Hardware-based novel authentication scheme for advanced metering infrastructure

Security issues pertaining to Advanced Metering Infrastructure (AMI) system has been a major concern since the advent of the smart grid. In this paper, a novel authentication and key management scheme is proposed for AMI system based on Configurable Ring Oscillator Physically Unclonable Functions (RO PUFs). The scheme provides end-to-end security for the confidentiality and integrity of messages exchanged between utility centers and smart meters. The design is compatible with existing AMI technology and can be implemented on smart meters as PUFs on FPGAs or ASICs. To demonstrate the proof of concept, the proposed scheme is implemented on Xilinx Spartan 3E FPGA boards. The performance of the scheme is measured in terms of storage requirement and authentication time. In addition, a threat model analysis is performed to validate the design against modeling attacks and common wireless sensor network attacks.

[1]  Nei Kato,et al.  A Lightweight Message Authentication Scheme for Smart Grid Communications , 2011, IEEE Transactions on Smart Grid.

[2]  Mansoor Alam,et al.  Hardware-Oriented Authentication for Advanced Metering Infrastructure , 2018, IEEE Transactions on Smart Grid.

[3]  Wei Wang,et al.  Attack Model Research on Node Localization Systems of Wireless Sensor Networks , 2010, 2010 International Conference on Internet Technology and Applications.

[4]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[5]  Mohammed Y. Niamat,et al.  Temperature, Voltage, and Aging Effects in Ring Oscillator Physical Unclonable Function , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[6]  Elisa Bertino,et al.  Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[7]  Jan Zibuschka,et al.  Securing systems on the Internet of Things via physical properties of devices and communications , 2015, 2015 Annual IEEE Systems Conference (SysCon) Proceedings.

[8]  Che Wun Chiou,et al.  Speeding up Euclid's GCD algorithm with no magnitude comparisons , 2010, Int. J. Inf. Comput. Secur..

[9]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[10]  Marten van Dijk,et al.  A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).

[11]  Xuemin Shen,et al.  An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid , 2014, IEEE Systems Journal.

[12]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[13]  Roel Maes,et al.  Physically Unclonable Functions , 2012, Springer Berlin Heidelberg.

[14]  Srinivas Devadas,et al.  Silicon physical random functions , 2002, CCS '02.

[15]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[16]  Lin Zhu,et al.  A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid , 2013, IEEE Trans. Ind. Electron..

[17]  Rakesh Bobba,et al.  Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[18]  Carsten Rudolph,et al.  Interoperable device identification in Smart-Grid environments , 2011, 2011 IEEE Power and Energy Society General Meeting.

[19]  Victor C. M. Leung,et al.  Smart grid authentication and key management for unicast and multicast communications , 2011, 2011 IEEE PES Innovative Smart Grid Technologies.

[20]  Srinivas Devadas,et al.  Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.

[21]  Conor Ryan,et al.  Handbook of Genetic Programming Applications , 2015, Springer International Publishing.

[22]  Jorge Guajardo,et al.  FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.

[23]  Naima Kaabouch,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[24]  Ayman I. Kayssi,et al.  PUF and ID-based key distribution security framework for advanced metering infrastructures , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).