Abstract
Advanced Metering Infrastructures (AMI) facilitate efficient and reliable exchange of electricity information between the homes and utilities. Their unique characteristics (e.g., connecting millions of smart meters; accessing customers’ private information), however, make them a lucrative target for adversaries. For example, an attacker might try to compromise the head-end of an AMI and send “remote disconnect commands” to the smart meters, disconnecting a large number of customers. To implement message authentication and protect message integrity and confidentiality, a number of cryptographic keys are being utilized. A “command key”, for example, signs messages that are sent from the head-end to the meters. Such keys, however, introduce their own set of problems if they ever get compromised. A stolen command key would allow an adversary to continuously send malicious commands to the meters. Hence, the compromised keys must be revoked and replaced as quickly as possible. This paper proposes an efficient and reliable key distribution framework for the AMI mesh networks based on the connected dominating set approach. The keys are replaced with minimal latency through our “hexagon-tile coloring scheme”, which allows the maximum number of keys to be transmitted in parallel, free of collision.
Similar content being viewed by others
References
TCG Workgroup (2003) TPM main specification version 1.2, TCG. http://www.trustedcomputinggroup.org/resources/tpm_main_specification. Accessed 3 Jan 2013
Piètre-Cambacèdès L, Sitbon P (2008) Cryptographic key management for SCADA systems issues and perspectives. Proceedings of the International Conference on Information Security and Assurance, ISA, pp 156–161
Donghyun C, Hakman K, Dongho W, Seungjoo K (2009) Advanced key-management architecture for secure SCADA communications, power delivery. IEEE Trans 24:1154–1163
Saquib Z, Batra R, Pal O, Nevangune A, Patel D, Rajarajan M (2011) A configurable and efficient key-management scheme for SCADA communication networks. International Journal of Research and Reviews in Information Security and Privacy (IJRRISP). IEEE Comput Soc 1:16–25
Zhang N, Shin I, Zou F, Wu W, Thai MT (2008) Trade-off scheme for fault tolerant connected dominating sets on size and diameter, FOWANC ’08. Proceedings of the 1st ACM international workshop on foundations of wireless Ad Hoc sensor networking and computing, ACM, pp 1–8
Zhang N, Shin I, Zou F, Wu W, Thai MT (2010) Construction of virtual backbone with multiple factors constraints in wireless Ad-hoc network. Ad Hoc Sens Wirel Netw 10:27–59
Grochocki D, Huh JH, Berthier R, Bobba R, Cardenas AA, Jetcheva JG (2012) AMI threats, intrusion detection requirements and deployment recommendations, Smart Grid Communications (SmartGridComm). 2012 IEEE Third International Conference, pp 395-400
Sen A, Roxborough T, Sinha B (2012) On an optimal algorithm for channel assignment in cellular networks. IEEE International Conference on Communications, 1999
Niculescu D, Nath B (2003) Ad Hoc positioning system (APS) using AoA, IN-FOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications societies. IEEE Soc 3:1734–1743
Niculescu D, Nath B (2001) Ad hoc positioning system (APS), Globecomm
Berthier R, Sanders WH, Khurana H (2010) Intrusion detection for advanced metering infrastructures: requirements and architectural directions, Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference, pp 350–355
Acknowledgments
This work was supported by the Power Generation & Electricity Delivery of the KETEP grant funded by the Korea government Ministry of Trade, industry & Energy (2010101040046A).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shin, I., Huh, J.H., Kim, S. et al. Replacing Cryptographic Keys in AMI Mesh Networks with Small Latency. Mobile Netw Appl 19, 426–434 (2014). https://doi.org/10.1007/s11036-013-0442-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-013-0442-2