Performance evaluation of key management schemes for wireless legacy smart grid environments: poster

With the increasing digitization of different components of Smart Grid, there is an ongoing effort to design secure protocols and deploy them for different applications. A major need along with these efforts is to deal with key management for a large number of devices. While key management can be easily addressed by transferring the existing protocols to Smart Grid domain, this is not an easy task as one needs to deal with the limitations of the current communication infrastructures and resource-constrained devices. As the utilities rightly requests to build the new systems on top of the legacy systems with limited investment, the research community needs to re-think the adaptation of the existing security approaches to such non-traditional environments. This poster aims to tackle one of these problems, namely, symmetric key management in a severely constrained wireless communication environment. Assuming a legacy radio communication infrastructure with bandwidths in the order of kilobits, the objective is to evaluate the feasibility and performance of the existing sophisticated key management protocols. We developed a realistic ns-3 environment and analyze the delay overhead via simulations.

[1]  Rami Rosen,et al.  Linux containers and the future cloud , 2014 .

[2]  Eric Rescorla,et al.  Datagram Transport Layer Security Version 1.2 , 2012, RFC.

[3]  Paul E. Hoffman,et al.  Internet Key Exchange Protocol Version 2 (IKEv2) , 2010, RFC.

[4]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[5]  Paul E. Hoffman,et al.  Algorithms for Internet Key Exchange version 1 (IKEv1) , 2005, RFC.

[6]  Thomas Watteyne,et al.  Understanding the Limits of LoRaWAN , 2016, IEEE Communications Magazine.

[7]  Yi Qian,et al.  An advanced key management scheme for secure smart grid communications , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).