An efficient key management scheme in wireless sensor networks for smart grid

被引:0
作者
Guan, Zhitao [1 ]
Xu, Yue [1 ]
Yang, Tingting [1 ]
Shi, Ruifeng [1 ]
机构
[1] School of Control and Computer Engineering, North China Electric Power University, Beijing
关键词
Key management; Smart grid; Wireless sensor network;
D O I
10.1166/sl.2014.3262
中图分类号
学科分类号
摘要
The smart grid has caught great attentions in recent years, which is poised to transform a centralized, producer-controlled network to a decentralized, consumer-interactive network that's supported by fine-grained monitoring. Large-scale WSNs (Wireless Sensor Networks) have been considered one of the very promising technologies to support the implementation of smart grid. WSNs are applied in almost every aspect of smart grid, including power generation, power transmission, power distribution, power utilization and power dispatch, and the security of 'WSNs in power grid' become an hotspot issue due to the data of power grid is important and sensitive. In this paper, the monitoring system of the power transmission and distribution based on WSNs is well studied, and the cluster based network model is constructed. On this basis, an efficient ternary polynomial based key management framework is proposed, which is scalable and effective in cluster based wireless sensor networks. The analysis shows that proposed scheme can meet the security requirement of key management, and it also has less communication cost, computation cost and storage cost compared with other popular algorithms. Copyright © 2014 American Scientific Publishers.
引用
收藏
页码:414 / 419
页数:5
相关论文
共 26 条
[1]  
Huang Y., Esmalifalak M., Nguyen H., Zheng R., Han Z., IEEE Commun. Mag., 51, (2013)
[2]  
Perrig A., Szewczyk R., Tygar J.D., Wirl. Netw, 8, (2002)
[3]  
Kumar S.R., Sidhartha P., Kumar R.U., Prabina R., J. Bioinf. Intell. Control, 2, (2013)
[4]  
Eschenauer L., Gligor V.D., Proc. 9th ACM Conference on Computer and Communications Security, (2002)
[5]  
Chan H., Perrig A., Song D., Proc. 2003 IEEE on Security and Privacy, (2003)
[6]  
Abdelaziz A.Y., Osama R.A., Elkhodary S.M., J. Bioinf. Intell. Control, 2, (2013)
[7]  
Du W.L., Deng J., Han Y.S., Varshney P.K., Katz J., Khalili A., Proc. 10th ACM Conference on Computer and Communication Security, (2003)
[8]  
Liu D.G., Ning P., Proc. 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, (2003)
[9]  
Ali S.Q., Hasanien H.M., Al-Ammar E.A., J. Bioinf. Intell. Control., 2, (2013)
[10]  
Zhang Y.T., Yang J., Li W.J., Wang L.Z., Jin L.L., J. Netw. Comput. Appl., 33, (2010)