Provable security analysis of complex or smart computer systems in the smart grid

Author(s):  
Sheema Madhusudhanan ◽  
Sanoop Mallissery
Author(s):  
Luigi Coppolino ◽  
Salvatore D’Antonio ◽  
Ivano Alessandro Elia ◽  
Luigi Romano

Electronics ◽  
2020 ◽  
Vol 9 (6) ◽  
pp. 989 ◽  
Author(s):  
Anhao Xiang ◽  
Jun Zheng

Home area networks (HANs) are the most vulnerable part of smart grids since they are not directly controlled by utilities. Device authentication is one of most important mechanisms to protect the security of smart grid-enabled HANs (SG-HANs). In this paper, we propose a situation-aware scheme for efficient device authentication in SG-HANs. The proposed scheme utilizes the security risk information assessed by the smart home system with a situational awareness feature. A suitable authentication protocol with adequate security protection and computational and communication complexity is then selected based on the assessed security risk level. A protocol design of the proposed scheme considering two security risk levels is presented in the paper. The security of the design is verified by using both formal verification and informal security analysis. Our performance analysis demonstrates that the proposed scheme is efficient in terms of computational and communication costs.


2013 ◽  
Vol 325-326 ◽  
pp. 637-642
Author(s):  
Zhong Wei Li ◽  
Li Cheng ◽  
Hong Li Zhang ◽  
Wei Ming Tong

AMI (Advanced Metering Infrastructure) is the first step of the implementation of the smart grid. The communication network is the important part of AMI. The reasonable communication network architecture and effective cyber security measures are the keys of the realization of AMIs functions. The components, functions and communication network architecture are studied. Communication technologies that can be used in AMI are analyzed. Based on ZigBee, fieldbus/industrial EtherNet and GPRS, a typical AMI are constructed. The cyber security threats, communication data types and cyber security requirement of AMI are analyzed. The cyber security strategy and implementing scheme are offered. The communication standards and cyber security standards that can be referred while constructing AMI are analyzed. The necessity that publishes AMIs communication standard and cyber security is put forward.


Sign in / Sign up

Export Citation Format

Share Document