A cybersecurity user authentication approach for securing smart grid communications

Abstract The smart grid provides technology that offers power solutions by integrating wireless access, renewable energy resources, smart meters, and smart appliances. Energy harvesting and distribution is automated through remotely operated commands using information and communication technology. Common issues in integrating power grid with technology include security threat that reduces the expected assimilation performance. In the present work, a cybersecurity-assisted authentication method for smart grids is introduced to overcome false data flow. This method pre-estimates the energy requirement of the meters, depending on previously acquired information. Authentication-dependent security is provided according to the pre-estimated energy requirement and distribution manner. Variations in smart grid data for energy allocation are monitored based on network and end-user consumption until the users' current connection time. This method provides individual authentication for power-sharing and user verification, thereby improving false data's detection rate. Results show that the proposed method required less detection time (4.67 s) without increasing the overload for end-users.

[1]  Resul Das,et al.  Cyber-security on smart grid: Threats and potential solutions , 2020, Comput. Networks.

[2]  Hongtao Sun,et al.  A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[3]  Amr Tolba,et al.  Optimizing the network energy of cloud assisted internet of things by using the adaptive neural learning approach in wireless sensor networks , 2019, Comput. Ind..

[4]  Tao Jiang,et al.  Blind False Data Attacks Against AC State Estimation Based on Geometric Approach in Smart Grid Communications , 2018, IEEE Transactions on Smart Grid.

[5]  Xinping Guan,et al.  Distributed detection and isolation of bias injection attack in smart energy grid via interval observer , 2019 .

[6]  Nour El Islem Karabadji,et al.  Anomaly-based framework for detecting power overloading cyberattacks in smart grid AMI , 2020, Comput. Secur..

[7]  Farokhlagha Moazami,et al.  Lightweight and secure PUF-based authenticated key agreement scheme for smart grid , 2020, Peer-to-Peer Netw. Appl..

[8]  Musheer Ahmad,et al.  PALK: Password-based anonymous lightweight key agreement framework for smart grid , 2020 .

[9]  Amr Tolba,et al.  EMS: An Energy Management Scheme for Green IoT Environments , 2020, IEEE Access.

[10]  Xiaojun Shan,et al.  A game-theoretic approach to modeling attacks and defenses of smart grids at three levels , 2020, Reliab. Eng. Syst. Saf..

[11]  Mohammad Hesam Tadayon,et al.  A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid , 2018, IEEE Transactions on Smart Grid.

[12]  Behnam Bahrak,et al.  Evaluation of big data frameworks for analysis of smart grids , 2019, J. Big Data.

[13]  Eklas Hossain,et al.  Application of Big Data and Machine Learning in Smart Grid, and Associated Security Concerns: A Review , 2019, IEEE Access.

[14]  Pengfei Liu,et al.  Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids , 2020, IEEE Transactions on Information Forensics and Security.

[15]  Yang Xiao,et al.  Edge computing enabled non-technical loss fraud detection for big data security analytic in Smart Grid , 2020, J. Ambient Intell. Humaniz. Comput..

[16]  Xiaohui Liang,et al.  Energy Theft Detection With Energy Privacy Preservation in the Smart Grid , 2019, IEEE Internet of Things Journal.

[17]  Mita Nasipuri,et al.  A Novel Approach for Detecting and Mitigating the Energy Theft Issues in the Smart Metering Infrastructure , 2018 .

[18]  Jin Tao,et al.  A Statistical Framework for Detecting Electricity Theft Activities in Smart Grid Distribution Networks , 2020, IEEE Journal on Selected Areas in Communications.

[19]  Mohamed Amine Ferrag,et al.  A systematic review of data protection and privacy preservation schemes for smart grid communications , 2018 .

[20]  Qi Li,et al.  False data injection attacks against smart gird state estimation: Construction, detection and defense , 2019, Science China Technological Sciences.

[21]  Zhen Ni,et al.  A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[22]  M. Pilz,et al.  Security attacks on smart grid scheduling and their defences: a game-theoretic approach , 2018, International Journal of Information Security.

[23]  Ribal Atallah,et al.  CASeS: Concurrent Contingency Analysis-Based Security Metric Deployment for the Smart Grid , 2020, IEEE Transactions on Smart Grid.

[24]  Stefan Marksteiner,et al.  Cyber security requirements engineering for low-voltage distribution smart grid architectures using threat modeling , 2019, J. Inf. Secur. Appl..

[25]  G. Dileep,et al.  A survey on smart grid technologies and applications , 2020, Renewable Energy.

[26]  M. Elisabeth Paté-Cornell,et al.  Cyber Risk Analysis for a Smart Grid: How Smart is Smart Enough? A Multiarmed Bandit Approach to Cyber Security Investment , 2018, IEEE Transactions on Engineering Management.

[27]  Nanpeng Yu,et al.  A Physically Inspired Data-Driven Model for Electricity Theft Detection With Smart Meter Data , 2019, IEEE Transactions on Industrial Informatics.

[28]  Yuhong Li,et al.  A Blockchain-based Architecture for Stable and Trustworthy Smart Grid , 2019, Procedia Computer Science.