Skip to main content

Authentication and Integrity Protection for Real-Time Cyber-Physical Systems

Abstract

Cyber-physical system (CPS) is a collaborative system of cyber and physical devices that work together to facilitate automation, communication, and sharing of information in real time. This chapter examines the Advanced Metering Infrastructure (AMI) in a smart grid environment, in which energy consumption data collected by smart meters is collected and aggregated in real time. Thus, allowing the system operators to analyze the energy usage to improve consumer service by refining utility operating and asset management processes more efficiently. Data aggregation is an integral part of AMI deployment. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth utilization of AMI. However, the concentrator (the entity that aggregates the energy readings) poses a considerable risks of being tampered with, leading to erroneous bills, and possible consumer disputes. In this chapter, we discuss an end-to-end integrity protocol using elliptic curve-based chameleon hashing to provide data integrity and authenticity. The concentrator generates and sends a chameleon hash value of the aggregated readings to the Meter Data Management System (MDMS) for verification, while the smart meter with the trapdoor key computes and sends a commitment value to the MDMS so that the resulting chameleon hash value calculated by the MDMS is equivalent to the previous hash value sent by the concentrator. By comparing the two hash values, the MDMS can validate the integrity and authenticity of the data transmitted by the concentrator.

This is a preview of subscription content, access via your institution.

References

  • D. Alahakoon, X. Yu, Smart electricity meter data intelligence for future energy systems: A survey. IEEE Trans. Ind. Inform. 12(1), 425–436 (2016)

    CrossRef  Google Scholar 

  • E. Ancillotti, R. Bruno, M. Conti, The role of communication systems in smart grids: Architectures, technical solutions and research challenges. Comput. Commun. 36(17–18), 1665–1697 (2013)

    CrossRef  Google Scholar 

  • M. Benmalek, Y. Challal, A. Derhab, A. Bouabdallah, VerSAMI: Versatile and Scalable key management for smart grid AMI systems. Comput. Netw. 132, 161–179 (2018)

    CrossRef  Google Scholar 

  • D. Bian, M. Kuzlu, M. Pipattanasomporn, S. Rahman, Analysis of communication schemes for advanced metering infrastructure (AMI). In 2014 IEEE PES general meeting – conference & exposition, IEEE (2014), pp. 1–5

    Google Scholar 

  • Y. Chen, J.-F. Martínez, P. Castillejo, L. López, An anonymous authentication and key establish scheme for smart grid: FAuth. Energies 10(9), 1354 (2017)

    CrossRef  Google Scholar 

  • D. He, N. Kumar, J.-H. Lee, Privacy-preserving data aggregation scheme against internal attackers in smart grids. Wirel. Netw 22, 491–502 (2016)

    CrossRef  Google Scholar 

  • A. Humayed, J. Lin, F. Li, B. Luo, Cyber-physical systems security – A survey. IEEE Internet Things J. 4(6), 1802–1831 (2017)

    CrossRef  Google Scholar 

  • D. Johnson, A. Menezes, S. Vanstone, The Elliptic Curve Digital Signature Algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001)

    CrossRef  Google Scholar 

  • Y. Kabalci, A survey on smart metering and smart grid communication. Renew. Sust. Energ. Rev. 57, 302–318 (2016)

    CrossRef  Google Scholar 

  • S.L. Keoh, Z. Tang, Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification. In 2014 10th international conference on information assurance and security (2014), pp. 6–11

    Google Scholar 

  • S. Khasawneh, M. Kadoch, Hybrid cryptography algorithm with precomputation for advanced metering infrastructure networks. Mob. Netw. Appl. 23(4), 982–993 (2018)

    CrossRef  Google Scholar 

  • H. Ko, J. Jin, S.L. Keoh, in ViotSOC: Controlling access to dynamically virtualized IoT services using service object capability. Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, CPSS ’17 (ACM, New York, 2017), pp. 69–80

    Google Scholar 

  • N. Koblitz, Elliptic curve cryptosystems. Math. Comput. 48, 203–209 (1997)

    CrossRef  MathSciNet  Google Scholar 

  • K. Mahmood, S.A. Chaudhry, H. Naqvi, T. Shon, H.F. Ahmad, A lightweight message authentication scheme for smart grid communications in power sector. Comput. Electr. Eng. 52, 114–124 (2016)

    CrossRef  Google Scholar 

  • A. Mohammadali, M. Sayad Haghighi, M.H. Tadayon, A. Mohammadi-Nodooshan, A novel identity-based key establishment method for advanced metering infrastructure in smart grid. IEEE Trans. Smart Grid 9(4), 2834–2842 (2018)

    CrossRef  Google Scholar 

  • R.R. Mohassel, A. Fung, F. Mohammadi, K. Raahemifar, A survey on advanced metering infrastructure. Int. J. Electr. Power Energy Syst. 63, 473–484 (2014)

    CrossRef  Google Scholar 

  • J. Ng, S.L. Keoh, Z. Tang, H. Ko, SEABASS: Symmetric-keychain encryption and authentication for building automation systems. In 4th IEEE World Forum on Internet of Things (WF-IoT 2018), Singapore (5–8 Feb 2018), pp. 219–224

    Google Scholar 

  • R.D. Nicola, M. Loreti, R. Pugliese, F. Tiezzi, A formal approach to autonomic systems programming: The SCEL language. ACM Trans. Auton. Adapt. Syst. 9(2), 7:1–7:29 (2014)

    CrossRef  Google Scholar 

  • V. Odelu, S. Zeadally, A.K. Das, M. Wazid, D. He, A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks. Telecommun. Syst. 69(4), 431–445 (2018)

    CrossRef  Google Scholar 

  • Y. Piao, J. Kim, U. Tariq, M. Hong, Polynomial-based key management for secure intra-group and inter-group communication. Comput. Math. Appl. 65(9), 1300–1309 (2013)

    CrossRef  MathSciNet  Google Scholar 

  • D.S. Roche, in Space- and time-efficient polynomial multiplication. Proceedings of the 2009 International Symposium on Symbolic and Algebraic Computation (ISSAC ’09) (ACM, New York, 2009), pp. 295–302

    Google Scholar 

  • A. Sani, D. Yuan, W. Bao, Z. Dong, in Towards secure energy internet communication scheme: An identity-based key bootstrapping protocol supporting unicast and multicast. 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA) (IEEE Computer Society, Los Alamitos, 2017), pp. 1–5

    Google Scholar 

  • M. Siekkinen, M. Hiienkari, J.K. Nurminen, J. Nieminen, How low energy is Bluetooth Low Energy? Comparative measurements with ZigBee/802.15.4. In 2012 IEEE wireless communications and networking conference workshops (WCNCW), IEEE (2012), pp. 232–237

    Google Scholar 

  • H.C. Tan, K. Lim, S.L. Keoh, Z. Tang, D. Leong, C.S. Sum, Chameleon: A blind double trapdoor hash function for securing AMI data aggregation. In 2018 IEEE 4th World Forum on Internet of Things (WF-IoT) (2018), pp. 225–230

    Google Scholar 

  • T. Thakur, An access control protocol for wireless sensor network using double trapdoor chameleon hash function. J. Sens. (2016), pp. 1–6

    Google Scholar 

  • J. Tsai, N. Lo, Secure anonymous key distribution scheme for smart grid. IEEE Trans. Smart Grid 7(2), 906–914 (2016)

    Google Scholar 

  • Z. Wan, G. Wang, Y. Yang, S. Shi, SKM: Scalable key management for advanced metering infrastructure in smart grids. IEEE Trans. Ind. Electron. 61(12), 7055–7066 (2014)

    CrossRef  Google Scholar 

  • M. Wazid, A.K. Das, S. Kumari, X. Li, F. Wu, Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS. Secur. Commun. Netw. 9(13), 1983–2001 (2016)

    Google Scholar 

  • WiSUN Alliance, Wi-SUN Alliance and FAN. https://www.wi-sun.org/smart-utilities/. Accessed Jan 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sye Loong Keoh .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and Permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Keoh, S.L., Tan, H.C., Tang, Z. (2020). Authentication and Integrity Protection for Real-Time Cyber-Physical Systems. In: Tian, YC., Levy, D. (eds) Handbook of Real-Time Computing. Springer, Singapore. https://doi.org/10.1007/978-981-4585-87-3_39-1

Download citation

  • DOI: https://doi.org/10.1007/978-981-4585-87-3_39-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-4585-87-3

  • Online ISBN: 978-981-4585-87-3

  • eBook Packages: Springer Reference EngineeringReference Module Computer Science and Engineering