A lightweight approach towards mutual authentication in a smart grid environment

2021 ◽  
Author(s):  
Debsmita Ghosh

Smart grids allow automated meter readings and facilitate two-way communications between the smart meters and utility control centers. As the smart grid becomes more intelligent, it becomes increasingly vulnerable to cyber-attacks. Smart grid security mainly focuses on mutual authentication and key management techniques. An impeding factor in grid security is the memory and processing constraints of the smart meters. The aim of this thesis is to propose a lightweight mutual authentication protocol with an effective key renewal mechanism between a residential smart meter and a gateway. The authentication protocol proposed in the thesis, guarantees source authentication, data integrity, message confidentiality, as well as non-repudiation. The security analysis renders this protocol robust against several attacks. Furthermore, its performance analysis provides meticulous results as to how the proposed protocol is efficient in terms of computation overhead, average delay and buffer occupancy at the gateway.

2021 ◽  
Author(s):  
Debsmita Ghosh

Smart grids allow automated meter readings and facilitate two-way communications between the smart meters and utility control centers. As the smart grid becomes more intelligent, it becomes increasingly vulnerable to cyber-attacks. Smart grid security mainly focuses on mutual authentication and key management techniques. An impeding factor in grid security is the memory and processing constraints of the smart meters. The aim of this thesis is to propose a lightweight mutual authentication protocol with an effective key renewal mechanism between a residential smart meter and a gateway. The authentication protocol proposed in the thesis, guarantees source authentication, data integrity, message confidentiality, as well as non-repudiation. The security analysis renders this protocol robust against several attacks. Furthermore, its performance analysis provides meticulous results as to how the proposed protocol is efficient in terms of computation overhead, average delay and buffer occupancy at the gateway.


Electronics ◽  
2020 ◽  
Vol 9 (8) ◽  
pp. 1218
Author(s):  
Tan Duy Le ◽  
Adnan Anwar ◽  
Seng W. Loke ◽  
Razvan Beuran ◽  
Yasuo Tan

The smart grid system is one of the key infrastructures required to sustain our future society. It is a complex system that comprises two independent parts: power grids and communication networks. There have been several cyber attacks on smart grid systems in recent years that have caused significant consequences. Therefore, cybersecurity training specific to the smart grid system is essential in order to handle these security issues adequately. Unfortunately, concepts related to automation, ICT, smart grids, and other physical sectors are typically not covered by conventional training and education methods. These cybersecurity experiences can be achieved by conducting training using a smart grid co-simulation, which is the integration of at least two simulation models. However, there has been little effort to research attack simulation tools for smart grids. In this research, we first review the existing research in the field, and then propose a smart grid attack co-simulation framework called GridAttackSim based on the combination of GridLAB-D, ns-3, and FNCS. The proposed architecture allows us to simulate smart grid infrastructure features with various cybersecurity attacks and then visualize their consequences automatically. Furthermore, the simulator not only features a set of built-in attack profiles but also enables scientists and electric utilities interested in improving smart grid security to design new ones. Case studies were conducted to validate the key functionalities of the proposed framework. The simulation results are supported by relevant works in the field, and the system can potentially be deployed for cybersecurity training and research.


10.6036/10085 ◽  
2022 ◽  
Vol 97 (1) ◽  
pp. 92-97
Author(s):  
Juan Carlos Olivares Rojas ◽  
ENRIQUE REYES ARCHUNDIA ◽  
JOSE ANTONIO GUTIERREZ GNECCHI ◽  
ARTURO MENDEZ PATIÑO ◽  
JAIME CERDA JACOBO ◽  
...  

Although smart grids offer multiple advantages over traditional grids, there are still challenges to overcome to ensure the quality of service and grid security. In particular, cybersecurity plays an essential role in ensuring grid operation reliability and resilience to external threats. The traditional approach to address cybersecurity issues generally does not consider the human factor as the main component. Recently, the concept of cyber hygiene has emerged, where social and human aspects are fundamental to reduce vulnerabilities and the risk of attacks and breaches. In a similar manner to personal hygiene, which greatly influences people’s health, considering the human factor (i.e., human behaviour, awareness, and training) as a critical cybersecurity component, can significantly improve human operator cybersecurity practices that in turn can result in improved cybersecurity performance. In this paper, the authors propose and test a methodology for implementing cyber hygiene practices in the context of Smart Grid systems, focused on smart metering systems. The results suggest that implementing cyber hygiene practices can improve smart meter cybersecurity and be suitable for implementing other sensitive Smart Grid components. Key Words: Cybersecurity, Cyber Hygiene, Internet of Things, Smart Grid, Smart Meters.


10.29007/fn3p ◽  
2018 ◽  
Author(s):  
Congmiao Li ◽  
Dipti Srinivasan ◽  
Thomas Reindl

Many embedded systems in a Smart Grid have special constraints in terms of timing, cost and power consumption to ensure security. This paper addresses the Smart Grid security problem with a focus on improving the security of crucial components, and reducing the risks from cyber attacks. A hardware architecture to enhance the security of important embedded devices in the smart grid has been proposed and implemented. This hardware based malware detection system runs on a dedicated hardware implemented with FPGA logic, and allows detection in near real-time. The system architecture and results are presented in the paper.


2021 ◽  
Author(s):  
Faisal Y Al Yahmadi ◽  
Muhammad R Ahmed

Many countries around the world are implementing smart grids and smart meters. Malicious users that have moderate level of computer knowledge can manipulate smart meters and launch cyber-attacks. This poses cyber threats to network operators and government security. In order to reduce the number of electricity theft cases, companies need to develop preventive and protective methods to minimize the losses from this issue. In this paper, we propose a model based on software that detects malicious nodes in a smart grid network. The model collects data (electricity consumption/electric bill) from the nodes and compares it with previously obtained data. Support Vector Machine (SVM) model is implemented to classify nodes into good or malicious nodes by (high dimensional) giving the statues of 1 for good nodes and status of -1 for malicious (abnormal) nodes. The detection model also displays the network graphically as well as the data table. Moreover, this model displays the detection error in each cycle. It has a very low false alarm rate (2%) and a high detection rate as high as (98%). Future developments can trace the attack origin to eliminate or block the attack source minimizing losses before human control arrives.


Author(s):  
Janavi Popat ◽  
Harsh Kakadiya ◽  
Lalit Tak ◽  
Neeraj Kumar Singh ◽  
Mahshooq Abdul Majeed ◽  
...  

Smart grid has changed power systems and their reliability concerns. Along with that, cyber security issues are also introduced due to the use of intelligent electronic devices (IEDs), wireless sensory network (WSN), and internet of things (IoT) for two-way communication. This chapter presents a review of different methods used from 2010 to 2020 focusing on citation as the main criteria for reliability assessment of smart grids and proposals to improve reliability when it comes to assessing a practical transmission system. It shows that evolutionary techniques are the latest trend for smart grid security.


Author(s):  
Chien-Ming Chen ◽  
Lili Chen ◽  
Yanyu Huang ◽  
Sachin Kumar ◽  
Jimmy Ming-Tai Wu

AbstractA smart grid (SG) is an advanced power grid system deployed in a cloud center and smart meters (at the consumer end) that provides higher reliability, better data protection, improved power efficiency, automatic monitoring, and effective management of power consumption. However, an SG also poses certain challenges that need to be addressed. For example, data provided by a smart meter are time-sensitive and cannot handle high latency in an SG. Moreover, a smart meter depends on memory, energy, and other factors. Besides, the security between a cloud center and a smart meter is a critical issue that needs to be resolved. Edge computing, an extension of cloud computing deployed in an edge network between a cloud center and the end devices, is an efficient solution to the aforementioned issues. Therefore, in this study, we propose a secure mutual authentication protocol based on edge computing for use in an SG.


2021 ◽  
Author(s):  
Chien-Ming Chen ◽  
Lili Chen ◽  
Yanyu Huang ◽  
Sachin Kumar ◽  
Jimmy Ming-Tai Wu

Abstract A smart grid (SG) is an advanced power grid system deployed in a cloud center and smart meters (at the consumer end) that provides higher reliability, better data protection, improved power efficiency, automatic monitoring, and effective management of power consumption. However, an SG also poses certain challenges that need to be addressed. For example, data provided by a smart meter are time-sensitive and cannot handle high latency in an SG. Moreover, a smart meter depends on memory, energy, and other factors. Besides, the security between a cloud center and a smart meter is a critical issue that needs to be resolved. Edge computing, an extension of cloud computing deployed in an edge network between a cloud center and the end devices, is an efficient solution to the aforementioned issues. Therefore, in this study, we propose a secure mutual authentication protocol based on edge computing for use in an SG.


2020 ◽  
Author(s):  
Chien-Ming Chen ◽  
Lili Chen ◽  
Yanyu Huang ◽  
Sachin Kumar ◽  
Jimmy Ming-Tai Wu

Abstract A smart grid (SG) is an advanced power grid system deployed in a cloud center and smart meters (at the consumer end) that provides higher reliability, better data protection, improved power efficiency, automatic monitoring, and effective management of power consumption. However, an SG also poses certain challenges that need to be addressed. For example, data provided by a smart meter are time sensitive and cannot handle high latency in an SG. Moreover, a smart meter depends on the memory, energy, and other factors. In addition, the security between a cloud center and smart meter is an important issue that needs to be resolved. Edge computing, which is an extension of cloud computing deployed in an edge network between a cloud center and the end devices, is an efficient solution to the above-mentioned issues. Therefore, in this study, we propose a secure mutual authentication protocol based on edge computing for use in an SG.


Sign in / Sign up

Export Citation Format

Share Document