Abstract
Introduction
The “smart grid (SG)” is an energy-based communication system, providing power generation, distribution, and consumption services for customers. 1 To enhance the efficiency and reliability of SGs, the concept of dynamic microgrid partition has been proposed recently, 2 where all “smart meters (SMs)” in a SG are dynamically divided into multiple “microgrid groups (MGs).” Typically, the microgrid partition process is conducted by an entity called “Meter data management system (MDMS),” which determines the MG each SM belongs to. And each SM is involved in three communication models (i.e. the intra-group multicast, the inter-group unicast, and the intra-group unicast models) to exchange energy with SMs in the same or different groups. 3
To secure dynamic microgrid partition in the SG, message authentication protocols4–27 have been designed for protecting messages transmitted among SMs. Regardless of the technology implemented, a message authentication scenario includes two kinds of entities: the “MDMS” and a set of SMs. In practice, as shown in Figure 1, these entities are involved in three phases (i.e. the initialization phase, the dynamic microgrid partition phase, and the message authentication phase). During the initialization phase, the MDMS generates keying materials for all SMs in the SG and deploys them to each SM, respectively. During the microgrid partition phase, the MDMS broadcasts partition information to all SMs in the SG. During the message authentication phase, one SM signs messages and transmits signatures along with messages to one or multiple SMs in the same or different groups.

Secure dynamic microgrid partition overview.
Scalability is a serious concern for the above message authentication protocol. First, due to the large number of MGs and SMs in the SG, it is hard to manage so many keys for signing and verifying messages. Second, different from traditional group communications, a SM in one group may need to exchange energy with SMs in other groups, resulting in high complexity of key management. Unfortunately, traditional public-key-based4–14 and symmetric-key-based schemes24,25,28,29 cannot fulfill the scalability feature, as discussed below: (1) traditional public-key-based schemes (i.e. schemes based on “public key infrastructure (PKI)”30,31) cannot fulfill the above scalability requirement, as illustrated by the following two examples. First, when there are a large number of MGs and SMs, the certificate management and verification processes will be complicated. Second, traditional PKI technique has no group information management feature. (2) Traditional symmetric-key-based schemes (i.e. schemes based on “logical key hierarchy (LKH) 32 ”) cannot fulfill the above scalability requirement, as illustrated by the following two examples. First, when there are a large number of MGs and SMs, the management of logical key tree will be quite complicated. Second, LKH cannot distinguish SMs in the same group and does not support inter-group communications. In sections “Related work” and “Efficiency evaluation,” we will further discuss these issues. To address the above issues, it is prerequisite to elaborately design a message authentication protocol for dynamic microgrid partition without PKI and LKH.
A message authentication protocol for dynamic microgrid partition without PKI and LKH should satisfy the following requirements:
Obviously, designing a message authentication protocol for dynamic microgrid partition is a nontrivial task, because there are a variety of SMs as well as MGs, resulting in a lot of integrity and scalability issues. When considering this research topic, we observe that no existing cryptographic primitive can be directly applied to satisfy all the above requirements. In section “Related work,” we will give the detailed analysis to arrive at this conclusion. Given the trend that more and more microgrids are being developed, this becomes a more severe issue. Motivated by this observation, this article mainly makes three contributions:
First, we identify the characteristics of message authentication in dynamic microgrid partition and define requirements for the protocol of this kind. We show some integrity and scalability issues of current message authentication protocols in SG.
Second, we present a novel message authentication protocol for SG called securing dynamic microgrid partition (SDMGP), which can fulfill all the above requirements. However, different from current message authentication mechanisms that are built on PKI and LKH, SDMGP is built on “identity-based cryptography (IBC),” 33 Bloom filter, 34 Lagrange interpolation, 35 and bilinear map. 36 We do not use PKI and LKH here due to their incomplete integrity and scalability features. On the other hand, observing that IBC has much lower deployment complexity than PKI and LKH, SDMGP aims to use it for managing keys for signing and verifying messages in SG. At the same time, we introduce the Bloom filter technique to SDMGP for group identification, which is quite lightweight. By doing so, the complicated group key management in LKH is avoided. Moreover, using Lagrange interpolation and bilinear map, we design novel signing and verification algorithms to prevent adversary from tampering messages, which enjoys low computation and communication costs.
Third, we analyze both the security and efficiency of SDMGP, showing it is feasible for real-world applications.
We organize the remainder of this article as follows. In section “Related work,” we survey the related work and discuss problems in current protocols. Section “SDMGP: the protocol” describes SDMGP in detail. Then, in sections “Security analysis” and “Efficiency evaluation,” we present the security analysis and efficiency evaluation for SDMGP, respectively. Finally, in section “Conclusion,” we draw our conclusions.
Related work
Due to the openness of SG network, message authentication has vital significance for dynamic microgrid partition. Therefore, a large number of security protocols4–29 have been designed for this purpose. All these protocols can be categorized into three types: symmetric-key-based protocols, traditional public-key-based protocols, and identity-based protocols.
In symmetric-key-based protocols, to provide integrity protection, two SMs are pre-configured with a shared pairwise key, while SMs in the same MG are pre-configured with a shared group key. During message transmission, SMs use the shared pairwise or group key to sign and verify messages. Therefore, the message authentication protocol is quite lightweight. However, symmetric-key-based protocols have the following two issues: (1) first, for unicast message authentication, each pair of SMs in the SG will be pre-configured with a pairwise key. When there are a lot of SMs, the pairwise-key management process will be complicated (i.e. the pairwise-key management process lacks scalability), as illustrated by the following example. If there are
In traditional public-key-based protocols, each SM is configured with a public–private key pair instead of a lot of symmetric keys. During message transmission, the sender signs messages using its private key, and the receiver verifies messages using the corresponding public key. By doing so, the pre-configuration process is much simpler than those of symmetric-key-based protocols. However, traditional public-key-based protocols have the following two issues: (1) this sort of protocols use PKI for managing certificates for signing and verifying messages, which is quite complicated. Moreover, verifying certificate leads to additional computation cost. (2) Current public-key-based protocols mainly focus on integrity protection for unicast messages, and the management of group information is largely neglected. Yaghmaee and Mohades 4 is a message authentication protocol between a SM and a MDMS. Nizamuddin et al. 5 designed a signcryption algorithm, which can be used for securing multicast communications. Liu et al. 6 is an authentication protocol for V2G network. Fouda et al.7,9 presented two message authentication protocols between gateways in SG. Li and Cao, 8 Wu and Zhou, 11 Reyzin and Reyzin, 12 and Badra and Zeadally 13 are security protocols for unicast messages in SG. Yan et al. 10 is an in-network collaborative communication architecture. Nabeel et al. 14 is based on the “physically unclonable function (PUF)” technique. Yavuz 27 is a broadcast authentication scheme for command and control messages.
Observing the above issues, we use IBC instead of LKH and PKI for avoiding the complicated key management processes. However, current IBC protocols cannot manage group information, either. To address this issue, this article aims to use the Bloom filter technique for managing group information, which is quite lightweight. In addition, we use Lagrange interpolation and bilinear map for constructing a novel identity-based message authentication protocol for SG, which enjoys low computation and communication costs. By doing so, SDMGP can fulfill all requirements described in section “Introduction.” Avril et al. 16 discussed the potential use of IBC in SG. So et al. 17 use IBC for securing messages transmitted between two SMs. A framework of identity-based message authentication protocol for SG is used by Nicanfar et al. 18 Two identity-based symmetric key agreement protocols are described by Kamto et al. 19 and Wan et al. 26 Nicanfar et al. 20 proposed an identity-based authentication protocol between a SM and the MDMS. Gentry and Silverberg 21 introduced the concept of hierarchical IBC. Liu et al. 22 presented an identity-based signing algorithm without private key generator. Lee et al. 23 is an identity-based key distribution protocol.
SDMGP: the protocol
In this section, we first introduce the preliminaries used in SDMGP. Then, we describe the system model (i.e. the high-level architecture of SDMGP). Finally, we give the construction (i.e. the algorithms used in SDMGP).
Preliminaries
Bloom filter
A Bloom filter 34 is a randomized data structure as described below:
Given a set
A verifier checks whether an element
From the above definition, it can be seen that a Bloom filter is a space-efficient data structure that can be used for checking whether an element is in a data set.
Lagrange interpolation
Given a set of data points
Specifically, for
Bilinear map
Let
System model
The system model of SDMGP is shown in Figure 2, including three phases as described below. And the notations used in this article are listed in Table 1.

System model of SDMGP.
Notation table.
The initialization phase
During the initialization phase, the MDMS first generates a set of public parameters and its own private key. Then, it generates a private key for each SM and distributes keying materials to each SM. The key-generating algorithm is shown below.
After the initialization phase, the MDMS holds
The dynamic microgrid partition phase
The dynamic microgrid partition phase which is carried out between the MDMS and multiple SMs is as follows.
Given a smart grid
Upon receiving
The message authentication phase
There are mainly three kinds of message transmissions in SG, namely, intra-group multicast, intra-group unicast, and inter-group unicast, which are shown in Figure 3. During intra-group multicast, the sender (e.g.

The message authentication phase.
From the above system model, it can be seen that there are nine cryptographic algorithms used in SDMGP (i.e.
Construction
The construction of SDMGP is a tuple (
From the above system model and construction, it can be seen that SDMGP uses Bloom filter for managing group information and uses Lagrange interpolation and bilinear map for constructing signing and verification algorithms. So, SDMGP can fulfill the integrity feature described in section “Introduction.” In section “Security analysis,” we will further analyze the integrity of SDMGP.
From the above system model and construction, it can be seen that SDMGP uses IBC instead of PKI to reduce the deployment complexity. So, SDMGP can fulfill the scalability feature described in section “Introduction.” In section “Efficiency evaluation,” we will further analyze the scalability of SDMGP using the other two vectors, namely, computation and communication costs.
Further discussion
In the above system model and construction, we mainly focus on new requirements in microgrid partition described in section “Introduction.” However, there may be some traditional attacks that have not been considered such as the replay attack. A simple way to prevent replay attacks is to use timestamp or sequence number in the signing and verification algorithms. For example, in the
Another issue is that the SM may join in or leave the microgrid. In this case, the MDMS may need to update the Bloom filter. To address this issue, the MDMS just runs the
Security analysis
We analyze the security of SDMGP with respect to the security requirement described in section “Introduction” (i.e. integrity). As discussed in section “Introduction,” integrity can be analyzed using two vectors, namely, group identification and forgery. For the group identification vector, we will analyze the error rate of Bloom filter, as shown in section “Group identification.” For the forgery vector, we will prove that the adversary cannot tamper the transmitted message in the random oracle model, 37 as shown in section “Forgery.”
Group identification
Let
In step 1, while running the
In step 2, we can compute the error rate of
Finally, for fixed
Forgery
For the forgery vector, we divide our analysis into three parts (i.e. security assumption, adversary model, and security proof). The security assumption defines a hard mathematical problem which cannot be solved efficiently. The adversary model defines the adversary’s behaviors. The security proof shows the above adversary cannot establish an attack on SDMGP efficiently. Otherwise, we can construct an algorithm that can use the adversary for solving the hard mathematical problem described in the security assumption part. Therefore, existing of this adversary contradicts our security assumption. In other words, such an adversary does not exist, and SDMGP is secure.
In addition, there are three kinds of message transmissions in SDMGP as shown in section “SDMGP: the protocol.” We mainly analyze the security of intra-group unicast, and the security of intra-group multicast and inter-group unicast can be analyzed in a similar way.
Part 1: security assumption
CDH (i.e. Computational Diffie-Hellman) problem. One wants to compute
DDH (i.e. Decisional Diffie-Hellman) problem. One wants to decide whether
GDH (i.e. Gap Diffie-Hellman) group. If the DDH problem can be efficiently solved while the CDH problem cannot be solved in probabilistic polynomial time, we say
We assume
Part 2: adversary model
To provide integrity protection for transmitted message, it should be guaranteed that no one can forge messages sent from the SM (i.e.
We say
Part 3: security proof
In this part, we will show
Given
At the beginning,
When a hash query for
Efficiency evaluation
We evaluate the efficiency of SDMGP with respect to the efficiency requirement described in section “Introduction” (i.e. scalability). As discussed in section “Introduction,” scalability can be evaluated using three vectors, namely, deployment complexity, computation cost, and communication cost. In section “SDMGP: the protocol,” we have discussed the deployment complexity vector. So, in this section, we mainly focus on the other two vectors (i.e. computation and communication costs), as shown in sections “Computation cost” and “Communication cost,” respectively.
Computation cost
Computation cost is the first vector for evaluating the scalability feature, which is defined as time costs consumed by cryptographic algorithms. In SDMGP, computation cost is mainly consumed by the signing and verification algorithms in the message authentication phase. So, we mainly compare signing and verification costs of SDMGP with those of current protocols. Moreover, there are a lot of identity-based protocols for SG,17–19,21,22,26 but only So et al., 17 Gentry and Silverberg, 21 and Liu et al. 22 provide signing and verification algorithms. So, we only choose these three protocols for comparison.
To compare the computation costs, we first investigated time costs consumed by basic cryptographic algorithms, namely, hash function, modular exponentiation, and bilinear map. Then, we compared SDMGP with So et al., 17 Gentry and Silverberg, 21 and Liu et al. 22
We conducted our experiments on a CentOS operating system with an Intel i7 processor of 3.40 GHz clock frequency. Cryptographic libraries used in the experiments are PBC 38 and OPENSSL. 39 To achieve 80-bit security level, we chose the 160-bit elliptic curve group. 39 Moreover, SHA1 39 is used as the hash function, and type F parameter 38 is used for bilinear map.
We run each basic cryptographic operation for 500 times and got the means of bilinear map (i.e.
From the above results, it can be seen that (1) the time costs of bilinear map and modular exponentiation are around
Then, we computed the time costs of signing and verification algorithms in Table 2, where
Comparison of computation costs (unit: µs).
From Table 2, it can be seen that (1) the computation cost of SDMGP is much lower than those of So et al.,
17
Gentry and Silverberg,
21
and Liu et al.
22
on the sender’s side. This is because
The above discussion shows that SDMGP enjoys the scalability feature when evaluated using the computation cost vector.
Communication cost
Communication cost is the second vector for evaluating the scalability feature, which is determined by the total length of messages transmitted in the SG.
There are three kinds of messages which are transmitted during the initialization phase, the dynamic microgrid partition phase, and the message authentication phase. During the initialization phase, the MDMS distributes keying materials to each SM. Since this process is run only once and few public/private keys are transmitted to each SM, the communication cost during the initialization phase can be omitted. Similarly, during the message authentication phase, SMs only need to exchange signatures along with messages, whose communication costs can be omitted too. On the other hand, during the dynamic microgrid partition phase, the MDMS needs to broadcast group information to SMs whose length is quite long. So, in this section, we mainly compare the communication costs of the dynamic microgrid partition phase.
Moreover, we mainly compare the communication cost of SDMGP with that of LKH, 32 since traditional PKI-based protocols and identity-based protocols do not support group information management.
To compute the communication costs of SDMGP and LKH, we consider the following example, which is a typical scenario of dynamic microgrid partition: There are
In this example, we can compute the message length of SDMGP in two steps. First, from the
At the same time, we can compute the message length of LKH in four steps. First, when one SM requests for leaving, the MDMS needs to broadcast
Finally, we can get
Conclusion
In this article, we have identified features for dynamic microgrid partition in SG and defined several evaluation vectors. Moreover, we have proposed a new protocol named SDMGP, which satisfies a set of important requirements that have not been addressed by previous works. The security analysis and experimental results show that SDMGP is feasible for real-world applications.
