Skip to main content
Log in

Replacing Cryptographic Keys in AMI Mesh Networks with Small Latency

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Advanced Metering Infrastructures (AMI) facilitate efficient and reliable exchange of electricity information between the homes and utilities. Their unique characteristics (e.g., connecting millions of smart meters; accessing customers’ private information), however, make them a lucrative target for adversaries. For example, an attacker might try to compromise the head-end of an AMI and send “remote disconnect commands” to the smart meters, disconnecting a large number of customers. To implement message authentication and protect message integrity and confidentiality, a number of cryptographic keys are being utilized. A “command key”, for example, signs messages that are sent from the head-end to the meters. Such keys, however, introduce their own set of problems if they ever get compromised. A stolen command key would allow an adversary to continuously send malicious commands to the meters. Hence, the compromised keys must be revoked and replaced as quickly as possible. This paper proposes an efficient and reliable key distribution framework for the AMI mesh networks based on the connected dominating set approach. The keys are replaced with minimal latency through our “hexagon-tile coloring scheme”, which allows the maximum number of keys to be transmitted in parallel, free of collision.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. TCG Workgroup (2003) TPM main specification version 1.2, TCG. http://www.trustedcomputinggroup.org/resources/tpm_main_specification. Accessed 3 Jan 2013

  2. Piètre-Cambacèdès L, Sitbon P (2008) Cryptographic key management for SCADA systems issues and perspectives. Proceedings of the International Conference on Information Security and Assurance, ISA, pp 156–161

  3. Donghyun C, Hakman K, Dongho W, Seungjoo K (2009) Advanced key-management architecture for secure SCADA communications, power delivery. IEEE Trans 24:1154–1163

    Google Scholar 

  4. Saquib Z, Batra R, Pal O, Nevangune A, Patel D, Rajarajan M (2011) A configurable and efficient key-management scheme for SCADA communication networks. International Journal of Research and Reviews in Information Security and Privacy (IJRRISP). IEEE Comput Soc 1:16–25

    Google Scholar 

  5. Zhang N, Shin I, Zou F, Wu W, Thai MT (2008) Trade-off scheme for fault tolerant connected dominating sets on size and diameter, FOWANC ’08. Proceedings of the 1st ACM international workshop on foundations of wireless Ad Hoc sensor networking and computing, ACM, pp 1–8

  6. Zhang N, Shin I, Zou F, Wu W, Thai MT (2010) Construction of virtual backbone with multiple factors constraints in wireless Ad-hoc network. Ad Hoc Sens Wirel Netw 10:27–59

    Google Scholar 

  7. Grochocki D, Huh JH, Berthier R, Bobba R, Cardenas AA, Jetcheva JG (2012) AMI threats, intrusion detection requirements and deployment recommendations, Smart Grid Communications (SmartGridComm). 2012 IEEE Third International Conference, pp 395-400

  8. Sen A, Roxborough T, Sinha B (2012) On an optimal algorithm for channel assignment in cellular networks. IEEE International Conference on Communications, 1999

  9. Niculescu D, Nath B (2003) Ad Hoc positioning system (APS) using AoA, IN-FOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications societies. IEEE Soc 3:1734–1743

    Google Scholar 

  10. Niculescu D, Nath B (2001) Ad hoc positioning system (APS), Globecomm

  11. Berthier R, Sanders WH, Khurana H (2010) Intrusion detection for advanced metering infrastructures: requirements and architectural directions, Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference, pp 350–355

Download references

Acknowledgments

This work was supported by the Power Generation & Electricity Delivery of the KETEP grant funded by the Korea government Ministry of Trade, industry & Energy (2010101040046A).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jungtaek Seo.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Shin, I., Huh, J.H., Kim, S. et al. Replacing Cryptographic Keys in AMI Mesh Networks with Small Latency. Mobile Netw Appl 19, 426–434 (2014). https://doi.org/10.1007/s11036-013-0442-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-013-0442-2

Keywords

Navigation