Securing Synchrophasors Using Data Provenance in the Quantum Era

被引:2
作者
Javed, Kashif [1 ]
Khan, Mansoor Ali [2 ]
Ullah, Mukhtar [1 ]
Aman, Muhammad Naveed [3 ]
Sikdar, Biplab [2 ]
机构
[1] Natl Univ Comp & Emerging Sci, Dept Elect Engn, Islamabad 44000, Pakistan
[2] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore, Singapore
[3] Univ Nebraska Lincoln, Sch Comp, Lincoln, NE 68588 USA
来源
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY | 2024年 / 5卷
关键词
Data provenance; synchrophasors; quantum channels; PUF; PROTECTION; SCHEME;
D O I
10.1109/OJCOMS.2024.3372524
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Trust in the fidelity of synchrophasor measurements is crucial for the correct operation of modern power grids. While most of the existing research on data provenance focuses on the Internet of Things, there is a significant need for effective malicious data detection in power systems. Current methods either fail to detect malicious data modifications or require certain Phasor Measurement Units (PMUs) to be physically secured. To solve these issues, this paper presents a new protocol to establish data provenance in synchrophasor networks. The proposed protocol is based on Physically Unclonable Functions (PUFs) and harnesses the principles of quantum unreality and uncertainty. It aims not only to verify the source of data but also to provide robust protection against data tampering. The proposed protocol serves the purpose of devising new protocols to protect our critical infrastructure sectors in the quantum era. Security and performance analyses, along with experiments conducted on IBM's Qiskit platform, demonstrate that the protocol offers a strong defense against cyberattacks while maintaining a lightweight profile. In particular, the proposed protocol has a worst-case computational complexity of O(1) , an execution time per packet bounded by the time required to compute a cryptographically secure hash, and an upper bound for the per packet communication overhead of 256-bits. In terms of storage overhead, the proposed protocol requires each PMU to store the output of a cryptographically secure hash function, while the PDC needs to store one challenge-response pair (CRP) for each PMU.
引用
收藏
页码:1594 / 1608
页数:15
相关论文
共 90 条
[11]  
[Anonymous], 2011, RFC 6238
[12]  
[Anonymous], 2024, About NASPI-North American synchrophasor initiative
[13]   A review on synchrophasor communication system: communication technologies, standards and applications [J].
Appasani B. ;
Mohanta D.K. .
Protection and Control of Modern Power Systems, 2018, 3 (01)
[14]  
Arthur W., 2015, A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security, P151
[15]   Securing Data Provenance in Internet of Things (IoT) Systems [J].
Baracaldo, Nathalie ;
Bathen, Luis Angel D. ;
Ozugha, Roqeeb O. ;
Engel, Robert ;
Tata, Samir ;
Ludwig, Heiko .
SERVICE-ORIENTED COMPUTING - ICSOC 2016 WORKSHOPS, 2017, 10380 :92-98
[16]  
Beaulieu R., 2015, Rep. 2015/585
[17]   The SIMON and SPECK lightweight block ciphers [J].
Beaulieu, Ray ;
Shors, Douglas ;
Smith, Jason ;
Treatman-Clark, Stefan ;
Weeks, Bryan ;
Wingers, Louis .
2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
[18]  
Beisheim M., 2022, POLITICAL IMPACT SUS, P22, DOI DOI 10.1017/9781009082945.003
[19]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[20]  
Bevrani H, 2014, POWER SYSTEM MONITORING AND CONTROL, P1, DOI 10.1002/9781118852422