SRDA: A Secure Routing and Data Aggregation Approach for Wireless Smart Meter

For the secure two-way communication and forwarding, this paper proposes SRDA, a secure routing and data aggregation approach for wireless smart meter. This approach introduces the unique wireless smart meter identifier to represent its public identity information, and gives a secure routing architecture based on control and forwarding separation. In this architecture, SRDA uses the proxy re-encryption data aggregation algorithm to protect security of data transmission. By using the routing algorithm according to distance and link quality, SRDA achieves the best routing path and provides several alternative paths which have different priorities. Besides, the identifier-based cryptography mechanism is used to issue and update the routing information in security, and the proxy re-encryption mechanism is designed to preserve the data privacy. In conclusion, this paper gives an analysis for the relatively excellent security, scalability and energy efficiency.

[1]  Mohammad Abdus Salam,et al.  Dealing with the secure time synchronization and man-in-the-middle attacker in mobile sensor networks , 2012, ACM-SE '12.

[2]  Lingfeng Wang,et al.  Smart meters for power grid — Challenges, issues, advantages and status , 2011 .

[3]  Cao Jun Information System Architecture for Smart Grids , 2013 .

[4]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[5]  Hamid Sharif,et al.  An efficient security protocol for advanced metering infrastructure in smart grid , 2013, IEEE Network.

[6]  Fábio Borges Privacy-preserving data aggregation in smart metering systems , 2016 .

[7]  Soumya K. Ghosh,et al.  Analysis of attack graph-based metrics for quantification of network security , 2012, 2012 Annual IEEE India Conference (INDICON).

[8]  Mahesh Sooriyabandara,et al.  Toward Unified Security and Privacy Protection for Smart Meter Networks , 2014, IEEE Systems Journal.

[9]  Yashar Ganjali,et al.  On scalability of software-defined networking , 2013, IEEE Communications Magazine.

[10]  J. H. Reed,et al.  Performance evaluation of hybrid spread spectrum based wireless smart meter sensor network with multi-user detection techniques , 2012, 2012 IEEE International Conference on Wireless Information Technology and Systems (ICWITS).

[11]  Rob Sherwood,et al.  On Controller Performance in Software-Defined Networks , 2012, Hot-ICE.

[12]  F.M. Cleveland,et al.  Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[13]  H. T. Mouftah,et al.  Secure multipath routing for AMI network in Smart Grid , 2012, 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC).

[14]  Hongke Zhang,et al.  Modelling and simulations for DDoS attacks mitigation in identifier–locator split network , 2013, Int. J. Comput. Math..

[15]  Christoph Krauß,et al.  Distributed Privacy-Preserving Aggregation of Metering Data in Smart Grids , 2013, IEEE Journal on Selected Areas in Communications.

[16]  Ran Giladi,et al.  Performance Analysis of Software-Defined Networking (SDN) , 2013, 2013 IEEE 21st International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems.

[17]  R. Vigo,et al.  Smart grid security a Smart Meter-centric perspective , 2012, 2012 20th Telecommunications Forum (TELFOR).

[18]  Christoph Krauß,et al.  Secure distributed data aggregation in the automatic metering infrastructure of smart grids , 2013, 2013 IEEE International Conference on Communications (ICC).

[19]  Fernando Pérez-González,et al.  Privacy-preserving data aggregation in smart metering systems: an overview , 2013, IEEE Signal Processing Magazine.

[20]  Siba K. Udgata,et al.  Wireless Sensor Network Security Model Using Zero Knowledge Protocol , 2011, 2011 IEEE International Conference on Communications (ICC).

[21]  Hamid Sharif,et al.  A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges , 2013, IEEE Communications Surveys & Tutorials.

[22]  Rajendra K. Sharma,et al.  Identity-Based Cryptography Techniques and Applications (A Review) , 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks.

[23]  Razib Hayat Khan,et al.  A Hierarchical Intrusion Detection System in Wireless Sensor Networks , 2010 .

[24]  Peng Liu,et al.  Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[25]  William Liu,et al.  Self-Adjustable Trust-Based Energy Efficient Routing for Smart Grid Systems , 2012, 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology.

[26]  Jen-Hao Teng,et al.  Development of a smart power meter for AMI based on ZigBee communication , 2009, 2009 International Conference on Power Electronics and Drive Systems (PEDS).

[27]  Stamatis Karnouskos,et al.  A comparative analysis of smart metering data aggregation performance , 2013, 2013 11th IEEE International Conference on Industrial Informatics (INDIN).

[28]  Yang Xiao,et al.  Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.

[29]  Winston Khoon Guan Seah,et al.  Efficient and secure data aggregation for smart metering networks , 2013, 2013 IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.