Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System

Modern power grid is the most complex human-made system, which is monitored by wide-area monitoring system (WAMS). Providing time-synchronized data of power system operating states, WAMS will play a crucial role in next generation smart grid protection and control. WAMS helps secure efficient energy transmission as well as reliable and optimal grid management. As the key enabler of a smart grid, numerous sensors such as PMU and current sensors transmit real-time dynamic data, which is usually protected by encryption algorithm from malicious attacks, over wide-area-network (WAN) to power system control centers so that monitoring and control of the whole system is possible. Security algorithms for power grid need to consider both performance and energy efficiency through code optimization techniques on encryption and decryption. In this paper, we take power nodes (sites) as platforms to experimentally study ways of energy consumptions in different security algorithms. First, we measure energy consumptions of various security algorithms on CrossBow and Ember sensor nodes. Second, we propose an array of novel code optimization methods to increase energy consumption efficiency of different security algorithms. Finally, based on careful analysis of measurement results, we propose a set of principles on using security algorithms in WAMS nodes, such as cryptography selections, parameter configuration, and the like. Such principles can be used widely in other computing systems with energy constraints.

[1]  Enrico Perla,et al.  PowerTOSSIM z: realistic energy modelling for wireless sensor network environments , 2008, PM2HW2N '08.

[2]  Fangxing Li,et al.  Next-Generation Monitoring, Analysis, and Control for the Future Smart Control Center , 2010, IEEE Transactions on Smart Grid.

[3]  Meikang Qiu,et al.  Dynamic and Leakage Energy Minimization With Soft Real-Time Loop Scheduling and Voltage Assignment , 2010, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[4]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[5]  François-Xavier Standaert,et al.  On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[6]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[7]  Chih-Chun Chang,et al.  Balancing Security and Energy Consumption in Wireless Sensor Networks , 2007, MSN.

[8]  J. Lach,et al.  Power-Efficient Adaptable Wireless Sensor Networks , 2003 .

[9]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[10]  Dawn Xiaodong Song,et al.  Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.

[11]  Afrand Agah,et al.  Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..

[12]  Meikang Qiu,et al.  Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems , 2009, TODE.

[13]  Falko Dressler,et al.  Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[14]  Matt Welsh,et al.  Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.

[15]  James S. Thorp,et al.  Synchronized Phasor Measurement Applications in Power Systems , 2010, IEEE Transactions on Smart Grid.

[16]  Joe H. Chow,et al.  A Flexible Phasor Data Concentrator Design Leveraging Existing Software Technologies , 2010, IEEE Transactions on Smart Grid.

[17]  Jianwei Huang,et al.  Secure Key Management Architecture Against Sensor-Node Fabrication Attacks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[18]  Alfred V. Aho,et al.  Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.

[19]  Zhiyong Yuan,et al.  Wide-Area Frequency Monitoring Network (FNET) Architecture and Applications , 2010, IEEE Transactions on Smart Grid.

[20]  Vipul Gupta,et al.  Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[21]  Andrea Munari,et al.  Performance assessment of a class of cross-layer optimized protocols for geographic routing in WSNs , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.

[22]  Jianhui Wang,et al.  Smart Transmission Grid: Vision and Framework , 2010, IEEE Transactions on Smart Grid.

[23]  Stefan Tillich,et al.  Energy evaluation of software implementations of block ciphers under memory constraints , 2007 .

[24]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[25]  K. Wehrle,et al.  Accurate prediction of power consumption in sensor networks , 2005, The Second IEEE Workshop on Embedded Networked Sensors, 2005. EmNetS-II..

[26]  Luca Benini,et al.  System-level power optimization: techniques and tools , 1999, Proceedings. 1999 International Symposium on Low Power Electronics and Design (Cat. No.99TH8477).