Enhancement of end-to-end security in advanced metering infrastructure

被引:3
|
作者
Kalidass, J. [1 ]
Purusothaman, T. [2 ]
Suresh, P. [1 ,3 ]
机构
[1] Govt Coll Technol, Dept Informat Technol, Coimbatore, Tamil Nadu, India
[2] Govt Coll Technol, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
[3] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci &, Dept ECE, Chennai 600062, Tamil Nadu, India
关键词
Cyber physical system; Smart grid; Advanced metering infrastructure; Group key management; Message authentication; Amalgamation; KEY MANAGEMENT; COMMUNICATION;
D O I
10.1007/s12652-021-03409-0
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Advanced Metering Infrastructure (AMI) is enabling technology for smart grid and it act as a bridge between cyber and physical systems of the smart grid. The major parts of AMI are cyber systems; hence it's more vulnerable to attacks. The normal security protection scheme is not suitable for AMI because it consists of computation restricted components such as smart meters. The AMI networks also increase the challenges in the design of common protocol for end-to-end security (E2S) due to interoperability of its components. Data transfer in the AMI system requires E2S protection and security is one of the most challenging in AMI components development and deployment. Motivated by these limitations, the E2S scheme for AMI smart grid is proposed. In the proposed scheme includes the following properties. (i) Protracted publisher key per smart meter that are given by the Head End System (ii) Encryption key for each message sent from smart meter is derived from the publisher key (iii) Authentication of every message sent that consist of identity of smart meter such as Message Authentication Code (MAC). Compare with the existing end-to-end security schemes, the proposed scheme improves the E2S in terms of confidentiality, integrity and authentication with increasing scalability.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Scalable end-to-end security for advanced metering infrastructures
    Nabeel, Mohamed
    Ding, Xiaoyu
    Seo, Seung-Hyun
    Bertino, Elisa
    [J]. INFORMATION SYSTEMS, 2015, 53 : 213 - 223
  • [2] The end of end-to-end security?
    Bradner, S
    [J]. IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [3] Modeling the End-to-End Energy Consumption of a Nation-Wide Smart Metering Infrastructure
    Gougeon, Adrien
    Lemercier, Francois
    Blavette, Anne
    Orgerie, Anne-Cecile
    [J]. 2022 27TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2022), 2022,
  • [4] TOWARD END-TO-END BIOMETRICS-BASED SECURITY FOR IOT INFRASTRUCTURE
    Hossain, M. Shamim
    Muhammad, Ghulam
    Rahman, Sk Md Mizanur
    Abdul, Wadood
    Alelaiwi, Abdulhameed
    Alamri, Atif
    [J]. IEEE WIRELESS COMMUNICATIONS, 2016, 23 (05) : 44 - 51
  • [5] Building an End-to-End ISP Broadband Infrastructure as an Advanced Networking Subject
    Miles, Christopher Raymond
    Chan, Ka Ching
    [J]. COMPUTER APPLICATIONS IN ENGINEERING EDUCATION, 2016, 24 (01) : 16 - 26
  • [6] End-to-End Security for the IoT
    Dooley, James
    [J]. INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [7] END-TO-END SECURITY PROTECTION
    Nazaryan, Levon
    Panaousis, Emmanouil A.
    Politis, Christos
    [J]. IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2010, 5 (01): : 85 - 90
  • [8] Secure end-to-end processing of smart metering data
    Andrey Brito
    Christof Fetzer
    Stefan Köpsell
    Peter Pietzuch
    Marcelo Pasin
    Pascal Felber
    Keiko Fonseca
    Marcelo Rosa
    Luiz Gomes
    Rodrigo Riella
    Charles Prado
    Luiz F. Rust
    Daniel E. Lucani
    Márton Sipos
    László Nagy
    Marcell Fehér
    [J]. Journal of Cloud Computing, 8
  • [9] Secure end-to-end processing of smart metering data
    Brito, Andrey
    Fetzer, Christof
    Koepsell, Stefan
    Pietzuch, Peter
    Pasin, Marcelo
    Felber, Pascal
    Fonseca, Keiko
    Rosa, Marcelo
    Gomes-Jr, Luiz
    Riella, Rodrigo
    Prado, Charles
    Rust, Luiz F.
    Lucani, Daniel E.
    Sipos, Marton
    Nagy, Laszlo
    Feher, Marcell
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2019, 8 (01):
  • [10] Security analysis of an advanced metering infrastructure
    Hansen, Aaron
    Staggs, Jason
    Shenoi, Sujeet
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2017, 18 : 3 - 19