Securing RDS broadcast messages for smart grid applications

Efforts to reduce peak electrical demand have led to the introduction of demand response (DR) programmes for residences. DR programmes allow customers to reduce or shift consumption to off-peak periods in response to price signals. The RDS network is a strong candidate for delivering DR messages due to its low-cost nature and ubiquitous coverage. However, security concerns arise due to the wireless nature of the communication channel. We present evaluations of three candidate cryptographic methods that could be employed to offer source authentication over the RDS network: BiBa, HORSE and elliptic curve digital signature algorithm (ECDSA). We compare the security offered by the protocols, the bandwidth overhead, computational costs and message reception probability. Simulation results show that, up to a distance of 90 km, all authentication schemes do not affect message reception by the receivers. Beyond that, all the schemes have an effect on message reception due to increased message sizes and receiver bootstrapping for BiBa and HORSE. ECDSA and HORSE outperform BiBa in terms of message reception beyond 90 km. ECDSA, however, offers higher security than HORSE and BiBa but at the cost of increased computational complexity, in particular, at the receivers. In addition, has the highest bandwidth overhead.

[1]  William D. Neumann HORSE: an extension of an r-time signature scheme with fast signing and verification , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[2]  Matthew Green,et al.  Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.

[3]  Adrian Perrig,et al.  The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.

[4]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[5]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[6]  Thomas Kunz,et al.  RF Fingerprints for Secure Authentication in Single-Hop WSN , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[7]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[8]  Mitsuru Matsui,et al.  A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer , 1998, Public Key Cryptography.

[9]  T. Mander,et al.  Communication Security Architecture for Smart Distribution System Operations , 2007, 2007 IEEE Canada Electrical Power Conference.

[10]  Michael Daucher,et al.  RDS-Radio Data System A Challenge and a Solution , 2008 .

[11]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[12]  Christof Paar,et al.  Cryptography in Embedded Systems : An Overview , 2003 .