An efficient security protocol for advanced metering infrastructure in smart grid

In this article, we present a security protocol for advanced metering infrastructure in smart grid. We consider various security vulnerabilities of deploying AMI, and explore the issues related to confidentiality for user privacy and behavior as well as message authentication for meter reading and control messages. After surveying the existing security solutions in this area, we propose a new protocol, Integrated Authentication and Confidentiality (IAC), to provide efficient secure AMI communications in smart grid. With the help of IAC, an AMI system can provide trust services, data privacy, and integrity by mutual authentications whenever a new smart meter initiates and joins the smart grid AMI network. Data integrity and confidentiality are fulfilled through message authentication and encryption services, using the corresponding keys established in mutual authentications. Simulation and analytical results show that the proposed IAC protocol has better performance in terms of end-to-end delay and packet loss than a basic security scheme. Additionally, it can also facilitate efficient secure data collection and control message delivery between smart meters and a local collector for AMI communications in a smart grid.

[1]  Conversion and delivery of electrical energy in the 21st century , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[2]  Mariana Hentea,et al.  Smart power grid security: A unified risk management approach , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.

[3]  Sridhar Rajagopal,et al.  Secure, intuitive and low-cost device authentication for Smart Grid networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[4]  A.F. Snyder,et al.  The ANSI C12 protocol suite - updated and now with network capabilities , 2007, 2007 Power Systems Conference: Advanced Metering, Protection, Control, Communication, and Distributed Resources.

[5]  P. Kyberd,et al.  Distributed monitoring and control of future power systems via grid computing , 2006, 2006 IEEE Power Engineering Society General Meeting.

[6]  Hamid Sharif,et al.  A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[7]  Georgios Kalogridis,et al.  Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[8]  Mahesh Sooriyabandara,et al.  Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities , 2011, IEEE Communications Surveys & Tutorials.

[9]  Sugwon Hong,et al.  Experiments for Embedded Protection Device for Secure SCADA Communication , 2010, 2010 Asia-Pacific Power and Energy Engineering Conference.

[10]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[11]  Rakesh Bobba,et al.  Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[12]  Lin Wang,et al.  Computer network security management and authentication of smart grids operations , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[13]  Hamid Sharif,et al.  A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.

[14]  Nader Moayeri,et al.  Backbone Construction for Heterogeneous Wireless Ad Hoc Networks , 2009, 2009 IEEE International Conference on Communications.

[15]  Stephen B. Wicker,et al.  A Privacy-Aware Architecture for Demand Response Systems , 2011, 2011 44th Hawaii International Conference on System Sciences.