By Topic

Smart grid authentication and key management for unicast and multicast communications

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Nicanfar, H. ; Dept. of Electr. & Comput. Eng., Univ. of British Columbia, Vancouver, BC, Canada ; Jokar, P. ; Leung, V.C.M.

One of the most important and challenging area in the smart grid context is security and privacy section. Smart grid is a vulnerable system and can be attacked even from aboard, attacks that may cause different level of issues and harms on the devices and society. So, research community has paid attention to this topic and the reasons of required security and privacy for the smart grid. The first step of designing and implementing security for any system such as a smart grid is an authentication scheme followed by a key management protocol. Other security aspects like integrity, authorization and confidentiality can be implemented as long as a strong key management protocol has already been designed and addressed. In this paper we provide a new scheme for the mutual authentication between the smart grid utility network and Home Area Network smart meters. Our proposed mechanism is capable of preventing different attacks like Brute-force, Replay, Man-In- The-Middle and Denial-of-Service attacks. Also, we provide a novel key management protocol for data communication between the utility server and customers smart meters. Our proposed protocol improves the network overhead caused by security key management controlling packets, and at the same time it is enough secured in order to prevent above mentioned attacks. In fact, by generating and broadcasting only one function periodically by the server that is in charge of the network security, our protocol simply refreshes entire nodes public key and private key as well as multicast required security keys if any.

Published in:

Innovative Smart Grid Technologies Asia (ISGT), 2011 IEEE PES

Date of Conference:

13-16 Nov. 2011