Abstract
With the rapid development of the information age, smart meters play an important role in the smart grid. However, there are more and more attacks on smart meters, which mainly focus on the identity authentication of smart meters and the security protection of electricity consumption data. In this paper, an efficient lightweight smart meter authentication scheme is proposed based on the Chinese Remainder Theorem (CRT), which can realize the revocation of a single smart meter user by publishing a secret random value bound to the smart meter identity. The proposed scheme not only protects the security of smart meter electricity consumption data by using encryption, but also resists identity attacks from both internal and external adversaries by using hash functions and timestamps. Experiment shows that the proposed scheme has lower computation overhead and communication overhead than other authentication schemes and is more suitable for smart meter authentication.
    MSC:
                94A62
            1. Introduction
With the rapid development of the information age, the smart grid has become more and more popular in our lives. The smart meter has an important application in smart grid. Power companies can plan production and allocation of power resources based on the data of smart meters, which is conducive to the efficient use of power resources and ensures the stable operation of the power grid. In the data transmission process between smart meters and power companies, there are frequent incidents of illegal users impersonating legal identities to steal electricity resources. Therefore, effective identity authentication for both parties is extremely important. Additionally, attackers may exploit users’ personal habits and privacy to attack their electricity data, so the security protection of electricity usage data is also crucial. Current technologies for privacy protection in identity authentication mainly include HMAC [], Zero-Knowledge Proofs [], the Chinese Remainder Theorem (CRT) [], Blind Signatures [], Group Signatures [], and Certificates []. Compared to other technologies, identity authentication schemes based on the CRT are relatively less demanding in terms of computation overhead, transmission consumption, and memory usage, making them more suitable for smart meter identity authentication. Compared to other technologies, identity authentication schemes constructed based on the CRT have relatively small computation overhead and communication overhead, making them more suitable for identity authentication of smart meters.
In 2016, Jiang et al. [] proposed an efficient anonymous batch authentication scheme using HMAC, ensuring the security and confidentiality of Vehicular Ad hoc Networks (VANETs). By using hash functions to check message integrity before batch processing, the scheme efficiently handled invalid request messages, making the batch authentication more effective. In 2019, Amine et al. [] proposed a lightweight HMAC mutual authentication protocol specifically for IoT. Considering the resource constraints of IoT devices, this protocol, employing HMAC functions and XOR operations, ensures secure communication between IoT devices and fog nodes. This lightweight HMAC protocol addresses the challenge of secure communication on resource-limited devices, particularly against common network threats like replay and man-in-the-middle attacks. In 2017, Tian et al. [] proposed a smart meter identity authentication scheme based on the CRT, which has low computational and memory requirements and allows dynamic user management through secret value updates. In 2019, Rasheed et al. [] introduced a new, lightweight, adaptive group-based VANET zero-knowledge proof protocol. Using zero-knowledge proof technology, vehicles can prove their identity to base stations without revealing any sensitive information. In 2021, Dwivedi et al. [] proposed a privacy-preserving identity authentication scheme using non-interactive zero-knowledge proofs, suitable for various IoT-based applications. For enhanced security, a password-authenticated key exchange protocol was used to create each session. Utilizing zero-knowledge proofs in this scheme ensures that if the statement is correct, the verifier cannot learn anything other than that the statement is true.
In 2019, Zhang et al. [] designed a conditionally privacy-preserving authentication based on CRT. This scheme ensured communication security while also reducing the probability of personal information, including real identities, being leaked. Using the CRT significantly lowered the computational complexity for the trusted center. In 2020, Kong et al. [] proposed an efficient and privacy-preserving solution suitable for resource-limited environments, especially in smart grids. Blind signature technology played an important role in this scheme which allows data to be authenticated and signed while maintaining user anonymity, enabling fine-grained analysis of consumption data without revealing user identities. In 2020, Jiang et al. [] proposed a scheme named AAAS for anonymous authentication in VANETs. This scheme aimed to allow vehicles in VANETs to authenticate each other and communicate with roadside infrastructure while protecting the driver’s privacy. The scheme combined alias mechanisms with group signature mechanisms to achieve a distributed solution, where no single authority could directly resolve the real identity of the vehicles. In 2021, Pathak et al. [] proposed an identity verification scheme based on zero-knowledge proofs which can prove ownership of an identity to a verifier without revealing any sensitive information. In 2023, Zhu et al. [] proposed a privacy-preserving data aggregation scheme based on the CRT and homomorphic encryption technology, effectively balancing communication and computation overhead. In this scheme, any entity can verify the integrity of data, effectively preventing data tampering, and abandoned bilinear and point-to-point hash functions, thus enhancing efficiency. In 2023, Sui et al. [] employed blind signatures and anonymous authentication to propose a privacy protection scheme for smart grids. This scheme could not only track electricity thieves but also effectively protect the security of the electricity purchasing process using smart meters. In 2023, Lu et al. [] constructed a new certificateless group signature scheme to achieve the vehicle identity hiding and secure communication between vehicles, thereby protecting the privacy of vehicle information.
In the smart meter authentication scheme proposed by Tian et al. [], because each smart meter user has private , and these smart meter users have the same X, and  are mutual coprime. Thus, when some users (assume ) collude to attack the legal user identity, there is a high probability of guessing . Therefore, they can take on user identity  to forge electricity consumption data. In addition, since the region managers know the user’s authentication information , a dishonest region manager can take on user identity and forge electricity consumption information. Therefore, internal users of scheme [] can carry out a collusion attack on identity, and the dishonest region managers can take on the smart meters identities and tamper with power usage data. An efficient lightweight authentication scheme for a smart meter is proposed in this paper, which has the following specific contributions:
- (1)
- In order to meet lightweight requirements, each smart meter has a hash value and a random number . According to the randomness, unidirectionality, and collision resistance of the hash function, even if multiple smart meter users conspire to know multiple and , they cannot guess the random number or hash values of other smart meters. Therefore, the scheme can resist collision attack by internal users on identity.
- (2)
- Due to the fact that the user’s random number is hidden in the hash function during the electricity consumption data charging phase, RM cannot obtain the corresponding and therefore cannot calculate a valid hash value. Even if RM forges the bill, the OC can verify the authenticity of the electricity consumption data and detect false bills from RM through comparison of hash values. Therefore, the scheme can resist attacks from dishonest region managers who forge electricity consumption data.
- (3)
- Because OC knows the secret random value corresponding to the user, when a smart meter is revoked, OC can disclose its . Thus, during the authentication phase, RM can verify whether the corresponding hash values are equal through . If equal, reject user authentication, achieving authentication revocation for the user. Therefore, the scheme can efficiently achieve authentication revocation for a single user.
- (4)
- Experiment shows that the proposed authentication scheme has lower communication and computation overhead compared to other schemes.
The remainder of this paper is organized as follows: Section 2 introduces preliminaries such as the CRT and elliptic curves. Section 3 describes the system model and threat model. Section 4 details the proposed authentication scheme for smart meter. Section 5 discusses the correctness and security of the scheme. Section 6 presents the performance analysis. Finally, Section 7 concludes the paper.
2. Preliminaries
This section mainly introduces CRT, elliptic curve, and ECDSA signature algorithms. CRT is used to assign shared secret values to smart meters, while elliptic curve and ECDSA signature algorithms are used to protect the security of transmitted data and verify the sender, respectively.
2.1. Chinese Remainder Theorem
If the numbers  are mutual prime, then for any numbers , the system of congruent equations  has exactly one solution , where , ,  are the number-theoretic inverse element such that , .
The method to construct the solution is described as follows: (1) The total modulus M is calculated as the product of all moduli. (2) For each modulus ,  is calculated. (3) The multiplicative inverse  of  is calculated such that . (4) The solution x can be found as a weighted sum  modulo M.
An example to further illustrate this theorem involves solving a system of three equations: . The following steps are performed: (1) Calculate . (2) For each modulus , calculate , that is, , , . (3) Find the multiplicative inverses  of  such that , that is , , . (4) Calculate the solution  to get .
2.2. Elliptic Curves
An elliptic curve over a finite field  of prime order p is the Weierstrass equation , where  and , which ensures the absence of singular points. A group on the elliptic curve E over , denoted as , includes a generator P of the group, the order q of the group, and the infinity point .
The point addition and scalar multiplication operations on elliptic curve are defined as follows:
- (1)
- Point addition: For points , if , then there exists such that . If , then . If , then . Point addition is illustrated in Figure 1.The red solid line represents the elliptical curve, while the black dashed line represents the demonstration of the addition operation on the elliptical curve.
- (2)
- Scalar multiplication: , where .
 
      
    
    Figure 1.
      Addition operation in ECC.
  
Elliptic curve operations have the following properties. For any , there are (1) . (2) . (3) .
2.3. ECDSA Signature Algorithm
The ECDSA (Elliptic Curve Digital Signature Algorithm) [] includes key generation, signing, and verification processes. The steps of the ECDSA signature algorithm are illustrated in Figure 2 and constructed as follows:
 
      
    
    Figure 2.
      Flowchart of the ECDSA signature algorithm.
  
- (1)
- Key generation. Let be a finite field, E be the elliptic curve on . Choose Randomly . Let the order of Gbe prime n. Choose randomly , compute Q such that . Output the public key and private key .
- (2)
- Signature. For the message to be signed, choose randomly , compute , , . If or , select another random number and repeat the above process. Output Signature
- (3)
- Verification. For Signature and message e, compute , , , . If , the signature is valid; Otherwise, the signature is invalid.
3. System Model and Threat Model
The smart meter authentication system includes four parties, as shown in Figure 3.
 
      
    
    Figure 3.
      The smart meter authentication system.
  
- (1)
- Trust Authority (TA). There is only one TA in the system, who is responsible for initializing the system and injecting identity information into OC, RM, and SM.
- (2)
- Operation Center (OC). There is only one OC in the system, which is responsible for billing the electricity consumption data forwarded by RMs and verifying the identity of SMs.
- (3)
- Region Manager (RM). The system includes multiple RMs. The number of RMs is set by OC according to actual needs, for example, it can be divided by region, and each region has an RM. The RM is tasked with verifying the identity authentication of SMs in its region and forwarding their electricity consumption data to the OC.
- (4)
- Region Manager (RM). The system includes multiple SMs, but each RM can manage up to n SMs. SM authenticate their identity with the RM and connect to the power grid.
It should be noted that in large-scale smart grids environments, identity authentication is required for millions of smart meters. Therefore, SMs can be registered according to their respective regions, meaning that the smart meter can communicate with the local RM instead of directly communicating with the OC. The proposed smart meter authentication system is a simplified one with only one layer of the RM. In practical deployment, the RM can be divided into multiple levels, which can reduce the burden of centralized authentication servers and improve the scalability of the system. In addition, the SM’s identity authentication scheme needs to be deployed in actual power infrastructure and integrated with existing power systems. This may involve multiple stakeholders, technical standards, and security requirements, such as encryption algorithm standards, as well as management and maintenance, such as updating, monitoring, and troubleshooting authentication servers and smart meter software.
The threat model for smart meter authentication system is based on the threat model of []. In the smart grid, security issues may arise due to system compromises or vulnerabilities. Threats come from internal SM, dishonest RM, and external attacker. The following are threats related to smart meter authentication scheme.
- (1)
- Passive Attack. Attackers illegally monitor data transmitted on the smart grid, compromising data confidentiality.
- (2)
- Replay attack. The attacker repeatedly sends data that the receiver has already received, in order to deceive the receiver into accepting the message and disrupt the identity authentication.
- (3)
- Collusion Attack. Internal SMs collude to attack the identity of other smart meters and then use that identity to carry out attacks.
- (4)
- Forging Electricity Ledger Attack. The dishonest RM takes on SM identity and forges electricity consumption data for attacks.
- (5)
- Identity Spoofing Attack. Attackers take on an identity that has been successfully authenticated and carry out attacks.
4. The Authentication Scheme for Smart Meter
The authentication scheme is divided into six phases: system initialization, key generation, smart meter registration, smart meter authentication, electricity consumption data charging, and smart meter revocation.
- (1)
- System initialization phase.➀ TA selects an elliptic curve: and an elliptic group , and randomly choose a generator . Suppose the order of G is n. Randomly choose a hash function . Output public parameters .➁ TA chooses randomly mutual prime numbers , a secret value S, and numbers , computes , constructs the system of equations , and uses the CRT to compute the solution X.
- (2)
- Key generation phase.➀ OC randomly selects number as its private key and computes its public key . OC outputs the public key and keeps the private key secret.➁ RM randomly selects number as its private key and calculates its public key . RM outputs the public key and keeps the private key secret.
- (3)
- Smart meter registration phase.When the i-th smart meter is registered with TA, TA loads into if exists in TA’s database. Otherwise, TA randomly selects , loads into the smart meter . Then, TA secretly sends to OC, and finally secretly sends to the corresponding RM.
- (4)
- Smart meter authentication phase.➀ The authentication process to the RM is shown in Figure 4. performs the following operations. Figure 4. Authentication process to the RM. Figure 4. Authentication process to the RM.- Encode the registration information into point , where is the timestamp selected by the .
- Randomly select the number , compute , and send to RM.
 ➁ After receiving , the RM performs the following operations.- Compute by and get by decoding .
- Check if the timestamp is valid, If it is invalid, return , indicating that the authentication of the SM to the RM has failed. If it is valid, compute and .
- Compare whether is equal to the system preset, and whether is equal to . If both are equal, return , indicating that has successfully authenticated to RM. Otherwise, return .
 
- (5)
- Electricity consumption data charging phase.➀ Electricity consumption data charging is shown in Figure 5. The SM performs the following operations. Figure 5. Electricity consumption data charging. Figure 5. Electricity consumption data charging.- summarize the electricity consumption data over a period of time (usually one month) and obtains .
- Choose a timestamp and encode as a point .
- Compute .
- Choose randomly number and compute .
- Send (h,) to the RM.
 ➁ After receiving (h,), RM performs the following operations.- Compute by and get by decoding .
- Check if the timestamp is valid, and exit if it is not. Otherwise, do the following.
- Encode the message as point .
- Randomly choose number and compute .
- Signing using the ECDSA signature algorithm yields .
- Send to the OC.
 ➂ OC performs the following operations.- The OC verifies the validity of the signature , and exits if it is invalid. Otherwise, proceed with the following operations.
- Compute by and get by decoding .
- Check if the timestamp is valid, and exit if it is not. Otherwise, do the following.
- Find the corresponding to in the local database and calculate whether and h are consistent. If they are consistent, it indicates that the Electricity consumption data are valid.
- By using , the real identity of the can be confirmed, thereby completing the electricity consumption data charging.
 
- (6)
- SM revocation phase.When is leaked or logs out of the system, the OC can revoke by broadcasting to the RM. If a revoked user registers with RM, needs to send registration information to the RM. After receiving the registration information, the RM can use the received revocation message from the OC and from to calculate the hash value . If the hash value is equal to the hash value sent by , then the authentication is refused, indicating that the has been revoked.
5. Correctness and Security Analysis
The correctness and security of the proposed scheme are analyzed in this section.
5.1. The Correctness Analysis
The correctness of the scheme includes the correctness of smart meter authentication, electricity consumption data charging, and smart meter revocation.
- (1)
- In the smart meter authentication phase, the smart meter sends a ciphertext to the RM, The RM calculatesThus, the RM can get by decoding , and compute . Because , the RM can decrypt and get . Therefore, it is possible to correctly output based on whether and S, and are equal.
- (2)
- In the electricity consumption data charging phase, the RM can similarly decrypt the ciphertext to get . The OC can verify the validity of by the validity verification of the signature and can decrypt it to get . Because the hash function has collision resistance, verifying whether and h are equal can confirm the validity of the ledger and the real identity of the smart meter , thereby completing the billing of electricity consumption .
- (3)
- In the smart meter revocation phase, the OC can revoke by broadcasting to RM. During the smart meter authentication phase, RM can obtain . RM calculates the hash value by and , and compares it with . If the hash values are equal, the authentication of is rejected, resulting in being revoked. The OC deletes the relevant information of from the local database, thereby revoking the .
5.2. The Security Analysis
The smart meter authentication scheme involves six phases. Since the system initialization phase and the smart meter registration phase are completed offline or through secure channel transmission, there is no need to consider adversary. Smart meter revocation phase is operated by OC and does not require consideration of adversary. In the remaining three phases, security analysis is required because the information is transmitted over an open network. We analyze the security of the constructed scheme from two aspects: internal and external adversaries.
- (1)
- Resist passive attack, coming from the internal SM or dishonest RM or external adversary. In the smart meter authentication phase, the message sent by the smart meter is the ciphertext . In electricity consumption data charging phase, the message transmitted over the open network is the hash value H and the ciphertext . From the security of the ECC (discrete logarithm problem on elliptic curve) and the property of the hash value (unidirectionality and collision resistance), it is known that the adversary cannot obtain any useful message from the hash value and the ciphertext, and thus the authentication scheme is secure for passive attack.
- (2)
- Resist replay attack, coming from internal dishonest SM or dishonest RM or external adversary. In the smart meter authentication phase and electricity consumption data charging phase, if the smart meter forwards the intercepted ciphertext , to RM, the RM can obtain timestamp and by decoding and , which are get by decrypting and . Since the RM needs to check the validity of timestamps and , it can resist replay attacks.
- (3)
- Resist collusion attack, coming from the internal dishonest SM and external adversary. In the smart meter authentication phase, the smart meter needs to provide the hash value additionally when performing authentication. Because even if smart meter users collude to attack and obtain , due to the unidirectionality and collision resistance of the hash function, they cannot guess or the hash value. Therefore, it can resist collusion attack.
- (4)
- Resist forging electricity ledger attack, coming from the dishonest RM. In the electricity consumption data charging phase, the dishonest RM takes on the identity of the successfully authenticated smart meter and forges the smart meter electricity consumption data to send to the OC. Due to the unidirectionality of the hash function, cannot be calculated from . Therefore, the RM does not know the secret value of the smart meter that has been successfully authenticated, and cannot calculate the corresponding hash value h. Therefore, RM can only randomly select a hash value to send to the OC. When the OC searches for corresponding to in the local database, it can calculate that and h are not equal, thus rejecting the ledger and resisting the forging electricity ledger attack.
- (5)
- Resist identity spoofing attack, coming from internal SM or external adversary. An unauthenticated smart meter takes on the identity of a successfully authenticated smart meter and forges the smart meter electricity consumption data sent to the RM. Because the unauthenticated smart meter does not know the secret value of the authenticated smart meter, it cannot calculate the real hash value . Similar to the forging electricity ledger attack, when the OC searches for corresponding to in the local database, it can calculate that and h are not equal, thus rejecting the ledger and resisting identity spoofing attack.
Specifically, in the proposed scheme, when illegal users want to enter the system, they first need to perform identity authentication. In the identity authentication phase, smart meter users need to send registration information  to RM. However, the message is sent in ciphertext form during the sending process, so the adversary cannot obtain valid information (in this case, it is a passive attack, that is, even if the attacker intercepts the ciphertext message, they cannot decipher the valid information). If the adversary replays the intercepted message, it is known from the timestamp  that the system will reject it (in this case, it is a replay attack).
If the adversary wants to impersonate other legitimate users for identity authentication, the adversary needs to know the secret random number  of the legitimate user or its corresponding hash value . However, the user’s  is hidden in the hash function, and the one-way and anti-collision properties of the hash function indicate that the secret random number  of other legitimate users cannot be found. Therefore, it is not possible to impersonate other users (at this time, it is an identity spooning attack).
If the adversary conspires with some dishonest users to impersonate other legitimate users, then the adversary and dishonest users also need to conspire to calculate the secret random number  or its corresponding hash value  of other legitimate users. Although there is a high probability of calculating mutually prime integers , the input to the hash function still has an , and the random number  is hidden in the hash function, with each user’s  being independent of each other, resulting in the failure of the collusion attack.
Even if the adversary is very powerful and obtains all the registration information , that is, the adversary has obtained a valid hash value  and passed identity authentication (because the hash value is random, this probability can be ignored unless the attacker is dishonest RM). However, according to the unidirectionality of the hash function, adversaries cannot obtain the true , and, therefore, cannot calculate . Therefore, adversaries cannot forge electricity ledger, and, therefore, cannot cause economic losses to users within the system (in this case, it is forging electricity ledger attack).
6. Performance Analysis and Comparison
This section compares the proposed scheme with some related schemes in terms of property and performance.
6.1. Property Comparison
At present, the identity authentication schemes for smart meters include [,,,,]. Table 1 compares these schemes from six aspects: Passive Attack, Replay attack, Collusion attack, Forging Electricity Ledger Attack, Identity Spoofing Attack, and Revoke a single user. Due to the use of ciphertext or hash values for transmission and the use of timestamps, these schemes can resist passive attack and replay attacks. Except for scheme [], all other schemes can resist identity spooning attack. Refs. [,] and the proposed scheme can resist collusion attacks, but only the proposed scheme has the property of revoking a single user.
 
       
    
    Table 1.
    Comparison of properties.
  
6.2. Computational Overhead
The proposed authentication scheme involves operations such as congruent equations, ECC encryption/signature algorithm, and hash functions. The solution of the congruence equation system based on the CRT can be carried out offline by the TA. Therefore, in efficiency analysis, we only need to consider the ECC encryption/signature algorithm and hash function in the online authentication phase. The efficiency of these algorithms determines the computational efficiency of our scheme. In the data transmission process, only the hash h and ciphertext , , are included. Therefore, compared to authentication schemes based on HMAC, zero-knowledge proofs, blind signatures, group signatures and certificates techniques, our proposed scheme has less computational and communication overhead, and is more suitable for smart meter authentication.
For comparison, the time required for the execution of operations in [,] is used, which was obtained by running the Windows 7 operating system on a hardware platform with an Intel I7-4770 processor, a clock frequency of 3.40 GHz, and 4 GB of memory using the library MIRACL, as shown in Table 2. Compared with the authentication scheme based on the CRT, such as the schemes of Xiong et al. [] and Zhang et al. [], our scheme also has advantages in terms of computation and communication overhead, as shown in Table 3.
 
       
    
    Table 2.
    Time cost of referring cryptographics.
  
 
       
    
    Table 3.
    Comparison of computational overhead and communication overhead.
  
In the scheme of Xiong et al. [], one elliptic curve scalar multiplication, three small-scale multiplications, and three hash functions are required in the message signature phase, and four scalar multiplications and four point additions on elliptic curve, and one small-scale multiplication are required in the single-message authentication phase. Therefore, the total time cost is  ms. In the scheme of Tian et al. [], the identity authentication phase for the electricity meter requires four elliptic curve scalar multiplications and one hash operation. Therefore, the total time cost is  ms. In the scheme of Zhang et al. [], two elliptic curve scalar multiplications as well as two hash functions are required in the anonymous identity and signature phases, and three elliptic curve scalar multiplications, two elliptic curve point additions as well as one hash function are required in the single-message authentication phase. Therefore, the total time cost is  ms. In the scheme introduced by Garg et al. [], the identity authentication phase involves five elliptic curve scalar multiplications and three hash operations. Therefore, the total time cost is  ms. In the scheme of Sureshkumar et al. [], the authentication phase needs four elliptic curve scalar multiplications and eight hash operations. Therefore, the total time cost is  ms. In our scheme, four elliptic curve scalar multiplications, one hash function, and one modulo computation are required in the smart meter authentication phase. Therefore, the total time cost is  ms. As shown in Figure 6, our proposed scheme has the lowest Computation overhead in the identity authentication phase.
 
      
    
    Figure 6.
      Time cost of computation in the identity authentication phase compared with [,,,,].
  
6.3. Communication Overhead
The comparison of the communication overhead during the identity authentication phase is shown in Table 3, where  represents the bit length of the group on the elliptic curve and  represents the element bit length in . We adopt the same assumption as in [], i.e., the size of p is 20 bytess, hence the size of elements in G is 40 bytess. As shown in Figure 6, compared to other schemes, our proposed scheme also has the smallest communication overhead in the identity authentication phase. In the scheme of Xiong et al. [], vehicles are required to send  to the roadside unit during the authentication phase, including three elements on the elliptic curve and one element in an integer group, hence the communication overhead is approximately  bytess. In the scheme of Tian et al. [], the smart meter’s authentication phase needs the sending of one elliptic curve element and a one-bit message, resulting in a communication overhead of approximately  bytess. In the scheme of Zhang et al. [], vehicles need to send to the roadside unit for identity authentication, including one elliptic curve element and two elements in integer groups, hence the communication overhead is approximately  bytes. In the scheme of Garg et al. [], smart meters are required to send  to the gateway, including one elliptic curve element and one element in an integer group, and the gateway sends  to the smart meter, including one elliptic curve element and one element in an integer group, leading to a communication overhead of approximately  bytes. In the scheme by Sureshkumar et al. [], smart meters are required to send , including two elliptic curve elements, thus the communication overhead is approximately  bytes. In the proposed scheme, during the meter’s authentication phase, message  along with a one-bit confirmation message is required to be sent, leading to a communication overhead of approximately  bytes. The communication overhead is shown in the Figure 7.
 
      
    
    Figure 7.
      Time cost of communication in the identity authentication phase compared with [,,,,].
  
6.4. Energy Consumption
Ref. [] showed the energy consumption calculation formula , where  represents voltage and  represents current, with . The energy consumed for sending and receiving one-bit messages is  and  , respectively. In the scheme of Xiong et al. [], the energy consumption related to computation is approximately , and the energy required for communication is approximately , totaling approximately . In the scheme of Tian et al. [], the energy consumption related to computation is approximately  and the energy required for communication is approximately , totaling approximately . In the scheme of Zhang et al. [], the energy consumption related to computation is approximately  and the energy required for communication is approximately , totaling approximately . In the scheme of Garg et al. [], the energy consumption related to computation is approximately , and the energy required for communication is approximately , totaling approximately . In the scheme of Sureshkumar et al. [], the energy consumption related to computation is approximately  and the energy required for communication is approximately , totaling approximately . Since other schemes do not include a meter confirmation phase, for the sake of unified comparison, only the energy consumption of sending messages is considered in the proposed scheme. The energy consumption related to computation is approximately   and the energy required for communication is approximately , totaling approximately . The comparison of energy consumption related to computation is illustrated in Figure 8, the comparison of energy consumption related to communication is shown in Figure 9, and the total energy consumption comparison is depicted in Figure 10.
 
      
    
    Figure 8.
      Calculation-related energy consumption compared with [,,,,].
  
 
      
    
    Figure 9.
      Communication-related energy consumption compared with [,,,,].
  
 
      
    
    Figure 10.
      Total Compare total energy consumption with [,,,,].
  
7. Conclusions
A lightweight authentication scheme for smart meters is proposed in this paper, which uses the Chinese Remainder Theorem for identity authentication, reduces the computation and communication overhead during the authentication phase, and effectively revokes a single smart meter user by exposing the random secret number in the hash function. In addition, the ECC encryption algorithm is used for confidential transmission of electricity consumption data. The security of the proposed scheme was analyzed from both internal and external adversaries, which shows that the proposed scheme can resist passive attack, replay attack, collusion attack, false electronic ledger attack, and identity deception attack. However, the mutual authentication was not considered in the authentication phase. In our future work, we will consider more robust system models and stronger security requirements, such as mutual authentication and hierarchical authentication, to adapt to more complex real-world requirements.
Author Contributions
Conceptualization and methodology, J.D. and C.D.; writing—original draft J.D. and P.M.; software and validation, W.D. and X.W.; writing—review and editing, Z.L. All authors have read and agreed to the published version of the manuscript.
Funding
This research received no funding.
Data Availability Statement
Data are contained within the article.
Conflicts of Interest
Jingqi Du was employed by CLP Great Wall Internet System Application Co., Ltd.; Chengjing Dai was employed by China Energy Engineering Group Yunnan Electric Power Design Institute Co., Ltd.; Pinshang Mao was employed by NR Electric Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. The companies had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.
References
- Panasenko, S. A Lightweight Blockchain for the Internet of Medical Things Using Hash-based Message Authentication Codes. In Proceedings of the 2023 International Wireless Communications and Mobile Computing (IWCMC), Marrakesh, Morocco, 19–23 June 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1095–1100. [Google Scholar]
- Rasheed, A.A.; Mahapatra, R.N.; Hamza-Lup, F.G. Adaptive group-based zero knowledge proof-authentication protocol in vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 2019, 21, 867–881. [Google Scholar] [CrossRef]
- Xiong, H.; Chen, J.; Mei, Q.; Zhao, Y. Conditional privacy-preserving authentication protocol with dynamic membership updating for VANETs. IEEE Trans. Dependable Secur. Comput. 2020, 19, 2089–2104. [Google Scholar] [CrossRef]
- Sui, Z.; Li, J. An Auditable and Efficient Prepaid Scheme with Privacy Preservation in Smart Grids. In Proceedings of the 2023 IEEE International Conference on Big Data and Smart Computing (BigComp), Jeju, Republic of Korea, 13–16 February 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 48–55. [Google Scholar]
- Wasef, A.; Shen, X. Efficient group signature scheme supporting batch verification for securing vehicular networks. In Proceedings of the 2010 IEEE International Conference on Communications, Cape Town, South Africa, 23–27 May 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 1–5. [Google Scholar]
- Garba, A.; Khoury, D.; Balian, P.; Haddad, S.; Sayah, J.; Chen, Z.; Guan, Z.; Hamdan, H.; Charafeddine, J.; Al-Mutib, K. LightCert4IoTs: Blockchain-Based Lightweight Certificates Authentication for IoT Applications. IEEE Access 2023, 11, 28370–28383. [Google Scholar] [CrossRef]
- Jiang, S.; Zhu, X.; Wang, L. An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans. Intell. Transp. Syst. 2016, 17, 2193–2204. [Google Scholar] [CrossRef]
- Erroutbi, A.; El Hanjri, A.; Sekkaki, A. Secure and lightweight HMAC mutual authentication protocol for communication between IoT devices and fog nodes. In Proceedings of the 2019 IEEE International Smart Cities Conference (ISC2), Kansas City, MO, USA, 14–17 October 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 251–257. [Google Scholar]
- Tian, F.L.; Tian, X.X.; Song, Q.; Xue, J.H. Smart Meter Identity Authentication Scheme Based on Chinese Residual Theorem. J. Shanghai Univ. Electr. Power 2017, 33, 397–401. [Google Scholar]
- Dwivedi, A.D.; Singh, R.; Ghosh, U.; Mukkamala, R.R.; Tolba, A.; Said, O. Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things. J. Ambient. Intell. Humaniz. Comput. 2021, 13, 4639–4649. [Google Scholar] [CrossRef]
- Zhang, J.; Cui, J.; Zhong, H.; Chen, Z.; Liu, L. PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks. IEEE Trans. Dependable Secur. Comput. 2019, 18, 722–735. [Google Scholar] [CrossRef]
- Kong, W.; Shen, J.; Vijayakumar, P.; Cho, Y.; Chang, V. A practical group blind signature scheme for privacy protection in smart grid. J. Parallel Distrib. Comput. 2020, 136, 29–39. [Google Scholar] [CrossRef]
- Jiang, Y.; Ge, S.; Shen, X. AAAS: An anonymous authentication scheme based on group signature in VANETs. IEEE Access 2020, 8, 98986–98998. [Google Scholar] [CrossRef]
- Pathak, A.; Patil, T.; Pawar, S.; Raut, P.; Khairnar, S. Secure authentication using zero knowledge proof. In Proceedings of the 2021 Asian Conference on Innovation in Technology (ASIANCON), Pune, India, 27–29 August 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–8. [Google Scholar]
- Zhu, B.; Li, Y.; Hu, G.; Zhang, M. A Privacy-Preserving Data Aggregation Scheme Based on Chinese Remainder Theorem in Mobile Crowdsensing System. IEEE Syst. J. 2023, 17, 4257–4266. [Google Scholar] [CrossRef]
- Lu, Y.; Cao, S.; He, Q.; Fang, Z.; Yan, J.; Guo, Y. Group Signature Authentication Scheme with Credit Evaluation Mechanism in VANET. In Proceedings of the 2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Rio de Janeiro, Brazil, 24–26 May 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1703–1709. [Google Scholar]
- Johnson, D.; Menezes, A.; Vanstone, S. The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 2001, 1, 36–63. [Google Scholar] [CrossRef]
- Singh, J.; Gimekar, A.; Venkatesan, S. An efficient lightweight authentication scheme for human-centered industrial Internet of Things. Int. J. Commun. Syst. 2023, 36, e4189. [Google Scholar] [CrossRef]
- Hur, J.B.; Koo, D.Y.; Shin, Y.J. Privacy-Preserving Smart Metering with Authentication in a Smart Grid. Appl. Sci. 2015, 17, 1503–1527. [Google Scholar] [CrossRef]
- Hegde, M.; Anwar, A.; Kotegar, K.; Baig, Z.; Robin Doss, R. A novel multi-stage distributed authentication scheme for smart meter communication. PeerJ Comput. Sci. 2021, 7, e643. [Google Scholar] [CrossRef] [PubMed]
- Garg, S.; Kaur, K.; Kaddoum, G.; Rodrigues, J.J.P.C.; Robin Doss, M. Secure and Lightweight Authentication Scheme for Smart Metering Infrastructure in Smart Grid. IEEE Trans. Ind. Inform. 2020, 16, 3548–3557. [Google Scholar] [CrossRef]
- Sureshkumar, V.; Anandhi, S.; Amin, R.; Selvarajan, N.; Madhumathi, R. Design of robust mutual authentication and key establishment security protocol for cloud-enabled smart grid communication. IEEE Syst. J. 2020, 15, 3565–3572. [Google Scholar] [CrossRef]
- He, D.; Zeadally, S.; Xu, B.; Huang, X. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2681–2691. [Google Scholar] [CrossRef]
| Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. | 
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
