Securing Synchrophasors Using Data Provenance in the Quantum Era

被引:2
作者
Javed, Kashif [1 ]
Khan, Mansoor Ali [2 ]
Ullah, Mukhtar [1 ]
Aman, Muhammad Naveed [3 ]
Sikdar, Biplab [2 ]
机构
[1] Natl Univ Comp & Emerging Sci, Dept Elect Engn, Islamabad 44000, Pakistan
[2] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore, Singapore
[3] Univ Nebraska Lincoln, Sch Comp, Lincoln, NE 68588 USA
来源
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY | 2024年 / 5卷
关键词
Data provenance; synchrophasors; quantum channels; PUF; PROTECTION; SCHEME;
D O I
10.1109/OJCOMS.2024.3372524
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Trust in the fidelity of synchrophasor measurements is crucial for the correct operation of modern power grids. While most of the existing research on data provenance focuses on the Internet of Things, there is a significant need for effective malicious data detection in power systems. Current methods either fail to detect malicious data modifications or require certain Phasor Measurement Units (PMUs) to be physically secured. To solve these issues, this paper presents a new protocol to establish data provenance in synchrophasor networks. The proposed protocol is based on Physically Unclonable Functions (PUFs) and harnesses the principles of quantum unreality and uncertainty. It aims not only to verify the source of data but also to provide robust protection against data tampering. The proposed protocol serves the purpose of devising new protocols to protect our critical infrastructure sectors in the quantum era. Security and performance analyses, along with experiments conducted on IBM's Qiskit platform, demonstrate that the protocol offers a strong defense against cyberattacks while maintaining a lightweight profile. In particular, the proposed protocol has a worst-case computational complexity of O(1) , an execution time per packet bounded by the time required to compute a cryptographically secure hash, and an upper bound for the per packet communication overhead of 256-bits. In terms of storage overhead, the proposed protocol requires each PMU to store the output of a cryptographically secure hash function, while the PDC needs to store one challenge-response pair (CRP) for each PMU.
引用
收藏
页码:1594 / 1608
页数:15
相关论文
共 90 条
[1]   Analysis and Design of a Hardware/Software Trusted Platform Module for Embedded Systems [J].
Aaraj, Najwa ;
Raghunathan, Anand ;
Jha, Niraj K. .
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2008, 8 (01)
[2]   Physical Unclonable Functions (PUF) for IoT Devices [J].
Al-Meer, Abdulaziz ;
Al-Kuwari, Saif .
ACM COMPUTING SURVEYS, 2023, 55 (14S)
[3]   Secure Data Provenance in Cloud-centric Internet of Things via Blockchain Smart Contracts [J].
Ali, Saqib ;
Wang, Guojun ;
Bhuiyan, Md Zakirul Alam ;
Jiang, Hai .
2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, :991-998
[4]   Cybersecurity Challenges Associated With the Internet of Things in a Post-Quantum World [J].
Althobaiti, Ohood Saud ;
Dohler, Mischa .
IEEE ACCESS, 2020, 8 :157356-157381
[5]   Data Provenance for IoT With Light Weight Authentication and Privacy Preservation [J].
Aman, Muhammad Naveed ;
Basheer, Mohammed Haroon ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) :10441-10457
[6]  
[Anonymous], Wiley Encyclopedia of Electrical and Electronics Engineering
[7]  
[Anonymous], 2023, Trust
[8]  
[Anonymous], 2011, IEEE Std C37.118.2
[9]  
[Anonymous], 2017, Phasor measurement unit data sheet
[10]  
[Anonymous], 2022, The Nobel prize in physics 2022