Submitted:
12 June 2025
Posted:
12 June 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Related Works
2.1. Broadcast Encryption Algorithm
2.2. Authentication Protocol
2.3. Key Updating Protocol
3. System Model
4. Definition
4.1. Bloom Filter
4.2. Identity-Based Public Key Encryption Algorithm
5. Protocol
5.1. System Initialization
5.2. Key Generation
5.3. Data Encryption
5.4. User Authentications
5.5. Data Decryption
5.6. Dynamic Updating of Terminal Devices
5.6.1. Smart Sensor Device Addition
5.6.2. Smart Sensor Device Revocation
6. Security Analysis
6.1. Forward Security
6.2. Backward Security
6.3. Replay Attack Resistance
6.4. Impersonation Attack Resistance
7. Performance Analysis
7.1. Theoretical Analysis
7.2. Experimental Analysis
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Fang, X.; Misra, S.; Xue, G.; et al. Smart grid—The new and improved power grid: A survey. IEEE Communications Surveys & Tutorials 2011, 14, 944–980. [Google Scholar]
- Gungor, V.C.; Sahin, D.; Kocak, T.; et al. Smart grid technologies: Communication technologies and standards. IEEE Transactions on Industrial Informatics 2011, 7, 529–539. [Google Scholar] [CrossRef]
- Liu, Z.; Cao, Z.; Dong, X.; et al. EPMDA-FED: Efficient and Privacy-Preserving Multidimensional Data Aggregation Scheme With Fast Error Detection in Smart Grid[J]. IEEE Internet of Things Journal 2022, 9, 6922–6933. [Google Scholar] [CrossRef]
- Zhang, X.; You, L.; Hu, G. An Efficient and Robust Multidimensional Data Aggregation Scheme for Smart Grid Based on Blockchain. IEEE Transactions on Network and Service Management 2022, 19, 3949–3959. [Google Scholar] [CrossRef]
- Zuo, X.; Li, L.; Peng, H.; et al. Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid. IEEE Systems Journal 2021, 15, 395–406. [Google Scholar] [CrossRef]
- Halak, B.; Yilmaz, Y.; Shiu, D. Comparative analysis of energy costs of asymmetric vs symmetric encryption-based security applications. IEEE Access 2022, 10, 76707–76719. [Google Scholar] [CrossRef]
- Patgiri, R.; Muppalaneni, N.B. Stealth: A highly secured end-to-end symmetric communication protocol. International Symposium on Networks, Computers and Communication 2022, 1-8.
- Gadhiya, N.; Tailor, S.; Degadwala, S. A review on different level data encryption through a compression techniques, International Conference on Inventive Computation Technologies 2024, 1378-1381.
- Jimale, M.A.; Z’aba, M.R.; Kiah, M.L.B.M.; et al. Authenticated encryption schemes: A systematic review. IEEE Access 2022, 10, 14739–14766. [Google Scholar] [CrossRef]
- Shen, Y.; Sun, Z.; Zhou, T. Survey on asymmetric cryptography algorithms. International Conference on Electronic Information Engineering and Computer Science 2021, 464–469. [Google Scholar]
- Gadhiya, N.; Tailor, S.; Degadwala, S. A review on different level data encryption through a compression techniques. International Conference on Inventive Computation Technologies 2024, 1378–1381. [Google Scholar]
- Al-Shareeda, M.A.; Anbar, M.; Manickam, S.; et al. Security and privacy schemes in vehicular ad-hoc network with identity-based cryptography approach: A survey. IEEE Access 2021, 9, 121522–121531. [Google Scholar] [CrossRef]
- Gupta, B.B.; Gaurav, A.; Hsu, C.H.; et al. Identity-based authentication mechanism for secure information sharing in the maritime transport system. IEEE Transactions on Intelligent Transportation Systems 2021, 24, 2422–2430. [Google Scholar] [CrossRef]
- Zhao, Y.; Wang, Y.; Liang, Y.; et al. Identity-based broadcast signcryption scheme for vehicular platoon communication. IEEE Transactions on Industrial Informatics 2022, 19, 7814–7824. [Google Scholar] [CrossRef]
- Shen, S.; Wang, H.; Zhao, Y. Identity-based authenticated encryption with identity confidentiality. Theoretical Computer Science 2022, 901, 1–18. [Google Scholar] [CrossRef]
- Pavithran, D.; Al-Karaki, J.N.; Shaalan, K. Edge-based blockchain architecture for event-driven IoT using hierarchical identity based encryption. Information Processing & Management 2021, 58, 102528. [Google Scholar]
- Badar, H.M.S.; Qadri, S.; Shamshad, S.; et al. An identity based authentication protocol for smart grid environment using physical uncloneable function. IEEE Transactions on Smart Grid 2021, 12, 4426–4434. [Google Scholar] [CrossRef]
- Samiullah, F.; Gan, M.L.; Akleylek, S.; et al. Group key management in internet of things: A systematic literature review. IEEE Access 2023, 11, 77464–77491. [Google Scholar] [CrossRef]
- Fiat, A.; Naor, M. Broadcast encryption. Advances in Cryptology—CRYPTO’93: 13th Annual International Cryptology Conference, 1994, 480-491.
- Boneh, D.; Gentry, C.; Waters, B. Collusion resistant broadcast encryption with short ciphertexts and private keys. Annual international cryptology conference. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005, 258-275.
- Lewko, A.; Sahai, A.; Waters, B. Revocation systems with very small private keys. IEEE Symposium on Security and Privacy 2010, 273–285. [Google Scholar]
- Chen, L.; Li, J.; Zhang, Y. Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext. Soft Computing 2020, 24, 4589–4606. [Google Scholar] [CrossRef]
- Acharya, K. Secure and efficient public key multi-channel broadcast encryption schemes. Journal of Information Security and Applications 2020, 51, 102436. [Google Scholar] [CrossRef]
- Sravan Kumar, G.; Sri Krishna, A. Privacy sustaining constant length ciphertext-policy attribute-based broadcast encryption. Soft Computing and Signal Processing 2019, 313–324. [Google Scholar]
- Wazid, M.; Das, A.K.; Kumar, N.; et al. Secure three-factor user authentication scheme for renewable-energy-based smart grid environment. IEEE Transactions on Industrial Informatics 2017, 13, 3144–3153. [Google Scholar] [CrossRef]
- Mahmood, K.; Chaudhry, S.A.; Naqvi, H.; et al. An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Generation Computer Systems 2018, 81, 557–565. [Google Scholar] [CrossRef]
- Kumar, P.; Gurtov, A.; Sain, M.; et al. Lightweight authentication and key agreement for smart metering in smart energy networks. IEEE Transactions on Smart Grid 2018, 10, 4349–4359. [Google Scholar] [CrossRef]
- Wang, J.; Wu, L.; Choo, K.K.R.; et al. Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Transactions on Industrial Informatics 2019, 16, 1984–1992. [Google Scholar] [CrossRef]
- Lin, H.Y.; Hsieh, M.Y. A dynamic key management and secure data transfer based on m-tree structure with multi-level security framework for Internet of vehicles. Connection Science 2022, 34, 1089–1118. [Google Scholar] [CrossRef]
- Tan, H.; Zheng, W.; Guan, Y.; et al. A privacy-preserving attribute-based authenticated key management scheme for accountable vehicular communications. IEEE Transactions on Vehicular Technology 2022, 72, 3622–3635. [Google Scholar] [CrossRef]









| Protocol | Computation Cost | Communication Cost |
|---|---|---|
| MAH | ||
| WAN | ||
| ZHA | ||
| Ours |
| Protocol | Computation Cost | Communication Cost |
|---|---|---|
| CHE | ||
| ACH | ||
| KUM | ||
| Ours |
| Protocol | Number of Devices | |||||
|---|---|---|---|---|---|---|
| 50 | 100 | 150 | 200 | 250 | 300 | |
| MAH | 0.28 ms | 0.56 ms | 0.84 ms | 1.12 ms | 1.40 ms | 1.68 ms |
| WAN | 0.16 ms | 0.34 ms | 0.51 ms | 0.67 ms | 0.84 ms | 1.01 ms |
| ZHA | 0.22 ms | 0.45 ms | 0.67 ms | 0.90 ms | 1.12 ms | 1.35 ms |
| Ours | 0.06 ms | 0.11 ms | 0.17 ms | 0.22 ms | 0.28 ms | 0.34 ms |
| Protocol | MAH | WAN | ZHA | Ours |
|---|---|---|---|---|
| Cost | 576 bits | 7184 bits | 800 bits | 192 bits |
| Protocol | Number of Devices | |||||
|---|---|---|---|---|---|---|
| 50 | 100 | 150 | 200 | 250 | 300 | |
| CHE | 19.29 ms | 38.58 ms | 57.87 ms | 77.16 ms | 96.25 ms | 115.74 ms |
| ACH | 31.20 ms | 62.44 ms | 93.61 ms | 124.87 ms | 156.34 ms | 187.24 ms |
| KUM | 10.65 ms | 21.30 ms | 31.95 ms | 42.60 ms | 53.25 ms | 63.90 ms |
| Ours | 10.50 ms | 21.00 ms | 31.50 ms | 42.00 ms | 52.51 ms | 63.12 ms |
| Protocol | Number of Devices | |||||
|---|---|---|---|---|---|---|
| 50 | 100 | 150 | 200 | 250 | 300 | |
| CHE | 20.85 ms | 41.57 ms | 62.55 ms | 83.41 ms | 104.02 ms | 125.13 ms |
| ACH | 31.20 ms | 63.91 ms | 94.34 ms | 123.99 ms | 154.97 ms | 188.01 ms |
| KUM | 21.05 ms | 42.17 ms | 63.18 ms | 84.06 ms | 105.21 ms | 126.20 ms |
| Ours | 10.39 ms | 20.82 ms | 31.27 ms | 41.60 ms | 51.98 ms | 62.42 ms |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).