Secure communication mechanism for ubiquitous Smart grid infrastructure

Smart grid and advanced metering infrastructure (AMI) technologies have recently been the focus of rapid advancement and significant investment by many utilities and other service providers. For proper Smart grid deployment, smart energy home area network (HAN) must deploy smart meter along with other utility HAN devices and customer HAN devices. Energy service interface (ESI) is deployed as a HAN gateway which can provide two-way communications between HAN devices and utilities or service providers. However, in order to meet the envisioned functional, reliability, and scalability requirements of the Smart grid, cyber security must no longer be neglected. Thus, the development of a comprehensive security mechanism for AMI network is predominantly essential. A remote access to HAN devices may be required for either the customer that using his ubiquitous mobile device at the remote site or maintenance personals (either from utilities or service providers) those using handheld devices, which must be done securely. In this paper, we propose a security mechanism for remote access to HAN networks which is comprised of a lightweight and effective ECC-based entity authentication mechanism and ECC-based digital signature scheme. ECC-based entity authentication mechanism allows ESI as a gatekeeper to monitor the authentication process between two communicating entities. With a modified ECC-based digital signature scheme, secure data transfer between mobile devices and HAN devices has occurred. We have conducted security analysis, efficiency analysis as well as formal verification of the proposed mechanism.

[1]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[2]  Annabelle Lee,et al.  Guidelines for Smart Grid Cyber Security , 2010 .

[3]  Jean-Louis Lanet,et al.  Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings , 2010, CARDIS.

[4]  F.M. Cleveland,et al.  Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[5]  Rob Shein Security Measures for Advanced Metering Infrastructure Components , 2010, 2010 Asia-Pacific Power and Energy Engineering Conference.

[6]  Johannes Wolkerstorfer,et al.  Coupon Recalculation for the GPS Authentication Scheme , 2008, CARDIS.

[7]  Christoph Sorge,et al.  A Privacy Model for Smart Metering , 2010, 2010 IEEE International Conference on Communications Workshops.

[8]  Paul C. van Oorschot,et al.  Extending cryptographic logics of belief to key agreement protocols , 1993, CCS '93.

[9]  Lingfeng Wang,et al.  Smart meters for power grid — Challenges, issues, advantages and status , 2011 .

[10]  Dmitry Podkuiko,et al.  Multi-vendor penetration testing in the advanced metering infrastructure , 2010, ACSAC '10.

[11]  Jacques Stern,et al.  On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order , 2006, Journal of Cryptology.

[12]  Alfred Menezes,et al.  The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..

[13]  S. Karnouskos,et al.  Smart Houses for a Smart Grid , 2009 .

[14]  Sitaraman Lakshminarayanan Authentication and authorization for Smart Grid application interfaces , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.

[15]  Nei Kato,et al.  Towards a light-weight message authentication mechanism tailored for Smart Grid communications , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[16]  Yu-Fang Chung,et al.  ID-based digital signature scheme on the elliptic curve cryptosystem , 2007, Comput. Stand. Interfaces.

[17]  Lingfeng Wang,et al.  Support vector machine based data classification for detection of electricity theft , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.

[18]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[19]  Conversion and delivery of electrical energy in the 21st century , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[20]  Lingfeng Wang,et al.  Smart meters for power grid — Challenges, issues, advantages and status , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.

[21]  Mark R. Tuttle,et al.  A Semantics for a Logic of Authentication , 1991, PODC 1991.

[22]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[23]  Aggelos Kiayias,et al.  BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..

[24]  Dimitrios Makrakis,et al.  Device authentication mechanism for Smart Energy Home Area Networks , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).

[25]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.

[26]  Martín Abadi,et al.  A semantics for a logic of authentication (extended abstract) , 1991, PODC '91.

[27]  Paul F. Syverson,et al.  On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[28]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[29]  Hamid Sharif,et al.  A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid , 2011, 2011 IEEE Wireless Communications and Networking Conference.