An Efficient NSKDP Authentication Method to Secure Smart Grid
Title | An Efficient NSKDP Authentication Method to Secure Smart Grid |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Tavasoli, M., Alishahi, S., Zabihi, M., Khorashadizadeh, H., Mohajerzadeh, A. H. |
Conference Name | 2017 IEEE International Conference on Smart Energy Grid Engineering (SEGE) |
ISBN Number | 978-1-5386-1776-2 |
Keywords | Communication networks, consumer energy supply, countermeasures attacks, cryptographic protocols, cryptography strategies, cyber security, Encryption, Hash functions, human factors, Key Management, Meters, NSKDP authentication method, power system security, privacy, private key cryptography, pubcrawl, secure smart grid, Servers, smart electric meters, Smart grid, smart grid consumer privacy, smart grid power, Smart grids, smart meters, smart power grids, symmetric key distribution method, Vulnerability |
Abstract | Since the Information Networks are added to the current electricity networks, the security and privacy of individuals is challenged. This combination of technologies creates vulnerabilities in the context of smart grid power which disrupt the consumer energy supply. Methods based on encryption are against the countermeasures attacks that have targeted the integrity and confidentiality factors. Although the cryptography strategies are used in Smart Grid, key management which is different in size from tens to millions of keys (for meters), is considered as the critical processes. The Key mismanagement causes to reveal the secret keys for attacker, a symmetric key distribution method is recently suggested by [7] which is based on a symmetric key distribution, this strategy is very suitable for smart electric meters. The problem with this method is its vulnerability to impersonating respondents attack. The proposed approach to solve this problem is to send the both side identifiers in encrypted form based on hash functions and a random value, the proposed solution is appropriate for devices such as meters that have very little computing power. |
URL | https://ieeexplore.ieee.org/document/8052812 |
DOI | 10.1109/SEGE.2017.8052812 |
Citation Key | tavasoli_efficient_2017 |
- privacy
- Vulnerability
- symmetric key distribution method
- smart power grids
- smart meters
- Smart Grids
- smart grid power
- smart grid consumer privacy
- Smart Grid
- smart electric meters
- Servers
- secure smart grid
- pubcrawl
- private key cryptography
- Communication networks
- power system security
- NSKDP authentication method
- Meters
- key management
- Human Factors
- Hash functions
- encryption
- cyber security
- cryptography strategies
- Cryptographic Protocols
- countermeasures attacks
- consumer energy supply