Visible to the public Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree 4-Way Handshaking

TitleSmart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree 4-Way Handshaking
Publication TypeJournal Article
Year of Publication2014
AuthorsBin Hu, Gharavi, H.
JournalSmart Grid, IEEE Transactions on
Volume5
Pagination550-558
Date PublishedMarch
ISSN1949-3053
Keywordsauthentication, Computer crime, computer network performance evaluation, computer network security, cost-ef- fective communications, cryptographic protocols, cyber attack, denial-of-service attack model, distributed mesh sensor networks, dynamic key distribution strategy updating, efficient mesh security association, EMSA, HAN, home area networks, home networks, IEEE 802.11s, Logic gates, Merkle tree 4-way handshaking scheme, Mesh networks, NAN, neighborhood area networks, network performance, network resiliency improvement, plant-generation local area networks, Protocols, SAE, security attacks, security protocols, simultaneous authentication-of-equals, Smart grid, smart grid mesh network security enhancement, Smart grids, smart power grids, substation local area networks, Substations, trees (mathematics), wireless LAN, wireless local area networks, wireless mesh networks, Wireless sensor networks, WLAN
Abstract

Distributed mesh sensor networks provide cost-effective communications for deployment in various smart grid domains, such as home area networks (HAN), neighborhood area networks (NAN), and substation/plant-generation local area networks. This paper introduces a dynamically updating key distribution strategy to enhance mesh network security against cyber attack. The scheme has been applied to two security protocols known as simultaneous authentication of equals (SAE) and efficient mesh security association (EMSA). Since both protocols utilize 4-way handshaking, we propose a Merkle-tree based handshaking scheme, which is capable of improving the resiliency of the network in a situation where an intruder carries a denial of service attack. Finally, by developing a denial of service attack model, we can then evaluate the security of the proposed schemes against cyber attack, as well as network performance in terms of delay and overhead.

URLhttp://ieeexplore.ieee.org/document/6599007/
DOI10.1109/TSG.2013.2277963
Citation Key6599007