Securing Synchrophasors Using Data Provenance in the Quantum Era

被引:2
作者
Javed, Kashif [1 ]
Khan, Mansoor Ali [2 ]
Ullah, Mukhtar [1 ]
Aman, Muhammad Naveed [3 ]
Sikdar, Biplab [2 ]
机构
[1] Natl Univ Comp & Emerging Sci, Dept Elect Engn, Islamabad 44000, Pakistan
[2] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore, Singapore
[3] Univ Nebraska Lincoln, Sch Comp, Lincoln, NE 68588 USA
来源
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY | 2024年 / 5卷
关键词
Data provenance; synchrophasors; quantum channels; PUF; PROTECTION; SCHEME;
D O I
10.1109/OJCOMS.2024.3372524
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Trust in the fidelity of synchrophasor measurements is crucial for the correct operation of modern power grids. While most of the existing research on data provenance focuses on the Internet of Things, there is a significant need for effective malicious data detection in power systems. Current methods either fail to detect malicious data modifications or require certain Phasor Measurement Units (PMUs) to be physically secured. To solve these issues, this paper presents a new protocol to establish data provenance in synchrophasor networks. The proposed protocol is based on Physically Unclonable Functions (PUFs) and harnesses the principles of quantum unreality and uncertainty. It aims not only to verify the source of data but also to provide robust protection against data tampering. The proposed protocol serves the purpose of devising new protocols to protect our critical infrastructure sectors in the quantum era. Security and performance analyses, along with experiments conducted on IBM's Qiskit platform, demonstrate that the protocol offers a strong defense against cyberattacks while maintaining a lightweight profile. In particular, the proposed protocol has a worst-case computational complexity of O(1) , an execution time per packet bounded by the time required to compute a cryptographically secure hash, and an upper bound for the per packet communication overhead of 256-bits. In terms of storage overhead, the proposed protocol requires each PMU to store the output of a cryptographically secure hash function, while the PDC needs to store one challenge-response pair (CRP) for each PMU.
引用
收藏
页码:1594 / 1608
页数:15
相关论文
共 90 条
[41]   Physical Unclonable Functions and Applications: A Tutorial [J].
Herder, Charles ;
Yu, Meng-Day ;
Koushanfar, Farinaz ;
Devadas, Srinivas .
PROCEEDINGS OF THE IEEE, 2014, 102 (08) :1126-1141
[42]   BlockPro: Blockchain based Data Provenance and Integrity for Secure IoT Environments [J].
Javaid, Uzair ;
Aman, Muhammad Naveed ;
Sikdar, Biplab .
BLOCKSYS'18: PROCEEDINGS OF THE 1ST BLOCKCHAIN-ENABLED NETWORKED SENSOR SYSTEMS, 2018, :13-18
[43]   Programmable access-controlled and generic erasable PUF design and its applications [J].
Jin, Chenglu ;
Burleson, Wayne ;
van Dijk, Marten ;
Ruehrmair, Ulrich .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2022, 12 (04) :413-432
[44]  
Johnson R., 2005, Trusted Platform Module and Privacy: Promises and Limitations
[45]   Soteria: A Quantum-Based Device Attestation Technique for Internet of Things [J].
Khan, Mansoor Ali ;
Aman, Muhammad Naveed ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09) :15320-15333
[46]   Roots of quantum computing supremacy: superposition, entanglement, or complementarity? [J].
Khrennikov, Andrei .
EUROPEAN PHYSICAL JOURNAL-SPECIAL TOPICS, 2021, 230 (04) :1053-1057
[47]   Strategic Protection Against Data Injection Attacks on Power Grids [J].
Kim, Tung T. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (02) :326-333
[48]  
Kirkpatrick M. S., 2014, U.S. Patent, Patent No. [8,750,502, 8750502]
[49]   Malicious Data Attacks on the Smart Grid [J].
Kosut, Oliver ;
Jia, Liyan ;
Thomas, Robert J. ;
Tong, Lang .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) :645-658
[50]   A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects [J].
Kuang, Boyu ;
Fu, Anmin ;
Susilo, Willy ;
Yu, Shui ;
Gao, Yansong .
COMPUTERS & SECURITY, 2022, 112