Yahya, KhalidChaudhry, Shehzad AshrafAl-Turjman, Fadi2024-09-112024-09-112020978-166541962-8https://doi.org/10.1109/ETCCE51779.2020.9350916https://hdl.handle.net/11363/86062020 International Conference on Emerging Technology in Computing, Communication and Electronics, ETCCE 2020 -- 21 December 2020 through 22 December 2020 -- Virtual, Dhaka -- 167272Recently, in 2019, Kumar et al. (IEEE Transactions on Smart Grid 10.4 (2018): 4349-4359) proposed an ECC based lightweight authentication and Key agreement scheme (LAKA) to secure the communication among a smart meter (SM) and a neighbourhood area network (NAN) gateway. The LAKA scheme was proved as secure and efficient as per the comparisons performed by Kumar et al. Specifically, it was argued through security analysis that LAKA provides anonymity and resistance to related attacks. However, the specific analysis in this paper contradicts their claim and it is shown here that in addition to ephemeral secret leakage attack and lack of untraceability, the LAKA is also vulnerable to stolen verifier attack. © 2020 IEEE.eninfo:eu-repo/semantics/closedAccessEphemeral Secret Leakage attack; Smart City Security; Smart Grid Authentication; Smart HomeOn the Security of an Authentication Scheme for Smart Metering InfrastructureConference Object10.1109/ETCCE51779.2020.93509162-s2.0-85102068900N/A