Visible to the public An Efficient NSKDP Authentication Method to Secure Smart Grid

TitleAn Efficient NSKDP Authentication Method to Secure Smart Grid
Publication TypeConference Paper
Year of Publication2017
AuthorsTavasoli, M., Alishahi, S., Zabihi, M., Khorashadizadeh, H., Mohajerzadeh, A. H.
Conference Name2017 IEEE International Conference on Smart Energy Grid Engineering (SEGE)
ISBN Number978-1-5386-1776-2
KeywordsCommunication networks, consumer energy supply, countermeasures attacks, cryptographic protocols, cryptography strategies, cyber security, Encryption, Hash functions, human factors, Key Management, Meters, NSKDP authentication method, power system security, privacy, private key cryptography, pubcrawl, secure smart grid, Servers, smart electric meters, Smart grid, smart grid consumer privacy, smart grid power, Smart grids, smart meters, smart power grids, symmetric key distribution method, Vulnerability
Abstract

Since the Information Networks are added to the current electricity networks, the security and privacy of individuals is challenged. This combination of technologies creates vulnerabilities in the context of smart grid power which disrupt the consumer energy supply. Methods based on encryption are against the countermeasures attacks that have targeted the integrity and confidentiality factors. Although the cryptography strategies are used in Smart Grid, key management which is different in size from tens to millions of keys (for meters), is considered as the critical processes. The Key mismanagement causes to reveal the secret keys for attacker, a symmetric key distribution method is recently suggested by [7] which is based on a symmetric key distribution, this strategy is very suitable for smart electric meters. The problem with this method is its vulnerability to impersonating respondents attack. The proposed approach to solve this problem is to send the both side identifiers in encrypted form based on hash functions and a random value, the proposed solution is appropriate for devices such as meters that have very little computing power.

URLhttps://ieeexplore.ieee.org/document/8052812
DOI10.1109/SEGE.2017.8052812
Citation Keytavasoli_efficient_2017