By Topic

A Secure Smart-Metering Protocol Over Power-Line Communication

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

7 Author(s)
Sungwook Kim ; Dept. of Math. Sci., Seoul Nat. Univ., Seoul, South Korea ; Eun Young Kwon ; Myungsun Kim ; Jung Hee Cheon
more authors

A smart-metering system is a system that meters electricity, gas, and water consumption and manages their supply by controlling measuring devices remotely. Power-line communication (PLC) does not require a separate communication line and can be easily installed by utilizing power-line infrastructure. PLC also allows users to easily connect measuring devices to the PLC network by plugging the power cord into an electrical outlet. Therefore, a smart-metering system over PLC has been considered as one of the most appropriate technologies for meter reading and automatic control, which are essential in realization of a smart grid. We propose a secure smart-metering protocol including: 1) key materials generation and provisioning to devices without exposure; 2) initialization to authenticate devices in the network and share keys between devices before exchanging data, (3) secure transmission of meter-reading data, and 4) revocation management to handle discarded devices from the network. Especially, our protocol provides strong authentication of devices and data: It prevents a single point of failure by adopting secret sharing through multiple certificate authorities. It also reduces the risk of denial-of-service attacks on the server by hop-by-hop authentication for data transmitted from terminal nodes to the server.

Published in:

Power Delivery, IEEE Transactions on  (Volume:26 ,  Issue: 4 )