A New Key Management Scheme for Home Area Network (HAN) In Smart Grid Bashar Alohali, Madjid Merabti, Kashif Kifayat School of Computing and Mathematical Sciences, Liverpool John Moores University, Liverpool, UK, [email protected] {M.Merabti, [email protected]} Abstract—Smart grid is an improvement of the existing power grid that uses information and two-way communication throughout the infrastructure. There are numerous domains, systems and devices deployed in the smart grid. Each of these devices has its own security challenges for cyber-attacks. In this context, Home area network (HAN) is a type of local area network for smart grid. Many components in a HAN interconnect through wireless and other communication technologies thus, can introduce security vulnerabilities in HAN. This makes security as a critical requirement for the HAN. A cyber-attack on a HAN can result in consumer fraud similarly it could also introduce a remote penetration attack for more sophisticated attacks. The contribution of this work is to present a novel key management and authentication scheme to manage the security and reliability of HAN on a smart grid. The key feature of the proposed mechanism is the unique key assigned to each node in the group. This unique key is shared only with the smart meter, and each node sends encrypted data through a group controller node to the smart meter without the need for decryption at any intermediate point along the path. In the light of analysis phase our proposed scheme has showed the improvement in resilience against replay attack, data confidentiality and scalability. Keywords- Key Management; Smart Grid; Cyber-attack; HAN I. INTRODUCTION Smart grid is an improvement of current power system. It is primarily characterised by a large consumer base and an intelligent communications infrastructure to support and control the infrastructure. The communication of smart grid comprises of sensor devices that enable the automation, monitoring and control to achieve efficiency and reliability, the safety and security in the power grid. It enables the timely, safe and secure adaptable information flow, needed to provide power to the evolving digital economy [1]. The additional characteristics of the smart grid are operations based on realtime data, two-way power flow and renewable power generation. Smart grid communications infrastructure interconnects the sensors based monitoring infrastructure to an Industrial Control Systems (ICS) which monitor and control parts of the smart grid. Supervisory Control and Data Acquisition (SCADA) is a type of ICS that is made up of a network of devices and control elements (computers) that monitor and control processes. Typical communications architecture for smart grid is heterogeneous network as shown in figure 1. There are three tiers of communication in smart grid including Home Area Network (HAN), Neighbourhood Area ISBN: 978-1-902560-27-4 © 2014 PGNet Network (NAN) and Wide Area Network (WAN). HAN is an interconnected system of a smart meter, display devices, lighting systems, micro-generation or solar panel and smart devices such as smart vehicle, air conditioning, and so on. A HAN uses wired or wireless technologies to communicate and to confirm the interoperability of networked appliances and the smart meter [2]. It enables the home resident to control power consumption by using smart appliances and thermostats. HAN is expected to provide an advantage to utility company and home resident by managing demanding responses and controlling of micro generation and the charging of smart vehicles [2]. Despite so many benefits of a smart grid there are various security challenges and issues exist such as access control, identity management, connectivity and privacy. Therefore, security of smart grid is a critical challenges faced by the operators. For example in 2012, Telven, a main smart grid software vendor owned by Schneider Electric, was hack [1]. In addition, Stuxnet was discovered in 2010. It is an advanced and sophisticated malware program that targets industrial control systems. Industrial control systems targeted by Stuxnet are reprogrammed to hide any changes made by a Stuxnet attack. Security specialists have found that Stuxnet is able to control the speed of motors, and is thus able to send nuclear centrifuges out of control [3]. It is a modern weapon in the cyber war. Such events can potentially cause wide-spread effects that might impact nation-wide services. They will affect society overall and to avoid, any disruption to communal life, it makes it necessary that these systems be reliable and secure. Therefore, security on the grid is one of critical requirement [4]. There are several methods for securing devices in a smart grid against cyber-attacks including access control, host-based intrusion detection and system hardening [1]. With the devices being secured, it is required to ensure that the data transfer is secure too. With the variety of device capabilities in a smart grid (sensors to smart meters to servers), the data security scheme is bound to vary across the network depending upon the device capabilities (computing, storage and power resources) as well as the security requirements. Since the HAN mostly uses wireless communications and the communicating devices are physically small with low resources, their security is a critical issue in HAN. Added to this, device spoofing or message modification by a man-in-the-middle can potentially disrupt the operations of the smart grid. Therefore, security is of great concern and the term security in this context implies the physical device security, device authentication and data security. This paper focuses on device authentication and data security for the HAN where cryptography is seen as essential. We intend to address key management in the HAN to provide a secure data exchange within a smart grid. We propose a new key management scheme for HAN in smart grid. It uses group key management in order to address scalability. We assign a unique key to each node in the group. This unique key is shared only with the smart meter, and each node sends encrypted data through group controller node to the smart meter without the need for decryption at any intermediate company server. Problem definition: The generic security requirements in a smart grid are confidentiality, integrity, (data) freshness, nonrepudiation and availability. These requirements should be fulfilled over the available computing and storage resources of the smart grid components. The smart grid is heterogeneous network and has different network areas with different device capabilities. Generally, these areas can be classified as Home, Neighborhood and Wide-area. These require secure data exchange between devices across these areas. In HANs the smart meter and intelligent appliances are actively managed, and provide new functionality that enables consumers to interface with Home Energy Management Systems (HEMS) which offer consumers information on how to manage their electric usage. The Utility company may deliver signals which can benefit a consumer to decrease energy costs either by turning off appliances or reprogramming their time-of-the-day use or perform any similar management of the HAN devices to increase the overall efficiency of the smart grid. The increasing integration of smart appliances with the Internet of things (IoT) has made the entire HAN high-risk and therefore security is a prominent issue. An addition to this risk are the more recent wireless technologies such as 4G (LTE) and protocol implementations of 6LoWPAN and ZigBee over IP. The data generated by customers need to be kept private and secure and there is the risk of breaching the customers privacy and confidentiality. Exploit of appliances on the HAN by malicious users leads to eavesdropping, and launching of attacks could pose a security risk in a residential area. For example, a malicious user may attempt to destabilize the grid by delivering fake data or commands to meters or other connected devices. Therefore, device authentication is a primary requirement, followed by securing data that transits the communication network. Similarly, secure data storage is necessary on the devices such as smart meters or group controllers, which collect/process data from the appliances on the HAN. Data encryption is necessary and to implement this function, an encryption key management scheme that also addresses authentication is critical. Smart grid is a meta-system and therefore, it is not practical to propose a single key management scheme for the entire smart grid network. The security scheme should be carefully chosen to meet HAN component’s requirements, the interoperability requirements of the smart grid and security requirements of several systems in the smart grid [5]. The scheme should address failures of nodes and their replacement and ensure that such events do not leave the network vulnerable to attacks. In this paper, we have proposed a new key management scheme for HAN. Our work has the following contribution and features: (1) A new key management scheme that is not merely generic but sensitive to the practical security requirements for the HAN. (2) Defines and discusses a new requirement and challenges in key management for secure HAN communications on smart grid; (3) A secure authentication scheme for smart grid communications. (4) Secure and resistant against replay and capture, brute force, and other attacks. The rest of the paper is organized as follows. In section II we present literature review for current key management and authentication solutions for HANs. We then describe the network model for a smart grid and HAN. Section IV details the proposed key management for HAN. Section V analyzes the security features of the proposed scheme. II. LITERATURE REVIEW The literature reviewed is classified under two categories. Literature specific to key management in HAN is presented in one subsection and key management and authentication schemes for inter smart grid networks are in a following subsection. A. Key management for HAN The authors in [6] proposed a mutual authentication scheme and key management protocol for a HAN. The proposed solution allocates a Trusted Agent (TA) for each HAN and the communication topology assumed to be mesh. Mutual authentication between a HAN nodes and home TA uses a public/private key pair technique based on identity (ID)-based cryptography. Their proposal has two layers which are public/private key pair as well as a symmetric key or secret value. However, using public and private key between HAN nodes and home TA in case of the home appliances with limited resources will not be efficient and could cause significant delays. The authors in [7] proposed a session key exchange scheme in a HAN to protect against replay attacks between home appliances and the smart meter by using a freshness counter. Their solution provides a protection mechanism against replay attacks by using handshaking, nonces and self-generating timestamps. B. Key management and authentication protocols for smart grid The authors in [4], propose a protocol that provides secure unicast, multicast, and broadcast communications in a smart grid network. This protocol applies a binary tree approach that supports these three kinds of secure communications. It reduces the computation overhead and protects communication in unicast, multicast, and broadcast scenario. However, the effect is unknown when one or more nodes leave or join the session. The communications overhead is also unknown. Dapeng et al. [8] analyse the requirements of key management for smart grid and propose a key management scheme for use in smart grid that meets these requirements. missing piece to realizing the unified key management framework vision. This part needs further analysis. These proposals do not specifically address the needs or requirements of the HAN. While the security schemes proposed are sufficiently generic for the context of smart grid, there is a lack of sharp focus on the security requirements and the capabilities (storage, processing and energy) of the appliances on the HAN. III. NETWORK MODEL This section describes the HAN in smart grid system architecture, describes two classification groups and communication scenario, and threat model. Figure:1 Smart grid communcation network architecure The scheme is based on asymmetric cryptography and uses Needham-Schroeder authentication protocol. They test and verify the scheme by launching a man-in-the-middle attack, and a replay attack which are successfully detected and rejected by their scheme. They also address the issue of additional vulnerabilities on session keys and communication. The main advantage of this scheme is high security, scalability, faulttolerance, and accessibility. The scheme requires the use of a PKI as well as third party trusted anchors. This increases the infrastructure requirements for security deployment. Hasen et al. [9] propose a key management protocol for data communication between the utility server and customers smart meters. The model is mainly between home smart meter and a security associate in utility, which covers unicast and multicast communications. The protocol improves the network overhead caused by security key management control packets, and at the same time it is secure enough in order to prevent known malicious attacks. However, the authentication method between the smart meter (SM) and appliances inside of the Home Area Network (HAN) has not been addressed. Subir et al. [10] propose a unified key management mechanism (UKMF) that can generate ciphering keys for multiple protocols of multiple communication layers from a single peer entity authentication procedure. The unified key management mechanism is suitable for smart grid use cases, especially for smart metering, where smart meters are assumed to be low-cost wireless devices for which repeated peer entity authentication attempts for each protocol can be contributed to increased system overhead. The proposed mechanism is flexible in that peer entity authentication can be treated as either network access authentication or application-level authentication. However, the mechanism has established that information discovery for bootstrap application ciphering is an important and as yet A. Network Architecture In general, a HAN connects the smart devices across the home with a smart meter. The HAN components can communicate using technologies such as Zigbee, wired or wireless Ethernet, or Bluetooth. There are two ways to interface the home depending on the countries where it is implemented. One way is through smart meter as the interface to network operation center and other actors. The other way is to interface with WAN and NAN directly by using a separate control and aggregation node [2]. The HAN components are divided into two groups based on [11]. Group one comprises appliances that require two way communications such as smart electric vehicle, air conditioning (AC) and solar panel. Group two comprises home appliances that require one way communication such as smart TV, lighting system and charger. An example of group one is a solar panel that requires two way communications to provide unneeded power to utility company also, AC is expected to receive a signal from utility provider to reduce energy intensity during off-peak hours. However, group two members need only one way communication to send the electricity consumption data. The devices in Group two have higher resources capabilities compared to those in Group one. B. Attacks model The major attacks on HANs are briefly described below: Replay attack: The attacker re-sends authenticated registered messages in order to cause unnecessary packet processing on the node so that the node loses energy or causes a delay. This attack can occur if message packet or a digital signature does not contain a timestamp. ࡿࡹ,ࢍ ࡳࡴ ࡳࡸ ࡰ,ࡸ ࡰ,ࡸ ࡰ,ࡸ ࡰ,ࡴ ࡰ,ࡴ ࡰ,ࡴ Figure:2 Network structure IV. NOTATIONS AND ASSUMPTIONS Before we begin to describe our scheme, we explain the notations and assumptions used in this paper. A. Notations TABLE I summarizes of the notations used in this protocol. D Smart device The number of smart devices inside home, i = [1 … N] i ܪ ܮ ܦு, ܦ, ܩಹ ܩಽ ீܭವ ಹ .ಹ, ܩܭܯಹ ܵܯ, ܭ௦,ಹ, ܭ௦,ಽ, ܭ௦,ீವ ಹ ܭ௦,ீವ ಽ ீܭವ ಽ .ಽ, ܶܵಹ, ܶܵಽ, Unique group of smart devices inside home, which have high resources capacities devices and the data exchange, is bidirectional. Unique group of smart devices inside home, which have low resources capacities devices and the data exchange, is one way. Unique identity for a smart device in groupܪ. Unique identity for a smart device in groupܮ. A home group controller node in groupܪ. A home group controller node in group ܮ. A unique symmetric key shared between the group controller ܩಹ and the smart devices ܦு, in the group ܪ generated by using the master key ܩܭܯಹ and devices ܦு, A symmetric master key for group controller ܩೕ A unique ID of a smart meter A unique symmetric key shared between smart meter ܵܯ, and the smart devices ܦு, . A unique symmetric key shared between smart meter ܵܯ, and the smart devicesܦ, . A unique symmetric key shared between smart meter ܵܯ, and the home group controller node in group ܪ A unique symmetric key shared between smart meter ܵܯ, and the home group controller node in group ܮ A unique symmetric key shared between the group controller ܩಽ and the smart devices ܦ, in the ܮgroup A time stamp of node ܦு, A time stamp of node ܦ, Table 1: Notations for the Group Key Management Protocol in HAN B. Assumptions The following assumptions are made in the proposed scheme 1. We do not consider device to device ܦு, to ܦு, or ܦ, to ܦ, communication 2. The smart deviceܦு, , ܦ, and group controller use unicast communication. 3. The home group controllers ܩಹ and ܩಽ are trusted devices. 4. All smart meters ܵܯ, are registered on the group controller is ܩಹ and ܩಽ . 5. The HAN interconnected as a tree with the devices as leaf nodes. 6. An adversary could eavesdrop on all traffic or replay messages. 7. Smart meter ܵܯ, is tamper-resistant. 8. Time stamps are used for data freshness checking. The time is not synchronized across the devices on the HAN, but the time stamps are verified to ensure they are incremental and periodic. This requires that the devices that verify the data for authentication and/or freshness store the time stamp of the previously received data. C. Proposal Overview Group Key Management scheme for HAN has a set of features that address secure data transfers across the smart home. To achieve confidentiality between end-to-end communications, symmetric-key cryptography is employed where a unique key is assigned to each smart device. Data are collected from smart devices in an encrypted form and sent to smart meter. The scheme manages the key distribution and generation across nodes of the network and exchanges these keys securely when necessary. Consequently, the secure data transfers are consistent and resilient to changes in the network. V. A GROUP KEY MANAGEMENT SCHEME FOR HAN The operation of the scheme requires that the devices participating in the scheme be configured before deployment. This is termed as the pre-deployment phase. The activities in the pre-deployment phase are first illustrated. Then, it is followed by an explanation of the communication and authentication between the nodes within a group and their group controller and the group controllers and the smart meter. A. Pre-deployment Phase The pre-deployment phase concerns the security configuration of the nodes of the HAN, prior to their functioning on the network. First, we present the steps for the pre-deployment of the two HAN groups comprising of the high resource devices ܦ,ு and the low resource devices ܦ, as well as their respective group controllersܩಹ , ܩಽ and the smart meterܵܯ, . 1. Assign unique ID to each smart device ܦ,ு and ܦ, 2. Assign a unique master key ܩܭܯಹ to group controllerܩಹ . This master key is used to generate a shared key between ܩಹ and its devices 3. Yield and store a unique key ீܭವ ,ಹ, by using the ಹ 4. 5. 6. master key ܩܭܯಹ and node ID ܦு, on ܦு, Assign a unique key ܦܩܭ. ܦto group controller ܮ ܮ,݅ ܩಽ and share it withܦ, . Assign unique key ܭ௦,ಹ, to every smart devices ܦு, shared between ܵܯ, andܦு, . Assign unique key ܭ௦,ಽ, to every smart devices ܦ, shared between ܵܯ, andܦ, . 1) The ܪGroup Each device ܦு, that is connected to the smart meter ܵܯ, will require storing unique key ܭ௦,ಹ, shared with smart meterܵܯ, . The home group controller ܩಹ stores the its master key ܩܭܯಹ and symmetric key ܭ௦,ீವ ಹ Pre-deployment for groups ࡴ and ࡸ Devices: Group controller and devices which are group members Outcome: Assign unique IDs to each device, organize them into two groups, assign a group controller to each group, a smart meter to the groups and initialize the devices with the shared keys. Step 1: Formation of the groups ܪand ࡸ Identify the group controllers ܩಹ and ܩಽ Formation of the group H with smart devices ܦு, Assign a unique ID for each smart device ܦு, Formation of the smart meter ܵܯ, Assign a unique ID for each smart devises ܵܯ, Step 2: Assign master group key and unique key for each device in the Group ܪ If node= ܩಹ ܭ௦,ீವ // assign group controller unique key ಹ ܭ௦,ಹ, // assign ܦு, unique key End if Figure 3: Pre-deployment steps for an H group 2) The ܮGroup Each device ܦ, that communicates with the smart meter ܵܯ, will store two unique keys ܭ௦,ಽ, shared with smart meter ܵܯ, and ீܭವ .ಽ, shared with its group controller. ܩಽ ಽ stores two keys, a symmetric key ܭ௦,ீವ which is used to ಽ encrypt data for secure communication between home group and smart meters and ீܭವ .ಽ, which is used for authenticating ಽ the device at the group controller ܩಽ . B. Communication phase In this section, we explain the communication (data transfers not relating to key management) phase for home area network. 1) The ܪGroup The smart devices ܦு, exchange data bi-directionally with the smart meter. ܦு, encrypts its data and time stamp sent to the smart meter encrypted using the shared symmetric key ܭ௦,ಹ, as ܧೞ,ವ ቀܽݐܽܦ, ܶܵಹ, ቁ. ಹ, ܦு, then uses ீܭವ .ಹ, to generate a message authentication code (MAC), ಹ ܥܣܯ.ಹ, that will be verified by ܩಹ to authenticate ܦு, . The encrypted data destined for the smart meter and the MAC are sent to ܩಹ as ܧೞ,ವ ቀܽݐܽܦ, ܶܵಹ, ቁ, ܥܣܯ.ಹ, ). After ಹ, validating the MAC value, ܩಹ -encrypts the encrypted data destined to the smart meter , using the symmetric key ܭ௦,ீವ as ಹ ܧೞ,ಸ (ܧೞ,ವ (ܽݐܽܦ, ܶܵಹ, ) ). Upon receiving this ವಹ ಹ, data, ܵܯ, decrypts the message it receives from the home group controller node ܩಹ , using the symmetric key ܭ௦,ீವ ಹ and further decrypts the message to retrieve the data and time stamp sent by ܦு, . The data from the ܦு, will be available in an unencrypted form in the memory of the smart meter ܵܯ, . This is of concern from a security perspective. 2) The ܮGroup These devices communicate one way; they send data to the smart meter. ܦ, uses steps similar to the other group to send data to the smart meter. ܦ, encrypts its data as ܧೞ,ವ (ܽݐܽܦ, ܶܵಽ, ). The encypted data destined for the ಽ, smart meter is encrypted again, with the time stamp, using the key ீܭವ ಽ .ಽ, as ܧಸ ವಽ .ವಽ, (ܧೞ,ವ ಽ, ቀܽݐܽܦ, ܶܵಽ, ቁ, ܶܵಽ, ). Upon receiving this, ܩಽ validates the source by decrypting the data and verifying the time stamp. It then encrypts the data destined for the smart meter using the shared key between ܩಽ and ܵܯ, , ܭ௦,ீವ as ܧೞ,ಸ (ܧೞ,ವ (ܽݐܽܦ, ܶܵಽ, ) ). ಹ ವಽ ಽ, The smart meter retrieves the original data by decrypting the data using ீܭವ .ಽ, and ܭ௦,ீವ . At ܩಽ and ܵܯ, , the source ಽ ಹ of the data is considered successfully authenticated if the data is successfully decrypted using the shared key of the source. The time stamps are used to verify the data freshness. C. Forward and backward secrecy In a devices group with active smart devices ܦு, ܦ, where a node may join or leave during the lifetime of the group, two security considerations arise. Backward secrecy: A new smart device ܦு, ܦ, must not have permission to access any data that is communicated before it joins the session. Forward secrecy: In a case where a smart device ܦு, ܦ, leaves the group, it must not have permission to access any future data. VI. PERFORMANCE AND EVALUATION We have proposed an efficient key management scheme for the HAN in a smart grid. The scheme can be applied to HANs that require highly secure communication, thus maximizing network lifetime, scalability, availability, and confidentiality between appliances to smart meter communications. The scheme can address security in smart grid associated issues, in particular through secure communication. In this session we discuss and analyze the effectiveness of scheme in terms of security, and energy consumption. A. Security Analysis The proposed scheme is evaluated against the following security characteristics - resilience against node capture, forward and backward secrecy, resilience against replication attacks, secure data aggregation. 1) Resilience against replication attacks An attacker could replay old messages that have been obtained from previous communication. However, in our scheme time stamps are sent along with the data and each of the receiving entities verify them against the previously received time stamps which are stored on the devices.. The time stamp is used as a session token which is expected by the receiver with a reasonable tolerance in value when checked against the periodicity of data expected. Each of ܦு, and ܦ, encrypts a time stamp with the data, which is sent from the appliances to the smart meterܵܯ, . 2) Resilience against Sybil attacks On Sybil attack, a malicious node introduces multiple fake identities to group controller node ܩಹ and ܩಽ in the HAN for illegitimate purpose. Our scheme provides an authentication to confirm that one node cannot pretend to be other, for example when a node ܦு, sends data to group controllerܩಹ , it must compute a MAC on the data sent. The MAC is computed using the shared key between ܦு, and ܩಹ no adversary node can pretend to be the node X. Furthermore, each node in HAN has unique ID and its keys bound to its ID. If the compromised node uses a different ID from the stored ID inܵܯ, , it doesn’t hold the valid keys related with fake ID. 3) Resistance to man-in-the-middle (MITM) attack Messages exchanged between smart meters ܵܯ, and ܦு, are crucial in a HAN. The data generated by the devices are encrypted using the key shared with the smart meter. It is forwarded to the smart meter via the group controllers without being decrypted at the group controllers. An attacker will therefore not have access to the data on the network in a direct form, except at the two end points. In addition to the encryption, the group controller authenticates the node either by verifying the MAC (Group H) or by being able to decrypt the contents and verify the time stamp (Group L), both of which are encrypted. So, an attacker will require guess two keys to be able to access the data sent by an end device. Thus the confidentiality of the data is achieved. 4) Scalability An increase in the HAN size should not affect the overall performance. We use group key management mechanisms to address the scalability of the HAN. The HAN is divided into different groups of homogenous devices (such as ܪand )ܮand corresponding group controllers such as ( ܩಹ andܩಽ ) with distributed management tasks, to make the HAN scalable and efficient. The scheme uses only symmetric keys unlike [6, 7] in which they apply public/private keys management and session keys. demand response and smart meter effectively. The HAN is an important component of the smart grid, both because of consumption as well as the micro-generation that contributes to the grid. The monitoring and management of HANs is one of the key elements of managing demand response. These functions require to be carried out in a secure manner. We propose a novel key management scheme for HAN that takes into account the different types of devices on the HAN, their capabilities, the scalability of the HAN and the energy consumption. The scheme is simple to implement, energy efficient and flexible. REFERENCES [1] Figure 4: Energy consumption during communication phase 5) Energy Consumption The proposed scheme uses only symmetric keys therefore, it is economical on both storage as well as energy consumption unlike [6, 7]. In terms of storage, each device in Group L stores a maximum of two keys and a node ID whereas a device in Group H stores a maximum of three keys and a node ID. The energy consumption, based on the number of bits transmitted on the network; also it is significantly low since the encryption overheads are low. For example, using AES for encryption with a block cipher of 16, a data sample 16 bits long, when encrypted remains 16 bits long; a data sample 24 bits long, when encrypted is 32 bits long. The encryption overhead, therefore, is a maximum of 15 bits, for any input data size. Authentication functions give a fixed signature size (typically 128 bits or 8 bytes long) regardless of the input size. Therefore, when the signature is sent along with the encrypted data, the total number of bits transmitted increases and hence the energy consumption is higher. The energy per bit transmitted is calculated assuming a data rate of 250 Kbps and an active state current of 15 mA at 3.3V.For a Group L device ܦ, the data sample size is 16 bits (2 bytes), the node ID is 16 bits and the time stamp is 16 bits, totaling to 48 bits (6 bytes) of data. Similarly, for a Group H device ܦு , the data size is 16 bits, the node ID is 16 bits, the time stamp is 16 bits and the message authentication code is 160 bits, totaling to 208 bits (26 bytes). Note that the byte count increases by 20 bytes with authentication. AES is used for encryption and SHA-2 is used for authentication. With authentication turned on, the energy consumption is markedly higher than when only encryption is used. The Group L is assumed to have twenty five devices and Group H is assumed to have ten devices. The devices send data every ten minutes via the own group controllers. The group controllers receive data from the devices, decrypt them, encrypt them using the shared key of the smart meter and forward the data to the smart meter. A set of data from both the groups forwarded by the group controller to the smart meter is referred to as a cycle. Figure 4 shows that energy of the group controller for group L lasts around 4300 cycles and that of group H lasts for 4000 cycles. ܦ, and ܦு, last far beyond 4300 cycles (4300 cycles at 600 secs per cycle implies 30 days.). However, the energy consumed by ܦு, is more than that consumed byܦ, . VII. CONCLUSION An important characteristic of the smart grid is the associated communications infrastructure and the ability to manage [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] E. D. Knapp and R. Samani, Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure: Elsevier Science, 2013. J. Ekanayake, N. Jenkins, K. Liyanage, J. Wu, and A. Yokoyama, Smart Grid: Technology and Applications: Wiley, 2012. M. B. Line, I. A. Tondel, and M. G. Jaatun, "Cyber security challenges in Smart Grids," in Innovative Smart Grid Technologies (ISGT Europe), 2011 2nd IEEE PES International Conference and Exhibition on, 2011, pp. 1-8. J.-Y. Kim and H.-K. Choi, "An efficient and versatile key management protocol for secure smart grid communications," in Wireless Communications and Networking Conference (WCNC), 2012 IEEE, 2012, pp. 1823-1828. W. Wang and Z. Lu, "Survey Cyber security in the Smart Grid: Survey and challenges," Comput. Netw., vol. 57, pp. 1344-1371, 2013. H. Nicanfar, P. Jokar, and V. C. M. Leung, "Efficient authentication and key management for the Home Area Network," in Communications (ICC), 2012 IEEE International Conference on, 2012, pp. 878-882. G. A. Tizazu, H. R. Hussen, and K. Ki-Hyung, "Secure session key exchange scheme for Smart Grid Home Area Networks," in ICT Convergence (ICTC), 2013 International Conference on, 2013, pp. 1116-1120. W. Dapeng and Z. Chi, "Fault-Tolerant and Scalable Key Management for Smart Grid," Smart Grid, IEEE Transactions on, vol. 2, pp. 375-381, 2011. H. Nicanfar, P. Jokar, and V. C. M. Leung, "Smart grid authentication and key management for unicast and multicast communications," in Innovative Smart Grid Technologies Asia (ISGT), 2011 IEEE PES, 2011, pp. 1-8. S. Das, Y. Ohba, M. Kanda, D. Famolari, and S. K. Das, "A key management framework for AMI networks in smart grid," Communications Magazine, IEEE, vol. 50, pp. 30-37, 2012. V. Namboodiri, V. Aravinthan, S. N. Mohapatra, B. Karimi, and W. Jewell, "Toward a Secure Wireless-Based Home Area Network for Metering in Smart Grids," Systems Journal, IEEE, vol. PP, pp. 1-12, 2013.
© Copyright 2024 ExpyDoc