DERauth: A Battery-based Authentication Scheme for Distributed Energy Resources

被引:11
|
作者
Zografopoulos, Ioannis [1 ]
Konstantinou, Charalambos [1 ]
机构
[1] Florida State Univ, Ctr Adv Power Syst, FAMU FSU Coll Engn, Dept Elect & Comp Engn, Tallahassee, FL 32306 USA
来源
2020 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2020) | 2020年
关键词
Distributed energy resources; authentication; battery energy storage systems; power grid; TEMPERATURE; ATTACKS;
D O I
10.1109/ISVLSI49217.2020.00086
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past decades, power systems have experienced drastic transformations in order to address the growth in energy demand, reduce carbon emissions, and enhance power quality and energy efficiency. This shift to the smart grid concept involves, among others, the utilization of distributed energy resources (DERs) such as rooftop solar panels and storage systems, contributing towards grid decentralization while improving control over power generation. In order to seamlessly integrate DERs into power systems, embedded devices are used to support the communication and control functions of DERs. As a result, vulnerabilities of such components can be ported to the industrial environment. Insecure control networks and protocols further exacerbate the problem. Towards reducing the attack surface, we present an authentication scheme for DERs, DERauth, which leverages the inherent entropy of the DER battery energy storage system (BESS) as a root-of-trust. The DER authentication is achieved using a challenge-reply mechanism that relies on the corresponding DER's BESS state-of-charge (SoC) and voltage measurements. A dynamically updating process ensures that the BESS state is up-to-date. We evaluate our proof-of-concept in a prototype development that uses lithium-ion (li-ion) batteries for the BESS. The robustness of our design is assessed against modeling attacks performed by neural networks.
引用
收藏
页码:560 / 567
页数:8
相关论文
共 50 条
  • [1] A distributed biometric authentication scheme based on blockchain
    Toutara, Foteini
    Spathoulas, Georgios
    2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020), 2020, : 470 - 475
  • [2] A Ring-Based Routing Scheme for Distributed Energy Resources Management in IIoT
    Xiong, Zhiwen
    Wang, Huibin
    Zhang, Lili
    Fan, Tanghuai
    Shen, Jie
    IEEE ACCESS, 2020, 8 : 167490 - 167503
  • [3] Seamless control scheme for distributed energy resources in microgrids
    Karami, Marzieh
    Seifi, Hossein
    Mohammadian, Mustafa
    IET GENERATION TRANSMISSION & DISTRIBUTION, 2016, 10 (11) : 2756 - 2763
  • [4] Low Voltage Station Area Distributed Energy Resources Aggregation Method Based on Virtual Battery
    Yu, Chutian
    Huang, Jiangqian
    Gao, Meijin
    Zhang, Lijun
    Yu, Jie
    Liang, Siqi
    Luan, Xingyu
    Bian, Xiaoyan
    2024 4TH POWER SYSTEM AND GREEN ENERGY CONFERENCE, PSGEC 2024, 2024, : 319 - 323
  • [5] A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment
    Jan, Mian Ahmad
    Nanda, Priyadarsi
    He, Xiangjian
    Tan, Zhiyuan
    Liu, Ren Ping
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 205 - 211
  • [6] Stochastic battery energy storage scheduling considering cell degradation and distributed energy resources
    Tang, Chenghui
    Xu, Jian
    Sun, Yuanzhang
    Liao, Siyang
    Zhang, Fan
    Ma, Li
    INTERNATIONAL TRANSACTIONS ON ELECTRICAL ENERGY SYSTEMS, 2019, 29 (07):
  • [7] Distributed Blockchain-Based Message Authentication Scheme for Connected Vehicles
    Noh, Jaewon
    Jeon, Sangil
    Cho, Sunghyun
    ELECTRONICS, 2020, 9 (01)
  • [8] A Blockchain-Based Secure Distributed Authentication Scheme for Internet of Vehicles
    Ma, Zhanfei
    Jiang, Jing
    Wei, Hui
    Wang, Bisheng
    Luo, Wenli
    Luo, Haoye
    Liu, Dongxiang
    IEEE ACCESS, 2024, 12 : 81471 - 81482
  • [9] The Design and Analysis of Distributed Authentication Scheme in VANET
    Wang, Jian
    Liu, Yanheng
    Jiao, Yu
    2009 IEEE YOUTH CONFERENCE ON INFORMATION, COMPUTING AND TELECOMMUNICATION, PROCEEDINGS, 2009, : 15 - 18
  • [10] An Unlinkable Authentication Scheme for Distributed IoT Application
    Zhou, Yousheng
    Liu, Tong
    Tang, Fei
    Tinashe, Magara
    IEEE ACCESS, 2019, 7 : 14757 - 14766