lightweight authentication scheme for smart grid communication","volume":"81","author":"Mahmood","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"7996","DOI":"10.1109\/TIE.2018.2807383","article-title":"An anonymous ECC-based self-certified key distribution scheme for the smart grid","volume":"65","author":"Nikooghadam","year":"2018","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Banerjee, S., Odelu, V., Das, A.K., Chattopadhyay, S., and Park, Y. (2020). An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments. Sensors, 20.","DOI":"10.3390\/s20041215"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"7174","DOI":"10.1109\/TII.2020.3020303","article-title":"Designing Authenticated Key Management Scheme in 6G-enabled Network in a Box Deployed for Industrial Applications","volume":"17","author":"Wazid","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_24","first-page":"1900","article-title":"Provably secure authenticated key agreement scheme for smart grid","volume":"9","author":"Odelu","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Xie, S., Zhang, F., Lin, H., and Tian, Y. (2019). A New Secure and Anonymous Metering Scheme for Smart Grid Communications. Energies, 12.","DOI":"10.3390\/en12244751"},{"key":"ref_26","first-page":"6194","article-title":"An ultra-lightweight and secure scheme for communications of smart meters and neighborhood gateways by utilization of an ARM Cortex-M microcontroller","volume":"9","author":"Nikooghadam","year":"2017","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_27","unstructured":"Gueron, S., Jha, A., and Nandi, M. (2023, February 16). COMET: COunter Mode Encryption with authentication Tag. Second Round Candidate of the NIST LWC Competition, 2019, Available online: https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Lightweight-Cryptography\/documents\/round-1\/spec-doc\/comet-spec.pdf."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1109\/JSYST.2013.2260942","article-title":"Efficient authentication and key management mechanisms for smart grid communications","volume":"8","author":"Nicanfar","year":"2013","journal-title":"IEEE Syst. J."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"5744","DOI":"10.1109\/JIOT.2020.3030308","article-title":"Designing Blockchain-Based Access Control Protocol in IoT-Enabled Smart-Grid System","volume":"8","author":"Bera","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"101235","DOI":"10.1109\/ACCESS.2020.2996093","article-title":"Securing demand response management: A certificate-based access control in smart grid edge computing infrastructure","volume":"8","author":"Chaudhry","year":"2020","journal-title":"IEEE Access"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Tanveer, M., Ahmad, M., Nguyen, T.N., and Abd El-Latif, A.A. (2022). Resource-Efficient Authenticated Data Sharing Mechanism for Smart Wearable Systems. IEEE Trans. Netw. Sci. Eng.","DOI":"10.1109\/TNSE.2022.3203927"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"4425","DOI":"10.1109\/TII.2020.3011849","article-title":"Designing anonymous signature-based authenticated key exchange scheme for Internet of Things-enabled smart grid systems","volume":"17","author":"Srinivas","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_33","first-page":"101571","article-title":"A secure demand response management authentication scheme for smart grid","volume":"48","author":"Irshad","year":"2021","journal-title":"Sustain. Energy Technol. Assess."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.comcom.2020.12.005","article-title":"Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment","volume":"166","author":"Bera","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"107999","DOI":"10.1016\/j.comnet.2021.107999","article-title":"GCACS-IoD: A certificate based generic access control scheme for Internet of Drones","volume":"191","author":"Chaudhry","year":"2021","journal-title":"Comput. Netw."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/4\/2309\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:36:22Z","timestamp":1760121382000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/4\/2309"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,19]]},"references-count":35,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2023,2]]}},"alternative-id":["s23042309"],"URL":"https:\/\/doi.org\/10.3390\/s23042309","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,19]]}}}