A secured access control architecture consideration for PLC based smart grids

Power supply, distribution and generation industry is now turning the existing electrical grids to smart grids, thus making them more efficient in both effective power management and reliability, reduced production costs, and more environmentally friendly energy generation. Despite its attractive features, Smart Grid technology remains vulnerable to security threats. This paper summaries some of these potential security issues by exploring a data access control mechanism that ensures privacy to customers. The proposed access control mechanism gives selective access to consumer data stored in data repositories and used by different smart grid users. A n attribute-based encryption (ABE) is suggested. The entire grid network is subdivided into clusters each with its own remote terminal unit (RTU) as well as a gateway smart meter. User data in a given cluster is aggregated and sent to the local substation where it is monitored by the RTU. RTUs and users have attributes and cryptographic keys distributed by several key distribution centers (KDC). RTUs send data encrypted under a set of attributes. Users can decrypt information provided they have valid attributes. The access control scheme is quite resilient because of its b e i n g distributed in nature and does not rely on a single KDC to distribute keys. The encryption algorithm is based on Diffie-Hellman key establishment protocol and hash-based message authentication code, which allows smart meters at different clusters of the smart grid to mutually authenticate prior to data/information exchange and in the process maintaining low latency as well as relatively fewer authentication associated messages . Overall the control scheme is relatively collusion resistant.

[1]  Ling Cheung,et al.  Provably secure ciphertext policy ABE , 2007, CCS '07.

[2]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  Cong Wang,et al.  Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.

[5]  Sherman S. M. Chow,et al.  Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.

[6]  John R. Williams,et al.  No peeking: privacy-preserving demand response system in smart grids , 2014, Int. J. Parallel Emergent Distributed Syst..

[7]  Jun Wang,et al.  Smart grid technologies , 2009, IEEE Industrial Electronics Magazine.

[8]  Melissa Chase,et al.  Multi-authority Attribute Based Encryption , 2007, TCC.

[9]  Yi Xu,et al.  A survey on the communication architectures in smart grid , 2011, Comput. Networks.

[10]  Ivan Stojmenovic,et al.  A Security Architecture for Data Aggregation and Access Control in Smart Grids , 2011, ArXiv.

[11]  Guang Gong,et al.  Security Challenges in Smart-Grid Metering and Control Systems , 2013 .

[12]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[13]  Taskin Koçak,et al.  Smart Grid Technologies: Communication Technologies and Standards , 2011, IEEE Transactions on Industrial Informatics.

[14]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.