scholarly journals A Secure and Efficient Group Key Management Scheme for Clusters of String Inverters

2020 ◽  
Vol 10 (21) ◽  
pp. 7900
Author(s):  
Mariano Basile ◽  
Gianluca Dini ◽  
Filippo Vernia ◽  
Luigi Lamoglie

A string inverter converts the low voltage direct current coming from the string of its Photovoltaic (PV) panels into alternating current to be exported to the grid. In today Smart Grid’s context, PV plants feature clusters of cooperating smart string inverters that exchange information in a multicast fashion (typically) over the Internet Protocol (IP). However, IP multicast does not provide any mechanism to limit the access to multicast data to authorized subjects only. A security infringement may cause a cluster either into exporting no energy into the grid (zero energy attack) or more energy than the limit set (energy overflow attack). Both the attacks can lead to potential severe consequences. In this regard, we are the first addressing those issues. Particularly, we propose a Key Management Service (KMS) for group key generation and distribution. The KMS provides forward secrecy and periodic refresh. We implement a prototype on a cluster of Power-One Italy S.p.A. a member of FIMER Group smart string inverters and evaluate the performance. Experimental results indicate that the scheme scales up to clusters composed of 50 inverters with an efficiency of 90.5% in terms of latency for group key distribution and 99% in terms of memory overhead.

2009 ◽  
Vol 29 (3) ◽  
pp. 638-642
Author(s):  
Wei-ni ZENG ◽  
Ya-ping LIN ◽  
Qiu-ying LU

Processes ◽  
2020 ◽  
Vol 8 (10) ◽  
pp. 1300
Author(s):  
Mai Trung Dong ◽  
Haitao Xu

In group key management, the implementation of encryption often fails because multicast communication does not provide reliable linkage. In this paper, a new group key management scheme is proposed for multicast communication in fog computing networks. In the proposed scheme, any legal fog user belonging to a fog node will be able to decrypt a ciphertext encrypted by a secret shared key. The shared secret key is divided into key segments. In the rekeying operation process, each key segment is split into two factors with its shared production mechanism. The key updates are required to belong to the fog provider or the group management device. Fog users will have independent key segments unchanged. Then, the cost, the message of rekeying, and the dependence on credible channels will be decreased. This method can resist collusion attacks and ensure backward security and forward security, even if the number of users leaving is larger than the threshold value. Our scheme is also suitable for untrusted affiliate networks.


Sign in / Sign up

Export Citation Format

Share Document