Denial of Service Attack on Protocols for Smart Grid Communications

Author(s):  
Swapnoneel Roy

In this work, a denial of service (DoS) attack known as the clogging attack has been performed on three different modern protocols for smart grid (SG) communications. The first protocol provides authentication between smart meters (SM) and a security and authentication server (SAS). The second protocol facilitates secure and private communications between electric vehicles (EV) and the smart grid. The third protocol is a secure and efficient key distribution protocol for the smart grid. The protocols differ in either their applications (authentication, key distribution), or their ways of communications (usage of encryption, hashes, timestamps etc.). But they are similar in their purpose of design (for the smart grid) and their usage of computationally intensive mathematical operations (modular exponentiation, ECC) to implement security. Solutions to protect these protocols against this attack are then illustrated along with identifying the causes behind the occurrence of this vulnerability in SG communication protocols in general.

Author(s):  
Swapnoneel Roy

In this work, a denial of service (DoS) attack known as the clogging attack has been performed on three different modern protocols for smart grid (SG) communications. The first protocol provides authentication between smart meters (SM) and a security and authentication server (SAS). The second protocol facilitates secure and private communications between electric vehicles (EV) and the smart grid. The third protocol is a secure and efficient key distribution protocol for the smart grid. The protocols differ in either their applications (authentication, key distribution), or their ways of communications (usage of encryption, hashes, timestamps etc.). But they are similar in their purpose of design (for the smart grid) and their usage of computationally intensive mathematical operations (modular exponentiation, ECC) to implement security. Solutions to protect these protocols against this attack are then illustrated along with identifying the causes behind the occurrence of this vulnerability in SG communication protocols in general.


2019 ◽  
Vol 19 (15&16) ◽  
pp. 1313-1324
Author(s):  
Maximilian Daschner ◽  
David I. Kaiser ◽  
Joseph A. Formaggio

Quantum key distribution (QKD) involving polarized photons could be vulnerable to a jamming (or denial-of-service) attack, in which a third party applies an external magnetic field to rotate the plane of polarization of photons headed toward one of the two intended recipients. Sufficiently large Faraday rotation of one of the polarized beams would prevent Alice and Bob from establishing a secure quantum channel. We investigate requirements to induce such rotation both for free-space transmission and for transmission via optical fiber, and find reasonable ranges of parameters in which a jamming attack could be successful against fiber-based QKD, even for systems that implement automated recalibration for polarization-frame alignment. The jamming attack could be applied selectively and indefinitely by an adversary without revealing her presence, and could be further combined with various eavesdropping attacks to yield unauthorized information.


2011 ◽  
Vol 7 (3) ◽  
pp. 271-283
Author(s):  
Ilsun You ◽  
Jong-Hyouk Lee ◽  
Yoshiaki Hori ◽  
Kouichi Sakurai

The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction with an authentication server that is required for every authentication is considered as a delay factor during handovers. In this paper, we present an improvement of MISP that utilizes the fast handover approach of Fast Mobile IPv6 and minimizes an involvement of the authentication server while eliminating identified security drawbacks of MISP. The formal security analysis is performed to verify the correctness of the proposed scheme. Moreover, the handover performance of the proposed scheme is compared with an existing scheme.


2018 ◽  
Vol 382 (45) ◽  
pp. 3253-3261 ◽  
Author(s):  
Yuan Li ◽  
Peng Huang ◽  
Shiyu Wang ◽  
Tao Wang ◽  
Dengwen Li ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document