Efficient and Fault-Diagnosable Authentication Scheme for Advanced Metering Infrastructure

The recently emerging Advanced Metering Infrastructure (AMI) is envisioned to be one of the most prominent features of the smart grid. Security, especially authentication, is crucial for the success of large-scale AMI deployment. Unfortunately, AMI’s natural requirements — efficiency, scalability, fault-diagnoses and reliability — cannot be fully satisfied by existing authentication schemes: per-packet signing and per-signature verification public key schemes, onetime signatures, or pairwise key-based symmetric encryption algorithms. In this paper, we propose new authentication architecture for AMI to validate the delay-tolerant metering data. We propose not only a set of efficient authentication schemes, but more importantly, their corresponding faultdiagnoses algorithms. We implement our system on emulated smart meters and commodity servers. Experiment results on simulated real-world scenarios demonstrate the practicability of our proposed system. It merely incurs substantially lighter overheads than those by the existing schemes, while it can effectively address the formidable authentication challenges in AMI. Index Terms —Authentication, digital signature, fault tolerance, fault diagnosis, smart grids, verification.

[1]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.

[2]  Qinghua Li,et al.  Multicast Authentication in the Smart Grid With , 2011 .

[3]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1999, TNET.

[4]  Ken Choi,et al.  Enhanced Security Protocols for EPC Global Gen2 on Smart Grid Network , 2010, 2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications.

[5]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[6]  Edwin K. P. Chong,et al.  Efficient multicast stream authentication using erasure codes , 2003, TSEC.

[7]  Miguel Soriano,et al.  Secure Lossless Aggregation Over Fading and Shadowing Channels for Smart Grid M2M Networks , 2011, IEEE Transactions on Smart Grid.

[8]  Robert E. Tarjan,et al.  Sensitivity Analysis of Minimum Spanning Trees and Shortest Path Trees , 1982, Inf. Process. Lett..

[9]  Leonid Reyzin,et al.  Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying , 2002, ACISP.

[10]  Nei Kato,et al.  A Lightweight Message Authentication Scheme for Smart Grid Communications , 2011, IEEE Transactions on Smart Grid.

[11]  Srinivas Sampalli,et al.  A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying , 2008, Int. J. Netw. Secur..

[12]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[13]  Edmund Y. Lam,et al.  Zero-Configuration Identity-Based Signcryption Scheme for Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[14]  Klara Nahrstedt,et al.  Time Valid One-Time Signature for Time-Critical Multicast Data Authentication , 2009, IEEE INFOCOM 2009.

[15]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[16]  Yongge Wang,et al.  Secure Key Distribution for the Smart Grid , 2012, IEEE Transactions on Smart Grid.

[17]  Dapeng Wu,et al.  Fault-Tolerant and Scalable Key Management for Smart Grid , 2011, IEEE Transactions on Smart Grid.

[18]  John R. Williams,et al.  Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).

[19]  John R. Williams,et al.  P3: Privacy preservation protocol for appliance control application , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[20]  Xuemin Shen,et al.  A Tree-Based Signature Scheme for VANETs , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[21]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[22]  Yuguang Fang,et al.  MABS: Multicast Authentication Based on Batch Signature , 2010, IEEE Transactions on Mobile Computing.

[23]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[24]  Maode Ma,et al.  UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications , 2011, IEEE Transactions on Smart Grid.