Steganography based Low Complexity Authentication Scheme for Synchrophasor Communication

Successful cyber-attack on synchrophasor network can have devastating impacts on the power grids. One of the limitations of the IEEE standard C37.118-2 is that it does not address the security requirements of synchrophasor communications. In the IEEE standard C37.118-2, Cyclic Redundancy Check (CRC) has been proposed for validating synchrophasor data and does not specify any form of authentication between communicating devices. Commonly, cryptography is used for message authentication. However, cryptography based authentication schemes are often computationally demanding and are not preferred for synchrophasor communication where resources are not available to perform high computations. To address this limitation, this paper proposes a steganography based low complexity scheme for authentication of synchrophasor data. Real time data transfer between Phasor Measurement Units (PMUs) and Phasor Data Concentrator (PDC) instances has shown that with increase in the number of bytes, the proposed scheme performs better than the existing standard hashing functions.

[1]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[2]  Peter Wayner,et al.  Disappearing Cryptography: Information Hiding: Steganography and Watermarking , 2008 .

[3]  Stevan Šandi,et al.  pyPMU — Open source python package for synchrophasor data transfer , 2016, 2016 24th Telecommunications Forum (TELFOR).

[4]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[5]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[6]  S. Han,et al.  A survey of digital image watermarking techniques , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..

[7]  Mourad Debbabi,et al.  Communication security for smart grid distribution networks , 2013, IEEE Communications Magazine.

[8]  Thoshitha T. Gamage,et al.  Security Implications of Transport Layer Protocols in Power Grid Synchrophasor Data Communication , 2016, IEEE Transactions on Smart Grid.

[9]  Taskin Koçak,et al.  Smart Grid Technologies: Communication Technologies and Standards , 2011, IEEE Transactions on Industrial Informatics.

[10]  Peng Liu,et al.  Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[11]  김인택 [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .

[12]  Yo-Sung Ho,et al.  Reversiblee Image Authentication Based on Watermarking , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[13]  Chin-Chen Chang,et al.  Lossless Data Hiding Based on Histogram Modification for Image Authentication , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[14]  Kumar Parasuraman,et al.  Reversible image watermarking using interpolation technique , 2014, 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE).

[15]  Sushmita Ruj,et al.  A Decentralized Security Framework for Data Aggregation and Access Control in Smart Grids , 2013, IEEE Transactions on Smart Grid.

[16]  Rossouw von Solms,et al.  From information security to cyber security , 2013, Comput. Secur..

[17]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[18]  Min Wu,et al.  Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.

[19]  Xiaohui Liang,et al.  EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.

[20]  C. Ern Information hiding techniques for steganography and digital watermarking , 2018 .

[21]  Ibrahim Khalil,et al.  Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings , 2015, Inf. Syst..

[22]  Dirk Westhoff,et al.  Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.

[23]  Hamid Sharif,et al.  A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.

[24]  Bret Dunbar,et al.  A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .

[25]  Xiaodong Lin,et al.  MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks , 2010, CMC 2010.

[26]  Lin Zhu,et al.  A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid , 2013, IEEE Trans. Ind. Electron..

[27]  Gene Tsudik,et al.  QUEST Software and , 2022 .

[28]  Richard Brooks,et al.  A survey of electric power synchrophasor network cyber security , 2014, IEEE PES Innovative Smart Grid Technologies, Europe.

[29]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[30]  Göran N Ericsson,et al.  Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure , 2010, IEEE Transactions on Power Delivery.

[31]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[32]  Edmund Y. Lam,et al.  Zero-Configuration Identity-Based Signcryption Scheme for Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[33]  Kefa Rabah,et al.  Steganography-The Art of Hiding Data , 2004 .

[34]  L. Mili,et al.  A study of communication and power system infrastructure interdependence on PMU-based wide area monitoring and protection , 2012, 2012 IEEE Power and Energy Society General Meeting.

[35]  Sakir Sezer,et al.  IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation , 2016, ICISSP.

[36]  Randy L. Ekl,et al.  Smart Grid security technology , 2010, 2010 Innovative Smart Grid Technologies (ISGT).