scholarly journals A novel multi-stage distributed authentication scheme for smart meter communication

2021 ◽  
Vol 7 ◽  
pp. e643
Author(s):  
Manjunath Hegde ◽  
Adnan Anwar ◽  
Karunakar Kotegar ◽  
Zubair Baig ◽  
Robin Doss

Smart meters have ensured effective end-user energy consumption data management and helping the power companies towards network operation efficiency. However, recent studies highlighted that cyber adversaries may launch attacks on smart meters that can cause data availability, integrity, and confidentiality issues both at the consumer side or at a network operator’s end. Therefore, research on smart meter data security has been attributed as one of the top priorities to ensure the safety and reliability of the critical energy system infrastructure. Authentication is one of the basic building blocks of any secure system. Numerous authentication schemes have been proposed for the smart grid, but most of these methods are applicable for two party communication. In this article, we propose a distributed, dynamic multistage authenticated key agreement scheme for smart meter communication. The proposed scheme provides secure authentication between smart meter, NAN gateway, and SCADA energy center in a distributed manner. Through rigorous cryptanalysis we have proved that the proposed scheme resist replay attack, insider attack, impersonation attack and man-in-the-middle attack. Also, it provides perfect forward secrecy, device anonymity and data confidentiality. The proposed scheme security is formally proved in the CK—model and, using BAN logic, it is proved that the scheme creates a secure session between the communication participants. The proposed scheme is simulated using the AVISPA tool and verified the safety against all active attacks. Further, efficiency analysis of the scheme has been made by considering its computation, communication, and functional costs. The computed results are compared with other related schemes. From these analysis results, it is proved that the proposed scheme is robust and secure when compared to other schemes.

2020 ◽  
Author(s):  
Ryan Kelly

The regulated rollout of smart meters is intended to digitise the energy infrastructure with the goal of creating a future-oriented European energy system. In order to implement the EU requirements, the German legislature is pursuing a regulatory strategy with mandatory legal toleration of intelligent metering systems. This is associated with a variety of fundamental rights and data protection problems. The study examines the smart meter rollout in its complex reality between constitutional, energy and data protection law, as well as European and national regulations. The implementation of smart meters will be discussed in its entirety and analysed on the basis of constitutional and EU law. The focus lies, in particular, on the dogmatic localisation in the European constitutional framework and the examination on the legal basis of the General Data Protection Regulation (GDPR). The results of the study are visualised in two condensed illustrations.


Author(s):  
Kodamala Venkatesulu ◽  
G. Mamatha

A smart meter is an advanced meter which measures power consumption in much more accurately than a conventional meter and communicates the collected information back to the usage for load limit and tariff purposes. The objectives are privacy that nobody can obtain power usage of other person’s information if the protocol is accurately executed. Real time authentication that transmitted message can be real timely authorized by the receiver which is essential to resist against the denial of service (DoS) attack, Replay attack resistance that receiver can validate whether the received messages are the replay of previously authorized persons. The main objective of this new technology is the bidirectional flow of information. The smart meters send the power consumption reports to the power operator and also control instructions are sent from electricity board in order to be executed by the smart meters. In between, there consists of some gateways which are responsible for data accumulation. The main objective of the system is the communication of smart meter and neighborhood gateway. The presented communication scheme must consider the necessity for consumption reports transmission in short time intervals, and also it must consists of both security and the limited resources of smart meters. This implemented system demonstrates substantial reduction in storage space and data modifications are avoided.


2014 ◽  
Vol 11 (3) ◽  
pp. 1091-1112 ◽  
Author(s):  
Hsing-Chung Chen ◽  
Cheng-Ying Yang ◽  
Hui-Kai Su ◽  
Ching-Chuan Wei ◽  
Chao-Ching Lee

Electronic mail (e-mail) has been used to transfer various types of electronic data in Internet. Usually, a user has to send an e-mail to a specific group of users with a secure delivery mechanism. In this paper, a novel and feasible e-mail delivery mechanism using the secure multicast protocol with an ID-based factorial number structure (FNS) is proposed in the multicast system. In the proposed e-mail delivery mechanism, the e-mail is required to be encrypted before sending out in order to safeguard the message via a public channel, such as wire public switching communication links and wireless communication systems. Without loss generality, the public-key system is adopted in the proposed secure multicast system for a convenient and easy key management. The proposed scheme outperforms the existing methods for more easily to construct secure e-mail system. Furthermore, the security of the proposed scheme is analyzed, including replay attack, sender impersonation attack, unknown key-share attack, forgery attack and insider attack. Finally, the computation complexities of the proposed mechanism are discussed. The result shows that the proposed scheme outperforms the CRT-based secure e-mail scheme.


2011 ◽  
Vol 145 ◽  
pp. 184-188
Author(s):  
Young Hwa An

In 2008, Bindu et al. proposed an improvement to Chien et al.'s remote password authentication scheme preserving user anonymity, and has asserted that the scheme is secure against replay attack, guessing attack, insider attack and man-in-the-middle attack, etc. However, in this paper, we have shown that Bindu et al.'s scheme is still insecure against man-in-the-middle attack and password guessing attack, and does not provide user anonymity. Also, we propose an improved scheme to withstand these weaknesses, while preserving their merits, even if the secret information stored in the smart card is revealed. As a result of analysis, the proposed scheme is secure against user impersonation attack, server masquerading attack, password guessing attack and does provide user anonymity. And we can see that the proposed scheme is relatively more effective than Bindu et al.'s scheme.


2020 ◽  
Vol 12 (3) ◽  
pp. 168-174
Author(s):  
Rashmi Sahu ◽  
Maitraiyee Konar ◽  
Sudip Kundu

Background: Sensing of biomedical signals is crucial for monitoring of various health conditions. These signals have a very low amplitude (in μV) and a small frequency range (<500 Hz). In the presence of various common-mode interferences, biomedical signals are difficult to detect. Instrumentation amplifiers (INAs) are usually preferred to detect these signals due to their high commonmode rejection ratio (CMRR). Gain accuracy and CMRR are two important parameters associated with any INA. This article, therefore, focuses on the improvement of the gain accuracy and CMRR of a low power INA topology. Objective: The objective of this article is to achieve high gain accuracy and CMRR of low power INA by having high gain operational amplifiers (Op-Amps), which are the building blocks of the INAs. Methods: For the implementation of the Op-Amps and the INAs, the Cadence Virtuoso tool was used. All the designs and implementation were realized in 0.18 μm CMOS technology. Results: Three different Op-Amp topologies namely single-stage differential Op-Amp, folded cascode Op-Amp, and multi-stage Op-Amp were implemented. Using these Op-Amp topologies separately, three Op-Amp-based INAs were realized and compared. The INA designed using the high gain multistage Op-Amp topology of low-frequency gain of 123.89 dB achieves a CMRR of 164.1 dB, with the INA’s gain accuracy as good as 99%, which is the best when compared to the other two INAs realized using the other two Op-Amp topologies implemented. Conclusion: Using very high gain Op-Amps as the building blocks of the INA improves the gain accuracy of the INA and enhances the CMRR of the INA. The three Op-Amp-based INA designed with the multi-stage Op-Amps shows state-of-the-art characteristics as its gain accuracy is 99% and CMRR is as high as 164.1 dB. The power consumed by this INA is 29.25 μW by operating on a power supply of ±0.9V. This makes this INA highly suitable for low power measurement applications.


2020 ◽  
Vol 62 (5-6) ◽  
pp. 287-293
Author(s):  
Felix Günther

AbstractSecure connections are at the heart of today’s Internet infrastructure, protecting the confidentiality, authenticity, and integrity of communication. Achieving these security goals is the responsibility of cryptographic schemes, more specifically two main building blocks of secure connections. First, a key exchange protocol is run to establish a shared secret key between two parties over a, potentially, insecure connection. Then, a secure channel protocol uses that shared key to securely transport the actual data to be exchanged. While security notions for classical designs of these components are well-established, recently developed and standardized major Internet security protocols like Google’s QUIC protocol and the Transport Layer Security (TLS) protocol version 1.3 introduce novel features for which supporting security theory is lacking.In my dissertation [20], which this article summarizes, I studied these novel and advanced design aspects, introducing enhanced security models and analyzing the security of deployed protocols. For key exchange protocols, my thesis introduces a new model for multi-stage key exchange to capture that recent designs for secure connections establish several cryptographic keys for various purposes and with differing levels of security. It further introduces a formalism for key confirmation, reflecting a long-established practical design criteria which however was lacking a comprehensive formal treatment so far. For secure channels, my thesis captures the cryptographic subtleties of streaming data transmission through a revised security model and approaches novel concepts to frequently update key material for enhanced security through a multi-key channel notion. These models are then applied to study (and confirm) the security of the QUIC and TLS 1.3 protocol designs.


Energies ◽  
2021 ◽  
Vol 14 (15) ◽  
pp. 4674
Author(s):  
Qingsheng Zhao ◽  
Juwen Mu ◽  
Xiaoqing Han ◽  
Dingkang Liang ◽  
Xuping Wang

The operation state detection of numerous smart meters is a significant problem caused by manual on-site testing. This paper addresses the problem of improving the malfunction detection efficiency of smart meters using deep learning and proposes a novel evaluation model of operation state for smart meter. This evaluation model adopts recurrent neural networks (RNN) to predict power consumption. According to the prediction residual between predicted power consumption and the observed power consumption, the malfunctioning smart meter is detected. The training efficiency for the prediction model is improved by using transfer learning (TL). This evaluation uses an accumulator algorithm and threshold setting with flexibility for abnormal detection. In the simulation experiment, the detection principle is demonstrated to improve efficient replacement and extend the average using time of smart meters. The effectiveness of the evaluation model was verified on the actual station dataset. It has accurately detected the operation state of smart meters.


2021 ◽  
Author(s):  
Kor de Jong ◽  
Marc van Kreveld ◽  
Debabrata Panja ◽  
Oliver Schmitz ◽  
Derek Karssenberg

&lt;p&gt;Data availability at global scale is increasing exponentially. Although considerable challenges remain regarding the identification of model structure and parameters of continental scale hydrological models, we will soon reach the situation that global scale models could be defined at very high resolutions close to 100 m or less. One of the key challenges is how to make simulations of these ultra-high resolution models tractable ([1]).&lt;/p&gt;&lt;p&gt;Our research contributes by the development of a model building framework that is specifically designed to distribute calculations over multiple cluster nodes. This framework enables domain experts like hydrologists to develop their own large scale models, using a scripting language like Python, without the need to acquire the skills to develop low-level computer code for parallel and distributed computing.&lt;/p&gt;&lt;p&gt;We present the design and implementation of this software framework and illustrate its use with a prototype 100 m, 1 h continental scale hydrological model. Our modelling framework ensures that any model built with it is parallelized. This is made possible by providing the model builder with a set of building blocks of models, which are coded in such a manner that parallelization of calculations occurs within and across these building blocks, for any combination of building blocks. There is thus full flexibility on the side of the modeller, without losing performance.&lt;/p&gt;&lt;p&gt;This breakthrough is made possible by applying a novel approach to the implementation of the model building framework, called asynchronous many-tasks, provided by the HPX C++ software library ([3]). The code in the model building framework expresses spatial operations as large collections of interdependent tasks that can be executed efficiently on individual laptops as well as computer clusters ([2]). Our framework currently includes the most essential operations for building large scale hydrological models, including those for simulating transport of material through a flow direction network. By combining these operations, we rebuilt an existing 100 m, 1 h resolution model, thus far used for simulations of small catchments, requiring limited coding as we only had to replace the computational back end of the existing model. Runs at continental scale on a computer cluster show acceptable strong and weak scaling providing a strong indication that global simulations at this resolution will soon be possible, technically speaking.&lt;/p&gt;&lt;p&gt;Future work will focus on extending the set of modelling operations and adding scalable I/O, after which existing models that are currently limited in their ability to use the computational resources available to them can be ported to this new environment.&lt;/p&gt;&lt;p&gt;More information about our modelling framework is at https://lue.computationalgeography.org.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;[1] M. Bierkens. Global hydrology 2015: State, trends, and directions. Water Resources Research, 51(7):4923&amp;#8211;4947, 2015.&lt;br&gt;[2] K. de Jong, et al. An environmental modelling framework based on asynchronous many-tasks: scalability and usability. Submitted.&lt;br&gt;[3] H. Kaiser, et al. HPX - The C++ standard library for parallelism and concurrency. Journal of Open Source Software, 5(53):2352, 2020.&lt;/p&gt;


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jillian Carmody ◽  
Samir Shringarpure ◽  
Gerhard Van de Venter

Purpose The purpose of this paper is to demonstrate privacy concerns arising from the rapidly increasing advancements and use of artificial intelligence (AI) technology and the challenges of existing privacy regimes to ensure the on-going protection of an individual’s sensitive private information. The authors illustrate this through a case study of energy smart meters and suggest a novel combination of four solutions to strengthen privacy protection. Design/methodology/approach The authors illustrate how, through smart meter obtained energy data, home energy providers can use AI to reveal private consumer information such as households’ electrical appliances, their time and frequency of usage, including number and model of appliance. The authors show how this data can further be combined with other data to infer sensitive personal information such as lifestyle and household income due to advances in AI technologies. Findings The authors highlight data protection and privacy concerns which are not immediately obvious to consumers due to the capabilities of advanced AI technology and its ability to extract sensitive personal information when applied to large overlapping granular data sets. Social implications The authors question the adequacy of existing privacy legislation to protect sensitive inferred consumer data from AI-driven technology. To address this, the authors suggest alternative solutions. Originality/value The original value of this paper is that it illustrates new privacy issues brought about by advances in AI, failings in current privacy legislation and implementation and opens the dialog between stakeholders to protect vulnerable consumers.


Sign in / Sign up

Export Citation Format

Share Document