Security and privacy for smart grid using scalable key management
Title | Security and privacy for smart grid using scalable key management |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Beevi, L. S., Merlin, G., MoganaPriya, G. |
Conference Name | 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) |
Date Published | March 2016 |
Publisher | IEEE |
ISBN Number | 978-1-4673-9939-5 |
Keywords | authentication, cryptographic protocols, elliptic curve public key technique, Fault tolerance, fault-tolerance, Key Management, man-in-the-middle attack, Needham Schroder Authentication, Needham-Schroeder authentication protocol, power system management, power system security, Protocols, pubcrawl, Public key, public key cryptography, replay attack, Scalability, scalable key management, Scalable Security, secure key management, Sensors, Smart grid, Smart grids, smart power grids, symmetric key scheme works, symmetric key technique |
Abstract | This paper focuses on the issues of secure key management for smart grid. With the present key management schemes, it will not yield security for deployment in smart grid. A novel key management scheme is proposed in this paper which merges elliptic curve public key technique and symmetric key technique. Based on the Needham-Schroeder authentication protocol, symmetric key scheme works. Well known threats like replay attack and man-in-the-middle attack can be successfully abolished using Smart Grid. The benefits of the proposed system are fault-tolerance, accessibility, Strong security, scalability and Efficiency. |
URL | http://ieeexplore.ieee.org/document/7755614/ |
DOI | 10.1109/ICEEOT.2016.7755614 |
Citation Key | beevi_security_2016 |
- Public key
- symmetric key technique
- symmetric key scheme works
- smart power grids
- Smart Grids
- Smart Grid
- sensors
- secure key management
- Scalable Security
- scalable key management
- Scalability
- replay attack
- public key cryptography
- authentication
- pubcrawl
- Protocols
- power system security
- power system management
- Needham-Schroeder authentication protocol
- Needham Schroder Authentication
- man-in-the-middle attack
- key management
- Fault-Tolerance
- fault tolerance
- elliptic curve public key technique
- Cryptographic Protocols