In this paper, in order to simultaneously resolve the transmission security and availability in Supervisory Control And Data Acquisition (SCADA) group communications, we propose a robust and efficient group key management scheme, called LiSH+, which is characterized by developing a secure self-healing mechanism with t-revocation and collusion resistance capability. A dual direction hash chain is utilized to guarantee the backward secrecy and forward secrecy of group key. A novel self-healing mechanism is constructed to ensure availability of the group member in case of devices failure and prevent the collusive users from exploiting the group key in the proposed scheme. In addition, the compromised users can be revoked from the group dynamically by broadcasting message. Detailed security analysis shows that the proposed LiSH+ scheme meets the requirements of group communication and is secure in terms of t user collusion-free. Performance evaluation also demonstrates its efficiency in terms of low storage requirement and communication overheads. Copyright its reliability. In smart grid, due to the widely used bidirectional communications, data collected from different part of power grid can be shared promptly among various departments. Many new applications, such as real-time electricity price, can be implemented to facilitate the control of power delivery and distribution. Thus, smart grid has attracted great attention not only from government but also from the industry and academia for its high fidelity powerflow control, self-healing, energy reliability, and energy security [5,6].According to the conceptual model of National Institute for Standards and Technology (NIST), four main components, that is, generation, transmission, distribution, and customer, feature two-way power and information flows in smart grid. Supervisory Control And Data Acquisition (SCADA) systems are used to monitor and control sensitive processes and physical functions in the electricity distribution, transmission, and generation environments, as shown in Figure 1. In order to monitor and control