ADHOC-NOW 2015: Ad-hoc, Mobile, and Wireless Networks pp 303-316 | Cite as
Self-organised Key Management for the Smart Grid
Abstract
As Smart Grid deployments emerge around the world, their protection against cyberattacks becomes more crucial. Before protective measures are put into place, one of the main factors to be considered is key management. Smart Grid poses special requirements compared to traditional networks; however, the review of previous work reveals that existing schemes are not complete. Here we propose a scalable and distributed key management scheme for the Smart Grid based on the Web-of-Trust concept. Our proposal is build on top of a Distributed Hash Table for efficient lookups of trust relationships. The target of this scheme is to create a key management system for the Smart Grid without the need of an always available Trusted Third Party. The underlying Distributed Hash Table can be further utilised as an infrastructure to build other Smart Grid services on top of it, like secure and/or anonymous aggregation, billing, etc.
Keywords
Smart grid Security Key management DHT ChordNotes
Acknowledgement
This research has been funded by the European Commission as part of the SMART-NRG project (FP7-PEOPLE-2013-IAPP Grant number 612294).
References
- 1.Utility-scale smart meter deployments: Building block of the evolving power grid. Technical Report, The Edison foundation, September 2014Google Scholar
- 2.Aloul, F., Al-Ali, A., Al-Dalky, R., Al-Mardini, M., El-Hajj, W.: Smart grid security: threats, vulnerabilities and solutions. Int. J. Smart Grid Clean Energy 1(1), 1–6 (2012). https://dx.doi.org/10.12720/sgce.1.1.1-6 CrossRefGoogle Scholar
- 3.Baumeister, T.: Adapting PKI for the smart grid. In: 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 249–254, October 2011Google Scholar
- 4.Beaver, C., Gallup, D., Neumann, W., Torgerson, M.: Key management for SCADA. Cryptog. Information Sys. Security Dept., Sandia Nat. Labs, Technical Report, SAND2001-3252 (2002)Google Scholar
- 5.Callas, J., Donnerhacke, L., Finney, H., Shaw, D., Thayer, R.: OpenPGP Message Format. RFC 4880 (Proposed Standard) (Nov 2007). http://www.ietf.org/rfc/rfc4880.txt, updated by RFC 5581
- 6.Choi, D., Kim, H., Won, D., Kim, S.: Advanced key-management architecture for secure SCADA communications. IEEE Trans. Power Delivery 24(3), 1154–1163 (2009)CrossRefGoogle Scholar
- 7.Choi, D., Lee, S., Won, D., Kim, S.: Efficient secure group communications for SCADA. IEEE Trans. Power Delivery 25(2), 714–722 (2010)CrossRefGoogle Scholar
- 8.Dawson, R., Boyd, C., Dawson, E., Nieto, J.M.G.: SKMA: a key management architecture for SCADA systems. In: Proceedings of the 2006 Australasian workshops on Grid computing and e-research, vol. 54, pp. 183–192. Australian Computer Society, Inc. (2006)Google Scholar
- 9.Demertzis, F., Xenakis, C.: SOMA: Self-Organised Mesh Authentication. In: Camenisch, J., Lambrinoudakis, C. (eds.) EuroPKI 2010. LNCS, vol. 6711, pp. 31–44. Springer, Heidelberg (2011). http://dx.doi.org/10.1007/978-3-642-22633-5_3 CrossRefGoogle Scholar
- 10.Demertzis, F.F., Xenakis, C.: SOMA-E: Self-organized mesh authentication-extended. Math. Comput. Model. 57(7–8), 1606–1616 (2013)MATHMathSciNetCrossRefGoogle Scholar
- 11.Gharavi, H., Hu, B.: Multigate communication network for smart grid. Proc. IEEE 99(6), 1028–1045 (2011)CrossRefGoogle Scholar
- 12.He, W., Huang, Y., Sathyam, R., Nahrstedt, K., Lee, W.C.: SMOCK: a scalable method of cryptographic key management for mission-critical wireless ad-hoc networks. IEEE Trans. Inf. Forensics Secur. 4(1), 140–150 (2009)CrossRefGoogle Scholar
- 13.Kim, J.Y., Choi, H.K.: An efficient and versatile key management protocol for secure smart grid communications. In: 2012 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1823–1828. IEEE (2012)Google Scholar
- 14.Law, Y.W., Palaniswami, M., Kounga, G., Lo, A.: WAKE: Key management scheme for wide-area measurement systems in smart grid. IEEE Commun. Mag. 51(1), 34–41 (2013)CrossRefGoogle Scholar
- 15.Liu, N., Chen, J., Zhu, L., Zhang, J., He, Y.: A key management scheme for secure communications of advanced metering infrastructure in smart grid. IEEE Trans. Industr. Electron. 60(10), 4746–4756 (2013)CrossRefGoogle Scholar
- 16.Long, X., Tipper, D., Qian, Y.: An advanced key management scheme for secure smart grid communications. In: 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 504–509, October 2013Google Scholar
- 17.Mittra, S.: Iolus: a framework for scalable secure multicasting. In: ACM SIGCOMM Computer Communication Review, vol. 27, pp. 277–288. ACM (1997)Google Scholar
- 18.Nicanfar, H., Jokar, P., Leung, V.: Smart grid authentication and key management for unicast and multicast communications. In: 2011 IEEE PES Innovative Smart Grid Technologies Asia (ISGT), pp. 1–8, November 2011Google Scholar
- 19.NIST: Guidelines for smart grid cybersecurity: vol. 1 - smart grid cybersecurity strategy, architecture, and high-level requirements, vol. 2 - privacy and the smart grid vol. 3 - supportive analyses and references. Technical Report, NIST (2014). doi: 10.6028/NIST.IR.7628r1
- 20.Park, J.H., Kim, M., Kwon, D.: Security weakness in the smart grid key distribution scheme proposed by Xia and Wang. IEEE Trans. Smart Grid 4(3), 1613–1614 (2013)CrossRefGoogle Scholar
- 21.Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM Comput. Commun. Rev. 31(4), 149–160 (2001)CrossRefGoogle Scholar
- 22.Wan, Z., Wang, G., Yang, Y., Shi, S.: SKM: Scalable key management for advanced metering infrastructure in smart grids. IEEE Trans. Industr. Electron. 61(12), 7055–7066 (2014)CrossRefGoogle Scholar
- 23.Wang, W., Lu, Z.: Cyber security in the smart grid: Survey and challenges. Computer Networks 57(5), 1344–1371 (2013). http://www.sciencedirect.com/science/article/pii/S1389128613000042
- 24.Wu, D., Zhou, C.: Fault-tolerant and scalable key management for smart grid. IEEE Trans. Smart Grid 2(2), 375–381 (2011). http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=5743049 CrossRefGoogle Scholar
- 25.Xia, J., Wang, Y.: Secure key distribution for the smart grid. IEEE Trans. Smart Grid 3(3), 1437–1443 (2012)CrossRefGoogle Scholar
- 26.Xiao, S., Gong, W., Towsley, D.: Dynamic key management in a smart grid. In: Dynamic Secrets in Communication Security, pp. 55–68. Springer, New York (2014). http://dx.doi.org/10.1007/978-1-4614-7831-7_5
- 27.Xu, Y., Wang, W.: Wireless mesh network in smart grid: modeling and analysis for time critical communications. IEEE Trans. Wireless Commun. 12(7), 3360–3371 (2013)CrossRefGoogle Scholar
- 28.Yan, Y., Qian, Y., Sharif, H., Tipper, D.: A survey on cyber security for smart grid communications. IEEE Commun. Surv. Tutorials 14(4), 998–1010 (2012)CrossRefGoogle Scholar