Location Based Security for Smart Grid Applications

被引:8
作者
Khan, Eraj [1 ]
Adebisi, Bamidele [2 ]
Honary, Bahram [1 ]
机构
[1] Univ Lancaster, Sch Comp & Commun, Lancaster LA1 4YW, England
[2] Manchester Metropolitan Univ, Sch Elect Engn, Manchester M15 6BH, Lancs, England
来源
MEDITERRANEAN GREEN ENERGY FORUM 2013: PROCEEDINGS OF AN INTERNATIONAL CONFERENCE MGEF-13 | 2013年 / 42卷
关键词
security; smart grid; GPT; RSA; ATTACKS;
D O I
10.1016/j.egypro.2013.11.030
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Smart Grid (SG) promises efficient, sustainable, green and reliable electrical delivery by combining the existing electrical distribution network assets with modern information and communications technologies (ICT) in order to transfer information and energy in both directions. Introduction of these intelligent devices will help the grid monitor, protect, and automatically optimise the operation of interconnected elements, in addition to interaction between energy suppliers and consumers. However, this exposes the future grid to new security challenges and risks. In this paper, a framework for protecting Smart Grid applications using geographic location of the devices connected to it is proposed. With this framework, each device on the grid adds an extra layer of security. The proposed scheme is not application or device specific which means it can be implemented on any communication node on the grid. The scheme uses an algebraic code based cryptosystems known as GPT (Gabidulin -Paramonov-Trejtakov), which provides a very strong protection while utilising the smallest key size as compared to other cryptosystems based on algebraic codes. As with other code based cryptosystems, the proposed security framework protects grid information against cyber threats as well as against channel impairments in the form of error protection codes. (C) 2013 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:299 / 307
页数:9
相关论文
共 16 条
[1]   IP-Centric High Rate Narrowband PLC for Smart Grid Applications [J].
Adebisi, Bamidele ;
Treytl, Albert ;
Haidine, Abdelfatteh ;
Portnoy, Alexander ;
Shan, Rafi Us ;
Lund, David ;
Pille, Hans ;
Honary, Bahram .
IEEE COMMUNICATIONS MAGAZINE, 2011, 49 (12) :46-54
[2]  
Denning D. E., 1996, Computer Fraud & Security, P12, DOI 10.1016/S1361-3723(97)82613-9
[3]  
Dinh H, 2011, LECT NOTES COMPUT SC, V6841, P761, DOI 10.1007/978-3-642-22792-9_43
[4]  
Gabidulin E.M., 1995, CODES CIPHERS, V11, P17
[5]  
GABIDULIN EM, 1991, LECT NOTES COMPUT SC, V547, P482
[6]  
GABIDULIN EM, 2009, INT S INF THEOR ISIT, P1110
[7]   Attacks and counter-attacks on the GPT public key cryptosystem [J].
Gabidulin, Ernst M. .
DESIGNS CODES AND CRYPTOGRAPHY, 2008, 48 (02) :171-177
[8]  
Haidine A., 2011, 2011 Proceedings of IEEE International Symposium on Power Line Communications and Its Applications (ISPLC), P468, DOI 10.1109/ISPLC.2011.5764443
[9]   Modified Niederreiter type of GPT cryptosystem based on reducible rank codes [J].
Khan, Eraj ;
Gabidulin, Ernst ;
Honary, Bahram ;
Ahmed, Hassan .
DESIGNS CODES AND CRYPTOGRAPHY, 2014, 70 (1-2) :231-239
[10]  
McEliece R., 1978, DSN PROG RE, V42-44, P114