Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Node Authentication and Key Generation/Update Protocol and data Integrity Verification for Safety Communication in Smart Grid Environment


Affiliations
1 Soongsil University, Information Science Center, 50 Sangdo-Ro, Dongjak-Gu, Seoul, 07027, Korea, Democratic People's Republic of
2 Sungkyul University, 53 Sungkyul University-ro, Manan-gu, Anyang-Si, Gyeonggi-Do, 14097, Korea, Democratic People's Republic of
     

   Subscribe/Renew Journal


Background/Objectives: These days, IoT (Internet of Things) based devices and services, such as sensors and smart devices, are on the increase. And, there have been many studies on the smart grid platforms which has the structure enabling users to generate, demand, and distribute electricity directly, including solar power generation or electric cars. Since smart grid uses the existing IT infrastructure as it is, the platform has security vulnerabilities of the IT infrastructure and need to have security measures. Methods/Statistical analysis: In the proposed method of this study, a session key is generated through Server-DCU-Smart Meter authentication in order for safe communication in the smart grid environment. A group key is generated through authentication in order to make possible group communication between multiple nodes, and it is possible to join and leave a group. In order for the safety of a session key, a key is updated constantly with an IV (Initial Vector) value. In order for the integrity verification of the data in transmission, the hash tree using the hash values of the data in transmission is applied. Findings: Safety and performance analysis was conducted between the proposed protocol and the IEEE802.1x standard protocol which is applied to node authentication in the conventional wired and wireless communication environment. The proposed protocol completed authentication through three times of Handshake. Regarding performance evaluation, there was a difference in the authentication process speed of about 88.7 ms per authentication. Improvements/Applications: In the future, it will be necessary to research not only Server–DCU–Smart Meter authentication, but user authentication and device authentication between devices, sensors, and Smart Meter in the HAN (Home Area Network), and to study safety and security in data transmission.

Keywords

Smart Grid, Mutual Authentication, Hash Chain, AMI, Data Integrity.
Subscription Login to verify subscription
User
Notifications
Font Size


  • Xuesong Zhou, Youjie Ma, Zhiqiang Gao, Hui Wang, Summary of smart metering and smart grid communication, Schol of Electrical and Electronic Engineering Tianjin University of Technology, IEEE International Conference on Mechatronics and Automation (ICMA), pp.300-304, 2017.
  • Taimin Zhang, Xin Lu, Xiaoyu ji, Wenyuan Xu, An Identity-Based Secure Communication Scheme for Advanced Metering Infrastructure in Smart Grid, College of Electrical Engineering, Zhejiang University, 29th Chinese Control And Decision Conference(CCDC), 2017, pp.6959 – 6964, 2017.
  • Neetesh Saxena, Bong Jun Choi, Santiago Grijalva, Secure and privacy-preserving concentration of metering data in AMI networks, Department of Computing and Informatics, Bournemouth University, UK,IEEE International Conference on Communications (ICC), pp.1-7, 2017.
  • Sangji Lee, Jinsuk Bong, Sunhee Shin, Yongtae Shin, A security mechanism of Smart Grid AMI network through smart device mutual authentication, Department of Computing Soongsil University South Korea, The International Conference on Information Networking 2014 (ICOIN2014), pp. 592-595, 2014.
  • Myong-Kyu, Sun-Hyung Kim, Analysis of Smart Grid Technologies and Domestic and Foreign Policy Trends, Dept. of Information and Communication Engineering, Soonchunhyang University, Proceedings of KIIT Summer Conference, pp.295-301, 2013.- http://www.riss.kr/link?id=A99626230
  • Khaled Rabieh, Mohamed M. E. A. Mahmoud, Kemal Akkaya, Samet Tonyali, Scalable Certificate Revocation Schemes for Smart Grid AMI Networks Using Bloom Filters, IEEE Transactions on Dependable and Secure Computing, pp.420-432, 2017.
  • Muhammad Shahzad Jan, Mehreen Afzal, Hash chain based strong password authentication scheme, Department of Information Security Military College of Signals NUST Islamabad Pakistan,13th International Bhurban Conference on Applied Sciences and Technology (IBCAST), pp. 355-360, 2017.
  • Nobuo Funabiki, Toru Nakanishi, Hideo Takahashi, Kouhei Miki, Jun Kawashima, A Proposal of Anonymous IEEE802.1X Authentication Protocol for Wireless Networks, Department of Communication Network Engineering Okayama University, 2nd IEEE Workshop on Secure Network Protocols, pp.26-31, 2006.
  • Fanzheng Kong, Weili Huang, IEEE802.1x of protocol analysis and improvement, College of Information and Electrical Engineering Hebei University of Engineering Handan China,3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), pp.v3-282-v3-285, 2010.
  • Hui Hu, Di Wu, Tao Tang, Network Security Admission Solution Based on IEEE802.1X, Information Technology Center China, International Conference on Computing, Measurement, Control and Sensor Network, pp.336-339, 2012.

Abstract Views: 175

PDF Views: 0




  • Node Authentication and Key Generation/Update Protocol and data Integrity Verification for Safety Communication in Smart Grid Environment

Abstract Views: 175  |  PDF Views: 0

Authors

Won-Kyu Choi
Soongsil University, Information Science Center, 50 Sangdo-Ro, Dongjak-Gu, Seoul, 07027, Korea, Democratic People's Republic of
Jong-Oh Park
Sungkyul University, 53 Sungkyul University-ro, Manan-gu, Anyang-Si, Gyeonggi-Do, 14097, Korea, Democratic People's Republic of
Moon-Seok Jun
Soongsil University, Information Science Center, 50 Sangdo-Ro, Dongjak-Gu, Seoul, 07027, Korea, Democratic People's Republic of

Abstract


Background/Objectives: These days, IoT (Internet of Things) based devices and services, such as sensors and smart devices, are on the increase. And, there have been many studies on the smart grid platforms which has the structure enabling users to generate, demand, and distribute electricity directly, including solar power generation or electric cars. Since smart grid uses the existing IT infrastructure as it is, the platform has security vulnerabilities of the IT infrastructure and need to have security measures. Methods/Statistical analysis: In the proposed method of this study, a session key is generated through Server-DCU-Smart Meter authentication in order for safe communication in the smart grid environment. A group key is generated through authentication in order to make possible group communication between multiple nodes, and it is possible to join and leave a group. In order for the safety of a session key, a key is updated constantly with an IV (Initial Vector) value. In order for the integrity verification of the data in transmission, the hash tree using the hash values of the data in transmission is applied. Findings: Safety and performance analysis was conducted between the proposed protocol and the IEEE802.1x standard protocol which is applied to node authentication in the conventional wired and wireless communication environment. The proposed protocol completed authentication through three times of Handshake. Regarding performance evaluation, there was a difference in the authentication process speed of about 88.7 ms per authentication. Improvements/Applications: In the future, it will be necessary to research not only Server–DCU–Smart Meter authentication, but user authentication and device authentication between devices, sensors, and Smart Meter in the HAN (Home Area Network), and to study safety and security in data transmission.

Keywords


Smart Grid, Mutual Authentication, Hash Chain, AMI, Data Integrity.

References