Key Management for Secure Demand Data Communication in Constrained Micro-Grids

Micro-grids allow rural and remote communities that are either not connected to the national power grid, or suffer from load shedding, to operate power networks autonomously. Like conventional power networks, micro-grids require management and billing mechanisms. Tamper-resistant meters are not economically viable so we use a resource-constrained network formed of devices with limited memory, processing and bandwidth capabilities to handle power consumption monitoring and reporting. Relying on devices with limited capacity raises the issue of trust and so, authentication is a necessity. In this paper, we propose an authentication architecture to facilitate lightweight key management over a resource-constrained platform. We structure our key management scheme to operate as a hierarchical network where the core network is connected to a more volatile edge network. A pair-wide key pre-distribution scheme with unique identifiers per device is used to initiate the authentication process. An analysis of our scheme demonstrates that it is efficient and robust against impersonation, mis-reporting, and relay attacks that are typically used to provoke power theft.

[1]  Julien Bringer,et al.  HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).

[2]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[3]  Gianluca Dini,et al.  LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks , 2011, TECS.

[4]  Srinivasa Rao,et al.  An Overview of Wireless Sensor Networks Applications and Security , 2012 .

[5]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[6]  Paulo S. L. M. Barreto,et al.  The CURUPIRA-2 Block Cipher for Constrained Platforms: Specification and Benchmarking , 2008, PiLBA.

[7]  Kah Phooi Seng,et al.  A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments , 2015, J. Netw. Comput. Appl..

[8]  Thomas Peyrin,et al.  The PHOTON Family of Lightweight Hash Functions , 2011, IACR Cryptol. ePrint Arch..

[9]  Dan Boneh,et al.  Ensuring high-quality randomness in cryptographic key generation , 2013, CCS.

[10]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[11]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[12]  Babu Narayanan,et al.  POWER SYSTEM STABILITY AND CONTROL , 2015 .

[13]  Claude Castelluccia,et al.  Shake them up!: a movement-based pairing protocol for CPU-constrained devices , 2005, MobiSys '05.

[14]  Gianluca Dini,et al.  An efficient key revocation protocol for wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[15]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[16]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[17]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..