One-time symmetric key based cloud supported secure smart meter reading

With wide deployments of Smart Grid systems, a large amount of energy usage and grid status data have been collected by smart meters. To secure those critical and sensitive data, it is crucial to prevent unauthorized readings to smart meters. Many authentication protocols have been proposed to control the access to the smart meters that are a part of Smart Grid data communication network, but authentication protocols to control readings to the isolated smart meters are mostly ignored. In this paper, we design a one-time symmetric key based cloud supported protocol to enable secure data reading from the isolated smart meters. The protocol mainly consists of two steps. First, an asymmetric key based authentication is designed for the reader-cloud authentication. Then, the cloud assists the meter reader to generate a new one-time symmetric key which is shared with the smart meter. Second, a symmetric key based authentication is designed for the reader-meter authentication. Security analysis shows that our protocol is reliable under most typical attacks.

[1]  Elisa Bertino,et al.  Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[2]  Qinghua Li,et al.  Multicast Authentication in the Smart Grid With One-Time Signature , 2011, IEEE Transactions on Smart Grid.

[3]  Rakesh Bobba,et al.  Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[4]  Xi Fang,et al.  3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .

[5]  Naima Kaabouch,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[6]  Xiaohui Liang,et al.  Securing smart grid: cyber attacks, countermeasures, and challenges , 2012, IEEE Communications Magazine.

[7]  Edmund Y. Lam,et al.  Zero-Configuration Identity-Based Signcryption Scheme for Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[8]  Mani B. Srivastava,et al.  Challenges in resource monitoring for residential spaces , 2009, BuildSys '09.

[9]  Prashant J. Shenoy,et al.  Private memoirs of a smart meter , 2010, BuildSys '10.

[10]  Alan Marchiori,et al.  Using circuit-level power measurements in household energy management systems , 2009, BuildSys '09.

[11]  Nei Kato,et al.  A Lightweight Message Authentication Scheme for Smart Grid Communications , 2011, IEEE Transactions on Smart Grid.

[12]  Wenyuan Xu,et al.  Neighborhood watch: security and privacy analysis of automatic meter reading systems , 2012, CCS.

[13]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[14]  Klara Nahrstedt,et al.  SCAPACH: Scalable Password-Changing Protocol for Smart Grid Device Authentication , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).

[15]  Jianfeng Ma,et al.  Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems , 2012, Int. J. Distributed Sens. Networks.

[16]  Wenye Wang,et al.  Review and evaluation of security threats on the communication networks in the smart grid , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.