Securing dynamic microgrid partition in the smart grid

Message authentication has vital significance for dynamic microgrid partition in smart grid. However, current message authentication protocols based on “public key infrastructure” are too complicated to be deployed in smart grid and lack group information management function. On the other hand, group information management protocols based on “logic key hierarchy” need to broadcast a lot of messages during microgrid partition processes, resulting in high communication costs. To address these issues, we present a novel identity-based message authentication protocol for dynamic microgrid partition called securing dynamic microgrid partition. Similar to the protocols of this field, securing dynamic microgrid partition can provide message authentication and group information management functions. However, compared to other well-known approaches, securing dynamic microgrid partition uses Bloom filter for managing group information, which can reduce the communication cost of logic key hierarchy significantly. Moreover, securing dynamic microgrid partition uses Lagrange interpolation for designing new identity-based signing and verification algorithms, which is simple to be deployed in smart grid environment and much more efficient than current identity-based protocols. Experimental results show that the proposed approach is feasible for real-world applications.

[1]  Yi Qian,et al.  An advanced key management scheme for secure smart grid communications , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[2]  Ran Canetti,et al.  Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction , 2005, RFC.

[3]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[4]  F. B. Hildebrand,et al.  Introduction To Numerical Analysis , 1957 .

[5]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[6]  Lin Zhu,et al.  A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid , 2013, IEEE Trans. Ind. Electron..

[7]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[8]  Weidong Kou,et al.  Efficient ID-based Signature Without Trusted PKG , 2007, IACR Cryptol. ePrint Arch..

[9]  Yacine Challal,et al.  eSKAMI: Efficient and Scalable Multi-group Key Management for Advanced Metering Infrastructure in Smart Grid , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[10]  Identity Based Cryptography for Smart-grid Protection , 2015 .

[11]  Shenxing Shi,et al.  SKM: Scalable Key Management for Advanced Metering Infrastructure in Smart Grids , 2014, IEEE Transactions on Industrial Electronics.

[12]  Nei Kato,et al.  A Lightweight Message Authentication Scheme for Smart Grid Communications , 2011, IEEE Transactions on Smart Grid.

[13]  Attila Altay Yavuz,et al.  An Efficient Real-Time Broadcast Authentication Scheme for Command and Control Messages , 2014, IEEE Transactions on Information Forensics and Security.

[14]  Dapeng Wu,et al.  Fault-Tolerant and Scalable Key Management for Smart Grid , 2011, IEEE Transactions on Smart Grid.

[15]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[16]  Victor C. M. Leung,et al.  Efficient Authentication and Key Management Mechanisms for Smart Grid Communications , 2014, IEEE Systems Journal.

[17]  Mohammad Hossein Yaghmaee,et al.  A LIGHTWEIGHT MECHANISM FOR MUTUAL AUTHENTICATION IN SMART GRID , 2014 .

[18]  Hamid Sharif,et al.  A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[19]  Nei Kato,et al.  Towards a light-weight message authentication mechanism tailored for Smart Grid communications , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[20]  Peter E. Yee Updates to the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2013, RFC.

[21]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[22]  Victor C. M. Leung,et al.  Smart grid authentication and key management for unicast and multicast communications , 2011, 2011 IEEE PES Innovative Smart Grid Technologies.

[23]  Xinyu Yang,et al.  On false data injection attacks against the dynamic microgrid partition in the smart grid , 2015, 2015 IEEE International Conference on Communications (ICC).

[25]  Elisa Bertino,et al.  Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[26]  Edmund Y. Lam,et al.  Zero-Configuration Identity-Based Signcryption Scheme for Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[27]  Leonid Reyzin,et al.  Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying , 2002, ACISP.

[28]  Laurence T. Yang,et al.  Aggregated-Proofs Based Privacy-Preserving Authentication for V2G Networks in the Smart Grid , 2012, IEEE Transactions on Smart Grid.

[29]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[30]  Qinghua Li,et al.  Multicast Authentication in the Smart Grid With One-Time Signature , 2011, IEEE Transactions on Smart Grid.

[31]  Sherali Zeadally,et al.  Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy , 2014, IEEE Transactions on Information Forensics and Security.

[32]  Mikhail Simonov Dynamic Partitioning of DC Microgrid in Resilient Clusters Using Event-Driven Approach , 2014, IEEE Transactions on Smart Grid.

[33]  Siddharth Sridhar,et al.  Cyber-Physical System Security for the Electric Power Grid Controlinpowersystemsthatmaybevulnerabletosecurityattacksisdiscussedinthis paper as are control loop vulnerabilities, potential impact of disturbances, and several mitigations. , 2012 .

[34]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[35]  Craig Gentry,et al.  Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.