A Novel Authentication Management for the Data Security of Smart Grid

被引:2
作者
Parvez, Imtiaz [1 ]
Aghili, Maryamossadat [2 ]
Riggs, Hugo [2 ]
Sundararajan, Aditya [3 ]
Sarwat, Arif I. [2 ]
Srivastava, Anurag K. [4 ]
机构
[1] Utah Valley Univ, Dept Comp Sci, Orem, UT 84058 USA
[2] Florida Int Univ, Dept Elect & Comp Engn, Miami, FL 33199 USA
[3] Oak Ridge Natl Lab, Oak Ridge, TN 37830 USA
[4] West Virginia Univ, Dept Comp Sci & Elect Engn, Morgantown, WV 26506 USA
来源
IEEE OPEN ACCESS JOURNAL OF POWER AND ENERGY | 2024年 / 11卷
关键词
Authentication; Security; Smart meters; Servers; Encryption; Meters; Smart grids; Advanced Metering Infrastructure (AMI); artifical intelliigence; data security; authentication; smart grids; ADVANCED METERING INFRASTRUCTURE; KEY MANAGEMENT; PRIVACY; SUPPORT;
D O I
10.1109/OAJPE.2024.3393971
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Bidirectional wireless communication is employed in various smart grid components such as smart meters and control and monitoring applications where security is vital. The Trusted Third Party (TTP) and wireless connectivity between the smart meter and the third party in the key management-based encryption techniques for the smart grid are expected to be totally trustworthy and dependable. In a wired/wireless medium, however, a man-in-the-middle may seek to disrupt, monitor and manipulate the network, or simply execute a replay attack, revealing its vulnerability. Recognizing this, this study presents a novel authentication management (model) comprised of two layer security schema. The first layer implements an efficient novel encryption method for secure data exchange between meters and control center with the help of two partially trusted simple servers (constitutes the TTP). In this setting, one server handles the data encryption between the meter and control center/central database, and the other server administers the random sequence of data transmission. The second layer monitors and verifies exchanged data packets among smart meters. It detects abnormal packets from suspicious sources. To implement this node-to-node authentication, One class support vector machine algorithm is proposed which takes advantages of the location information as well as the data transmission history (node identification, packet size, and data transmission frequency). This schema secures data communication, and imposes a comprehensive privacy throughout the system without considerably extending the complexity of the conventional key management scheme.
引用
收藏
页码:218 / 230
页数:13
相关论文
共 57 条
[1]   A Secure and Efficient Key Establishment Scheme for Communications of Smart Meters and Service Providers in Smart Grid [J].
Abbasinezhad-Mood, Dariush ;
Ostad-Sharif, Arezou ;
Nikooghadam, Morteza ;
Mazinani, Sayyed Majid .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) :1495-1502
[2]   A Lightweight Lattice-Based Homomorphic Privacy-Preserving Data Aggregation Scheme for Smart Grid [J].
Abdallah, Asmaa ;
Shen, Xuemin .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (01) :396-405
[3]  
Ali MQ, 2013, INT CONF SMART GRID, P618, DOI 10.1109/SmartGridComm.2013.6688027
[4]   An IOT based smart grid system for advanced cooperative transmission and communication [J].
Alomar, Madani Abdu .
PHYSICAL COMMUNICATION, 2023, 58
[5]  
[Anonymous], 2003, ICDM WORKSH DAT MIN, DOI 10.7916/D85M6CFF
[6]  
[Anonymous], 2012, INT J SMART GRID CLE
[7]  
Bajekal S.R, 2017, U.S. Patent, Patent No. 15445087
[8]  
Beevi LS, 2016, 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), P4716, DOI 10.1109/ICEEOT.2016.7755614
[9]  
Benmalek M, 2019, IEEE WCNC
[10]   VerSAMI: Versatile and Scalable key management for Smart Grid AMI systems [J].
Benmalek, Mourad ;
Challal, Yacine ;
Derhab, Abdelouahid ;
Bouabdallah, Abdelmadjid .
COMPUTER NETWORKS, 2018, 132 :161-179