The environments in which current electric grids operate as well as the requirements for the emerging smart grid differ substantially from those of today's Internet and telecommunication networks. For example, typical electric or gas meters in the advanced metering infrastructure (AMI) are low-power, low-capability wireless devices utilizing personal area wireless network technology (e.g., IEEE 802.15.4). These devices are low-cost, typically with 4-12 kbytes of RAM and 64-256 kbytes of flash memory, and are often connected to the backhaul via low-bandwidth links. Comparing this to the high-powered, high-capability devices of the Internet with gigabytes of RAM and storage, the differences are striking. Security solutions designed for capability-rich Internet devices will not be suitable for the capability-poor devices of the smart grid; thus, new requirements are needed that can efficiently operate in resource constrained devices. With this operating environment in mind, we present a smart grid key management framework with application to AMI networks. Specifically, we describe how this key management model can be realized in such a resource-constrained environment using existing standard protocols and provide preliminary performance results.
[1]
Charlie Kaufman,et al.
Internet Key Exchange (IKEv2) Protocol
,
2005,
RFC.
[2]
Leif Johansson,et al.
Dynamic Security Assertion Markup Language: Simplifying Single Sign-On
,
2008,
IEEE Security & Privacy.
[3]
Larry J. Blunk,et al.
PPP Extensible Authentication Protocol (EAP)
,
1998,
RFC.
[4]
Seung-Hun Jin,et al.
The Security Limitations of SSO in OpenID
,
2008,
2008 10th International Conference on Advanced Communication Technology.
[5]
Thomas Groß,et al.
Security analysis of the SAML single sign-on browser/artifact profile
,
2003,
19th Annual Computer Security Applications Conference, 2003. Proceedings..
[6]
Vidya Narayanan,et al.
Specification for the Derivation of Root Keys from an Extended Master Session Key (EMSK)
,
2008,
RFC.
[7]
Dan Simon,et al.
Extensible Authentication Protocol (eap) Key Management Framework
,
2007
.
[8]
Dan Forsberg,et al.
Protocol for Carrying Authentication for Network Access (PANA)
,
2008,
RFC.