Secure Self-healing Group Key Distribution Scheme with Constant Storage for SCADA Systems in Smart Grid

Smart grid has a great advantage over the traditional power grid and it is a critical condition in people’s daily life. The security of data communication in smart grid is important and needs to be efficiently guaranteed. The supervisory control and data acquisition (SCADA) systems is in charge of supervising the sensitive process. In SCADA systems, the secure communication between control center and remote terminal units can be achieved by the key distribution mechanism. However, the remote terminal units are resource-constrained and sometimes are not available so that they cannot receive the session key updating broadcast. Self-healing is an efficient mechanism to calculate missing session keys by using later broadcast messages. In this paper, we propose an efficient self-healing group key distribution scheme for SCADA systems. The security analysis illustrates that our scheme satisfy the basic security properties defined in security model. According to the performance evaluation from storage and communication cost viewpoints, the proposed scheme is efficient.

[1]  Robert H. Deng,et al.  Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks , 2009, ICICS.

[2]  Ying Wang,et al.  An ID-based broadcast encryption scheme for key distribution , 2005, IEEE Trans. Broadcast..

[3]  Matthew K. Franklin,et al.  Self-healing key distribution with revocation , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[4]  Ting Yuan,et al.  Self-Healing Key Distribution with Revocation and Collusion Resistance for Wireless Sensor Networks , 2008, 2008 International Multi-symposiums on Computer and Computational Sciences.

[5]  Tomasz Rams,et al.  A Survey of Group Key Distribution Schemes With Self-Healing Property , 2013, IEEE Communications Surveys & Tutorials.

[6]  Arjen K. Lenstra,et al.  Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.

[7]  Hua Guo,et al.  On the Security of a Self-Healing Group Key Distribution Scheme , 2016, Wirel. Pers. Commun..

[8]  Alfredo De Santis,et al.  Design of Self-Healing Key Distribution Schemes , 2004, Des. Codes Cryptogr..

[9]  Germán Sáez On Threshold Self-healing Key Distribution Schemes , 2005, IMACC.

[10]  Sourav Mukhopadhyay,et al.  Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network , 2007 .

[11]  Jiankun Hu,et al.  An Efficient Self-Healing Key Distribution Scheme with Constant-Size Personal Keys for Wireless Sensor Networks , 2010, 2010 IEEE International Conference on Communications.

[12]  Song Han,et al.  Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks , 2009, IEEE Transactions on Wireless Communications.

[13]  Ju-Sung Kang,et al.  An efficient key distribution scheme with self-healing property , 2005, IEEE Communications Letters.

[14]  Weizhe Zhang,et al.  Anti-collusive Self-healing Key Distribution Scheme with Revocation Capability , 2009 .

[15]  Tharam S. Dillon,et al.  A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[16]  Tomasz Rams,et al.  Long-Lived Self-Healing Group Key Distribution Scheme with Backward Secrecy , 2013, 2013 Conference on Networked Systems.

[17]  Xuemin Shen,et al.  Self-healing group key distribution with time-limited node revocation for wireless sensor networks , 2007, Ad hoc networks.

[18]  Donggang Liu,et al.  Efficient self-healing group key distribution with revocation capability , 2003, CCS '03.

[19]  Xuemin Shen,et al.  Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid , 2015, Secur. Commun. Networks.

[20]  Yuan-Shun Dai,et al.  A Robust and Stateless Self-Healing Group Key Management Scheme , 2006, 2006 International Conference on Communication Technology.

[21]  Jie Gu,et al.  An Efficient Self-Healing Key Distribution with Resistance to the Collusion Attack for Wireless Sensor Networks , 2010, 2010 IEEE International Conference on Communications.

[22]  Tharam S. Dillon,et al.  An Efficient Self-Healing Key Distribution Scheme , 2008, 2008 New Technologies, Mobility and Security.

[23]  Jessica Staddon,et al.  Sliding-window self-healing key distribution , 2003, SSRS '03.

[24]  Yasin Kabalci On the Nakagami-m Inverse Cumulative Distribution Function: Closed-Form Expression and Its Optimization by Backtracking Search Optimization Algorithm , 2016, Wirel. Pers. Commun..

[25]  Sourav Mukhopadhyay,et al.  Computationally secure self-healing key distribution with revocation in wireless ad hoc networks , 2010, Ad Hoc Networks.

[26]  Chen-Ching Liu,et al.  Risk Analysis of Coordinated Cyber Attacks on Power Grid , 2012 .

[27]  Mingxing He,et al.  Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network , 2008, Web Information System and Application Conference.

[28]  Sourav Mukhopadhyay,et al.  Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains , 2007, ACNS.