Visible to the public Security and privacy for smart grid using scalable key management

TitleSecurity and privacy for smart grid using scalable key management
Publication TypeConference Paper
Year of Publication2016
AuthorsBeevi, L. S., Merlin, G., MoganaPriya, G.
Conference Name2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)
Date PublishedMarch 2016
PublisherIEEE
ISBN Number978-1-4673-9939-5
Keywordsauthentication, cryptographic protocols, elliptic curve public key technique, Fault tolerance, fault-tolerance, Key Management, man-in-the-middle attack, Needham Schroder Authentication, Needham-Schroeder authentication protocol, power system management, power system security, Protocols, pubcrawl, Public key, public key cryptography, replay attack, Scalability, scalable key management, Scalable Security, secure key management, Sensors, Smart grid, Smart grids, smart power grids, symmetric key scheme works, symmetric key technique
Abstract

This paper focuses on the issues of secure key management for smart grid. With the present key management schemes, it will not yield security for deployment in smart grid. A novel key management scheme is proposed in this paper which merges elliptic curve public key technique and symmetric key technique. Based on the Needham-Schroeder authentication protocol, symmetric key scheme works. Well known threats like replay attack and man-in-the-middle attack can be successfully abolished using Smart Grid. The benefits of the proposed system are fault-tolerance, accessibility, Strong security, scalability and Efficiency.

URLhttp://ieeexplore.ieee.org/document/7755614/
DOI10.1109/ICEEOT.2016.7755614
Citation Keybeevi_security_2016