Fourth sentence. The proposed system for the smart grid is my-sure if both are negligible. In this document, we use the following ratings: (i): the Home Area Network `th smart meter gateway`. (ii): Neighbourhood Network `th Smart Meter` (NAN) gateway. (iii): a cyclical multiplication group. (iv): a high number of significant numbers in the order of . (v): The generator of . (vi): the function of safe haven, in (vii): the function of safe haven, where . (viii): the true identity of, where.
(ix): the true identity of, where. (x): Operation Exclusive OR. (xi): the very limited time interval. (xii): the probability of the event. To enable network communication in the above architecture, it is desirable to choose communication technologies based on Internet protocol for the smart grid. Inevitably, these networks are vulnerable to a series of external attacks, such as identity-shifting attacks, follow-up attacks and doS attacks . In addition, a large amount of sensitive data, which has a direct impact on users` privacy, will be transferred via these networks. It is therefore essential to ensure that unauthorized organizations do not have access to this information transmitted or communicate with elements of information technology in smart grid communication systems.
Tahavori, M., Moazami, F. Lightweight and key tuning system authenticated on the basis of secure PUF for smart grid. Peer-to-Peer Netw. Appl. 13, 1616–1628 (2020). doi.org/10.1007/s12083-020-00911-8 Sandhya Armoogum and Vandana Bassoo. Protecting a household`s energy consumption data in a smart grid. In Smart Power Distribution Systems, pages 163-177. Elsevier, 2019. In this subsection, we show that our improved system for smart grid is proven to be safe. Specify the event that may interrupt -to- authentication and indicate the event that may interrupt -to-.
Include the event that may interrupt the AKA security of the enhanced message authentication scheme. They leave and are the advantage of events that can interrupt authentication or authentication from one. In this section, we first apply the security model below to prove that the proposed system is clearly safe. Second, we have another discussion to show that it can withstand various known attacks and the security requirements of smart grids. The concept of a smart grid is introduced in order to modify the electricity grid through the use of new information and communication technologies. Smart Grid needs live electricity monitoring to provide the necessary services, and two-way communication is essential to this problem. Security and privacy are the main requirements that should be provided in the communication. Due to the complexity of Smart Grid system design and the use of different new technologies, there are many opportunities for opponents to attack the Smart Grid system, which can lead to disastrous problems for customers. A privacy authentication scheme is crucial to Smart Grid`s safe development. Recently, Mahmood et al.
 proposed a lightweight message authentication system for smart grid communications, claiming that it met security requirements. Unfortunately, we found that the Mahmood et al.s schema has some security flaws and does not have sufficient security features to be used in Smart Grid. To address these drawbacks, we offer an efficient and safe, lightweight and privacy-friendly authentication system for a smart network. The security of our system is assessed and formal security analysis and verification is carried out through the Burrows-Abadi-Needham (BAN) tool and the Automated Validation Tool for Internet Security Protocols and Applications (AVISPA).