Skip to main content
Log in

A novel blockchain-enabled zero-trust-based authentication scheme in power IoT environments

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The distributed authentication of a large number of resource-constrained power terminal devices (PTDs) is crucial for ensuring the security of the power IoT communication. However, existing solutions are inadequate in terms of security (such as vulnerability to single point failures or insider attacks) and communication costs, which do not meet the requirements of the power IoT environment. Therefore, we propose a zero-trust-based mutual authentication scheme in cloud-edge-end collaboration power IoT environment based on blockchain technology. The proposed solution involves deploying a distributed multi-point zero-trust engine around dense PTDs to collect real-time identity information. Through the maintenance of an alliance blockchain, the edge server securely shares and traces identity information, preventing tampering and effectively blocking threats related to lost terminals during authentication. Additionally, a lightweight ECC key management scheme ensures the security of authentication information. The proposed scheme effectively defends against common attacks such as replay attacks and identity forgery attacks through informal security analysis, while its security is evaluated using the Canetti and Krawczyk (CK) adversary models. Performance evaluation results demonstrate that the proposed scheme achieves effectiveness without the compromising required security attributes, which obtains up to 58% improvement 58% improvement in computation delay and a 56.9% improvement in communication costs over previous state-of-the-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+
from €37.37 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Price includes VAT (Netherlands)

Instant access to the full article PDF.

Fig. 1
The alternative text for this image may have been generated using AI.
Fig. 2
The alternative text for this image may have been generated using AI.
Fig. 3
The alternative text for this image may have been generated using AI.
Algorithm 1
The alternative text for this image may have been generated using AI.
Algorithm 2
The alternative text for this image may have been generated using AI.
Algorithm 3
The alternative text for this image may have been generated using AI.
Algorithm 4
The alternative text for this image may have been generated using AI.
Fig. 4
The alternative text for this image may have been generated using AI.
Fig. 5
The alternative text for this image may have been generated using AI.
Fig. 6
The alternative text for this image may have been generated using AI.
Fig. 7
The alternative text for this image may have been generated using AI.
Fig. 8
The alternative text for this image may have been generated using AI.
Fig. 9
The alternative text for this image may have been generated using AI.
Fig.10
The alternative text for this image may have been generated using AI.
Fig. 11
The alternative text for this image may have been generated using AI.
Fig. 12
The alternative text for this image may have been generated using AI.
Fig. 13
The alternative text for this image may have been generated using AI.
Fig. 14
The alternative text for this image may have been generated using AI.
Fig. 15
The alternative text for this image may have been generated using AI.

Similar content being viewed by others

References

  1. Sawas AU, Farag HEZ (2023) Real-time detection of stealthy IoT-based cyber-attacks on power distribution systems: a novel anomaly prediction approach. Electr Power Syst Res. https://doi.org/10.1016/j.epsr.2023.109496

    Article  Google Scholar 

  2. Envelope M, Aah A, Zs A et al (2023) Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2022.103540

    Article  Google Scholar 

  3. Huang W, Xie X, Wang Z et al (2023) ZT-Access: a combining zero trust access control with attribute-based encryption scheme against compromised devices in power IoT environments. Ad hoc networks 145:103161

    Article  Google Scholar 

  4. Uludag S, Lui KS, Ren W, Nahrstedt K (2016) Secure and scalable data collection with time minimization in the smart grid. IEEE Trans Smart Grid 7(1):43–54

    Article  Google Scholar 

  5. Philips A, Jayaraj J, Josh F, Venkateshkumar P (2021) Enhanced RSA key encryption application for metering data in smart grid. Int J Perv Comput Commun 17(5):596–610

    Google Scholar 

  6. Srinivas MJ, Das AK, Li X, Khan MK, Jo M (2021) Designing anonymous signature-based authenticated key exchange scheme for IoT-enabled smart grid systems. IEEE Trans Ind Inform 17(7):4425–4436

    Article  Google Scholar 

  7. Xiang XY, Cao J (2022) An efficient authenticated key agreement scheme supporting privacy-preservation for smart grid communication. Electric Power Systems Res 203:107630

    Article  Google Scholar 

  8. Chaudhry SA, Yahya K, Garg S, Kaddoum G, Hassan M, Zikria YB (2022) Las-sg: An elliptic curve based lightweight authentication scheme for smart grid environments. IEEE Trans Ind Inform 19(2):1504–1511

    Article  Google Scholar 

  9. Qi M, Chen J (2021) Two-pass privacy preserving authenticated key agreement scheme for smart grid. IEEE Syst J 15(3):3201–3207

    Article  Google Scholar 

  10. Deng LZ, Wang T, Feng S, Qu YY, Li SW (2023) Secure identity-based designated verifier anonymous aggregate signature scheme suitable for smart grids. IEEE IoT J 10(1):57–65

    Google Scholar 

  11. Wang J, Wu L, Choo K-KR, He D (2020) Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Trans Ind Inform 16(3):1984–1992

    Article  Google Scholar 

  12. Oumair N, Ullah S, Anjum L (2021) Blockchain-based decentralized lightweight control access scheme for smart grids. Arab J Sci Eng 46(9):8233–8243

    Article  Google Scholar 

  13. Weizheng W et al (2021) Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer-to-Peer Netw Appl 14(5):2681–2693

    Article  Google Scholar 

  14. Bao H et al (2021) BBNP: A Blockchain-based Novel Paradigm for Fair and Secure Smart Grid Communications. IEEE IoT J 9(5):12984–12996

    Google Scholar 

  15. Qu YY, Uddin MP, Gan CQ et al (2023) Blockchain-enabled federated learning: a survey. ACM Comput Surv 55(4):1–35

    Article  Google Scholar 

  16. Ul Hassan M, Rehmani MH, Chen JJ (2023) Anomaly detection in blockchain networks: a comprehensive survey. IEEE Commun Surv Tutor 25(1):289–318

    Article  Google Scholar 

  17. Ran C, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: International Conference on the Theory & Application of Cryptographic Techniques: Advances in Cryptology. Springer, Berlin and Heidelberg

  18. Ward R, Beyer B (2014) Beyond corp: a new approach to enterprise security. Login Magaz USENIX SAGE 39(6):61

    Google Scholar 

  19. Saleem M, Warsi MR, Islam S (2023) Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment. J Inform Secur Appl 72:2214–2126

    Google Scholar 

  20. Chen L, Dai Z, Chen M, et al.(2021) Research on the security protection framework of power mobile Internet services based on zero trust. In: Proceeding of 2021 16th International Conference on Smart Grid and Electrical Automation (ICSGEA). Piscataway, NJ: IEEE, pp 65–68

  21. Sultana M, Hossain A, Laila F et al (2020) Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology. BMC Med Inform Decis Mak 20(1):1–10

    Article  Google Scholar 

  22. Feng J, Tingting Yu, Wang Z, Zhang W, Han G, Huang W (2022) AnEdgeZero trust model against compromised terminals threats in power IoT environments. J Comput Res Develop 59(5):1–13

    Google Scholar 

  23. Chang Y, Li JL, Li WJ (2023) 2D2PS: A demand-driven privacy-preserving scheme for anonymous data sharing in smart grids. J Inform Secur Appl 74:103466

    Google Scholar 

  24. Hu SF, Chen YR, Zhen YL et al (2023) Provably secure ECC-based authentication and key agreement scheme for advanced metering infrastructure in the smart grid. IEEE Trans Ind Inform 19(4):5985–5994

    Article  Google Scholar 

  25. Abbasinezhad-Mood D, Ostad-Sharif A, Nikooghadam M (2020) Novel anonymous key establishment protocol for isolated smart meters. IEEE Trans Industr Electron 67(4):2844–2851

    Article  Google Scholar 

  26. Javed S et al (2022) An efficient authentication scheme using blockchain as a certificate authority for the internet of drones. Drones. https://doi.org/10.3390/drones6100264

    Article  Google Scholar 

  27. Abdelmaboud A et al (2022) Blockchain for IoT applications: taxonomy platforms recent advances challenges and future research directions. Electronics. https://doi.org/10.3390/electronics11040630

    Article  Google Scholar 

  28. Kumar P, Lin Y, Bai G, Paverd A, Dong JS, Martin A (2019) Smart grid metering networks: a survey on security, privacy and open research issues. IEEE Commun Surv Tutor 21(3):2886–2927

    Article  Google Scholar 

  29. Mansour DEA, Numair M, Zalhaf AS et al (2023) Applications of IoT and digital twin in electrical power systems: a comprehensive survey. IET Generat Trans Distribut 17(20):4457–4479

    Article  Google Scholar 

  30. Park K, Lee JY, Das AK et al (2023) BPPS: blockchain-enabled privacy-preserving scheme for demand-response management in smart grid environments. IEEE Trans Depend Secure Comput 20(2):1719–1729

    Article  Google Scholar 

  31. "Arduinolibs: Cryptographic library," URL http://rweather.github.io/arduinolibs/crypto.html

  32. "OpenSSL, cryptography and SSL/TLS toolkit," URL http://www.openssl.org, 2017

Download references

Acknowledgements

This research is supported by the project "Research on edge adaptive security interaction technology of power IoT” (No. 546826230037) by Beijing FibrLink Communications Co. Ltd, and also funded by the project “Low cost distribution network tower tilt and outer break early warning system based on MESH ad-networking technology ”(No. XX92000Y07) by the Automation Technology Project of State Grid Zhejiang Xinxing Technology Co., LTD.

Author information

Authors and Affiliations

Contributions

L. and W. wrote the main manuscript text and Z.S. and M. prepared figures 1-10. All authors reviewed the manuscript.

Corresponding author

Correspondence to Cong Wang.

Ethics declarations

Conflict of interest

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, S., Zhang, H., Shi, H. et al. A novel blockchain-enabled zero-trust-based authentication scheme in power IoT environments. J Supercomput 80, 20682–20714 (2024). https://doi.org/10.1007/s11227-024-06262-y

Download citation

  • Accepted:

  • Published:

  • Version of record:

  • Issue date:

  • DOI: https://doi.org/10.1007/s11227-024-06262-y

Keywords