Skip to main content

SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications

  • Conference paper
  • First Online:
Critical Information Infrastructures Security (CRITIS 2019)


In recent years, the Smart Grid has increasingly integrated cutting-edge technologies that generate several benefits for all the stakeholders involved, such as a more accurate billing system and enhanced Demand Response procedures. However, this modernization also brings with it diverse cyber security and privacy issues, which sets the necessity for developing a security platform specifically tailored to this scenario. In this paper, we present SealedGRID, which proposes a flexible architecture that provides security services at all levels by implementing Trusted Execution Environments on their devices, together with advanced authentication and authorization mechanisms, as well as privacy preserving techniques. These technologies are presented in depth and a final security analysis is conducted, which highlights the contributions of this project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others


  1. Mohammadali, A.: A novel identity-based key establishment method for advanced metering infrastructure in smart grid. IEEE Trans. Smart Grid 9(4), 2834–2842 (2018)

    Article  Google Scholar 

  2. Trusted Computing Group, TPM Mobile with Trusted Execution Environment for Comprehensive Mobile Device Security, Whitepaper, June 2012

    Google Scholar 

  3. GlobalPlatform: Trusted Execution Environment System Architecture (2011)

    Google Scholar 

  4. CEN/CENELEC/ETSI, Smart Grid Information Security, December 2014

    Google Scholar 

  5. Knirsch, F., et al.: Error-resilient masking approaches for privacy preserving data aggregation. IEEE Trans. Smart Grid 9(4), 3351–3361 (2018)

    Article  Google Scholar 

  6. DNP3 Users Group Technical Committee. DNP3 Secure Authentication Specification Version 2.0, DNP Users Group Documentation as a supplement to Volume 2 of DNP3. Technical report, DNP Users Group, 2008

    Google Scholar 

  7. IEC TS 62351 series, Power systems management and associated information exchange - Data and communications security, Technical specification (2007)

    Google Scholar 

  8. Chin, W., et al.: A framework of machine-to-machine authentication in smart grid: a two-layer approach. IEEE Commun. Mag. 54(12), 102–107 (2016)

    Article  Google Scholar 

  9. Lu, R., et al.: Eath: an efficient aggregate authentication protocol for smart grid communications. In: 2013 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1819–1824, April 2013

    Google Scholar 

  10. Alcaraz, C., Lopez, J.: Secure interoperability in cyber-physical systems. In: Security Solutions and Applied Cryptography in Smart Grid Communications, pp. 137–158. IGI global (2017). Accessed 19 Apr 2019

  11. Veichtlbauer, A., et al. Advanced metering and data access infrastructures in smart grid environments. In: The Seventh International Conference on Sensor Technologies and Applications (SENSORCOMM), p. 638 (2013)

    Google Scholar 

  12. Alcaraz, C., et al.: Policy enforcement system for secure interoperable control in distributed smart grid systems. J. Network Comput. Appl. 59, 301–314 (2016)

    Article  Google Scholar 

  13. Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication. Zenodo, February 2019.

  14. Demertzis, F.F., Karopoulos, G., Xenakis, C., Colarieti, A.: Self-organised key management for the smart grid. In: Papavassiliou, S., Ruehrup, S. (eds.) ADHOC-NOW 2015. LNCS, vol. 9143, pp. 303–316. Springer, Cham (2015).

    Chapter  Google Scholar 

  15. Karopoulos, G., et al.: Masker: masking for privacy-preserving aggregation in the smart grid ecosystem. Comput. Secur. 73, 307–325 (2018)

    Article  Google Scholar 

  16. Karopoulos, G., et al.: Towards trusted metering in the smart grid. In: 2017 IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 1–5, June 2017

    Google Scholar 

  17. Rubio, J.E., Roman, R., Alcaraz, C., Zhang, Y.: Tracking advanced persistent threats in critical infrastructures through opinion dynamics. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018. LNCS, vol. 11098, pp. 555–574. Springer, Cham (2018).

    Chapter  Google Scholar 

Download references


This work was supported by the European Commission under the SealedGRID project (H2020-MSCA-RISE-2017) with GA no. 777996.

Author information

Authors and Affiliations


Corresponding author

Correspondence to Aristeidis Farao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Farao, A., Rubio, J.E., Alcaraz, C., Ntantogian, C., Xenakis, C., Lopez, J. (2020). SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications. In: Nadjm-Tehrani, S. (eds) Critical Information Infrastructures Security. CRITIS 2019. Lecture Notes in Computer Science(), vol 11777. Springer, Cham.

Download citation

  • DOI:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37669-7

  • Online ISBN: 978-3-030-37670-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics