A Survey on Cryptography Key Management Schemes for Smart Grid

A Smart grid is a modern electricity delivery system. It is an integration of energy systems and other necessary elements including traditional upgrades and new grid technologies with renewable generation and increased consumer storage. It uses information and communication technology (ICT) to operate, monitor and control data between the generation source and the end user. Smart grids have duplex power flow and communication to achieve high efficiency, reliability, environmental, economics, security and safety standards. However, along with unique facilities, smart grids face security challenges such as access control, connectivity, fault tolerance, privacy, and other security issues. Cyber-attacks, in the recent past, on critical infrastructure including smart grids have highlighted security as a major requirement for smart grids. Therefore, cryptography and key management are necessary for smart grids to become secure and realizable. Key management schemes are processes of key organizational frameworks, distribution, generation, refresh and key storage policies. Currently, several secure schemes, related to key management for smart grid have been proposed to achieve end-to-end secure communication. This paper presents a comprehensive survey and discussion on the current state of the key management of smart grids.

[1]  S. Sitharama Iyengar,et al.  Distributed Sensor Networks, Second Edition: Sensor Networking and Applications , 2012 .

[2]  F. Bouhafs,et al.  Links to the Future: Communication Requirements and Challenges in the Smart Grid , 2012, IEEE Power and Energy Magazine.

[3]  Cheryl L. Beaver,et al.  Key Management for SCADA , 2002 .

[4]  Fadi A. Aloul,et al.  Smart Grid Security: Threats, Vulnerabilities and Solutions , 2012 .

[5]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[6]  Dongho Won,et al.  Advanced Key-Management Architecture for Secure SCADA Communications , 2009, IEEE Transactions on Power Delivery.

[7]  Leopoldo A. Gemoets,et al.  A literature survey on Smart Grid distribution: an analytical approach , 2014 .

[8]  Marco Conti,et al.  The role of communication systems in smart grids: Architectures, technical solutions and research challenges , 2013, Comput. Commun..

[9]  Zhuo Lu,et al.  Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming , 2012, 2012 Proceedings IEEE INFOCOM.

[10]  S. Sitharama Iyengar,et al.  Distributed Sensor Networks , 2004 .

[11]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[12]  Dapeng Wu,et al.  Fault-Tolerant and Scalable Key Management for Smart Grid , 2011, IEEE Transactions on Smart Grid.

[13]  John Fuller,et al.  Light-weight key distribution and management for Advanced Metering Infrastructure , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[14]  Ali Dehghantanha,et al.  Towards secure model for SCADA systems , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[15]  Yang Xiao,et al.  A survey of communication/networking in Smart Grids , 2012, Future Gener. Comput. Syst..

[16]  Hyoung-Kee Choi,et al.  An efficient and versatile key management protocol for secure smart grid communications , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[17]  Yi Qian,et al.  An advanced key management scheme for secure smart grid communications , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[18]  David J. Teumim,et al.  Industrial Network Security , 2004 .

[19]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[20]  Naima Kaabouch,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[21]  Yue Li,et al.  Design of a Key Establishment Protocol for Smart Home Energy Management System , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.

[22]  Hamid R. Nemati,et al.  Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering , 2010 .

[23]  Wenxia Liu,et al.  A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid , 2013, IEEE Transactions on Industrial Electronics.

[24]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[25]  P. Steimer Enabled by high power electronics - Energy efficiency, renewables and smart grids , 2010, The 2010 International Power Electronics Conference - ECCE ASIA -.

[26]  Sherali Zeadally,et al.  Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy , 2014, IEEE Transactions on Information Forensics and Security.

[27]  Kenneth C. Budka,et al.  Smart Grid Applications , 2014 .

[28]  Eric D. Knapp,et al.  Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems , 2011 .

[29]  Elisa Bertino,et al.  Encryption key management for secure communication in smart advanced metering infrastructures , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[30]  Xuemin Shen,et al.  PARK: A privacy-preserving aggregation scheme with adaptive key management for smart grid , 2013, 2013 IEEE/CIC International Conference on Communications in China (ICCC).

[31]  Lin Zhu,et al.  A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid , 2013, IEEE Trans. Ind. Electron..

[32]  Victor C. M. Leung,et al.  Smart grid authentication and key management for unicast and multicast communications , 2011, 2011 IEEE PES Innovative Smart Grid Technologies.

[33]  F. Rahimi,et al.  Overview of Demand Response under the Smart Grid and Market paradigms , 2010, 2010 Innovative Smart Grid Technologies (ISGT).

[34]  Husheng Li,et al.  A denial-of-service jamming game for remote state monitoring in smart grid , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[35]  Liu Hao,et al.  Information security requirements and challenges in smart grid , 2011, 2011 6th IEEE Joint International Information Technology and Artificial Intelligence Conference.

[36]  Quanyan Zhu,et al.  SELINDA: A secure, scalable and light-weight data collection protocol for smart grids , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[37]  Krzysztof Iniewski,et al.  Smart Grid Applications, Communications, and Security , 2012 .

[38]  Sajal K. Das,et al.  A key management framework for AMI networks in smart grid , 2012, IEEE Communications Magazine.

[39]  John R. Williams,et al.  No peeking: privacy-preserving demand response system in smart grids , 2014, Int. J. Parallel Emergent Distributed Syst..

[40]  Eric D. Knapp,et al.  What is the Smart Grid , 2013 .

[41]  Bilal Shahid,et al.  Implementation of smart system based on smart grid Smart Meter and smart appliances , 2012, Iranian Conference on Smart Grids.

[42]  Dongho Won,et al.  Efficient Secure Group Communications for SCADA , 2010, IEEE Transactions on Power Delivery.

[43]  Joseph W. Weiss,et al.  Protecting Industrial Control Systems from Electronic Threats , 2010 .

[44]  Syed Islam,et al.  Home Area Network technology assessment for demand response in smart grid environment , 2010, 2010 20th Australasian Universities Power Engineering Conference.

[45]  M. Z. A. Ab-Kadir,et al.  The present and future of smart power grid in developing countries , 2014 .

[46]  Xi Fang,et al.  3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .

[47]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[48]  Kemal Akkaya,et al.  A survey of routing protocols for smart grid communications , 2012, Comput. Networks.

[49]  Seungjoo Kim,et al.  An Efficient Key Management Scheme for Secure SCADA Communication , 2008 .

[50]  Marimuthu Palaniswami,et al.  WAKE: Key management scheme for wide-area measurement systems in smart grid , 2013, IEEE Communications Magazine.

[51]  Sushmita Ruj,et al.  A Decentralized Security Framework for Data Aggregation and Access Control in Smart Grids , 2013, IEEE Transactions on Smart Grid.

[52]  Federica Mangiatordi,et al.  Smart grid cyber security requirements , 2011, 2011 10th International Conference on Environment and Electrical Engineering.

[53]  Sherali Zeadally,et al.  Key management solutions in the smart grid environment , 2013, 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC).

[54]  B. Mohamed,et al.  Security solution for semantic SCADA optimized by ECC mixed coordinates , 2012, 2012 International Conference on Information Technology and e-Services.

[55]  Martin Gilje Jaatun,et al.  Cyber security challenges in Smart Grids , 2011, 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies.

[56]  Srinivas Devadas,et al.  Silicon physical random functions , 2002, CCS '02.

[57]  Athar Mahboob,et al.  Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies , 2011 .

[58]  Zhu Han,et al.  Smart grid sensor data collection, communication, and networking: a tutorial , 2014, Wirel. Commun. Mob. Comput..

[59]  Elisa Bertino,et al.  Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[60]  Nasir El Bassam,et al.  Distributed Renewable Energies for Off-Grid Communities: Strategies and Technologies toward Achieving Sustainability in Energy Generation and Supply , 2012 .

[61]  John Fuller,et al.  Key Distribution and management for power aggregation and accountability in Advance Metering Infrastructure , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[62]  S. Massoud Amin,et al.  Smart Grid: Overview, Issues and Opportunities. Advances and Challenges in Sensing, Modeling, Simulation, Optimization and Control , 2011, Eur. J. Control.

[63]  Magdy M. A. Salama,et al.  Smart distribution system volt/VAR control using distributed intelligence and wireless communication , 2015 .

[64]  Ben Smyth,et al.  Secure authenticated key exchange with revocation for smart grid , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).

[65]  Victor C. M. Leung,et al.  Password-authenticated cluster-based group key agreement for smart grid communication , 2014, Secur. Commun. Networks.

[66]  Victor C. M. Leung,et al.  Efficient Authentication and Key Management Mechanisms for Smart Grid Communications , 2014, IEEE Systems Journal.

[67]  Mark Stamp,et al.  Handbook of Information and Communication Security , 2010, Handbook of Information and Communication Security.

[68]  Sandip C. Patel,et al.  Securing SCADA systems , 2008, Inf. Manag. Comput. Secur..

[69]  Tony Flick,et al.  Securing the Smart Grid: Next Generation Power Grid Security , 2010 .

[70]  John Hastings,et al.  Securing the smart grid , 2014, 2014 49th International Universities Power Engineering Conference (UPEC).

[71]  Huei-Ru Tseng,et al.  A secure and privacy-preserving communication protocol for V2G networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[72]  Wolfgang Kastner,et al.  Access control for a Smart Grid SOA , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[73]  Nengling Tai,et al.  Wide-area Protection Research in the Smart Grid , 2012 .

[74]  Krzysztof Iniewski Convergence of Mobile and Stationary Next-Generation Networks: Iniewski/Next Generation Networks , 2010 .

[75]  Lingfeng Wang,et al.  Smart meters for power grid — Challenges, issues, advantages and status , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.