A secure way of exchanging the secret keys in advanced metering infrastructure

Advanced metering infrastructure (AMI) security has become a challenging issue now days because of its integration with the external networks, remote system, and internet world. Today's metering infrastructure employs computer based monitoring and control operations to enable application of one network to exchange data with other application of different network. Communication protocol, network topologies, and computerization plays crucial roles to make the metering infrastructure advanced and further make a grid smarter. On the other hand, cyber attacks already associated with such computer networks and communication protocol can easily affect the communication of AMI applications. Therefore, from trespasser point of view, in this paper, we explore the various possible types of undesirable security threats followed by desirable security attributes required for the AMI. The paper further describes and implements a signature based station-to-station protocol for exchanging the secret shared keys among the AMI applications to get rid from undesirable security threats.

[1]  Stephen B. Wicker,et al.  A Privacy-Aware Architecture for Demand Response Systems , 2011, 2011 44th Hawaii International Conference on System Sciences.

[2]  Nitin Gupta,et al.  Authorized SCADA Commands , 2009 .

[3]  Simon S. Lam,et al.  A semantic model for authentication protocols , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[4]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[5]  L. Pietre-Cambacedes,et al.  Cryptographic Key Management for SCADA Systems-Issues and Perspectives , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[6]  Ikbal Ali,et al.  Interoperability Framework for Data Exchange between Legacy and Advanced Metering Infrastructure , 2012 .

[7]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[8]  C. Bennett,et al.  Networking AMI Smart Meters , 2008, 2008 IEEE Energy 2030 Conference.

[9]  Paulo S. Motta Pires,et al.  Using a packet manipulation tool for security analysis of industrial network protocols , 2007, 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007).

[10]  Dapeng Wu,et al.  Fault-Tolerant and Scalable Key Management for Smart Grid , 2011, IEEE Transactions on Smart Grid.

[11]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.

[12]  Wei-Jen Lee,et al.  An AMI System for the Deregulated Electricity Markets , 2009 .

[13]  Zahir Tari,et al.  SCADASim—A Framework for Building SCADA Simulations , 2011, IEEE Transactions on Smart Grid.

[14]  Wenye Wang,et al.  Review and evaluation of security threats on the communication networks in the smart grid , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[15]  Nei Kato,et al.  A Lightweight Message Authentication Scheme for Smart Grid Communications , 2011, IEEE Transactions on Smart Grid.

[16]  Ning Lu,et al.  Smart-grid security issues , 2010, IEEE Security & Privacy.

[17]  Anupam Saxena Customized PKI for SCADA System , 2010 .

[18]  F.M. Cleveland,et al.  Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[19]  Rob Shein Security Measures for Advanced Metering Infrastructure Components , 2010, 2010 Asia-Pacific Power and Energy Engineering Conference.