Abstract
Cyber-physical system (CPS) is a collaborative system of cyber and physical devices that work together to facilitate automation, communication, and sharing of information in real time. This chapter examines the Advanced Metering Infrastructure (AMI) in a smart grid environment, in which energy consumption data collected by smart meters is collected and aggregated in real time. Thus, allowing the system operators to analyze the energy usage to improve consumer service by refining utility operating and asset management processes more efficiently. Data aggregation is an integral part of AMI deployment. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth utilization of AMI. However, the concentrator (the entity that aggregates the energy readings) poses a considerable risks of being tampered with, leading to erroneous bills, and possible consumer disputes. In this chapter, we discuss an end-to-end integrity protocol using elliptic curve-based chameleon hashing to provide data integrity and authenticity. The concentrator generates and sends a chameleon hash value of the aggregated readings to the Meter Data Management System (MDMS) for verification, while the smart meter with the trapdoor key computes and sends a commitment value to the MDMS so that the resulting chameleon hash value calculated by the MDMS is equivalent to the previous hash value sent by the concentrator. By comparing the two hash values, the MDMS can validate the integrity and authenticity of the data transmitted by the concentrator.
This is a preview of subscription content, access via your institution.
References
D. Alahakoon, X. Yu, Smart electricity meter data intelligence for future energy systems: A survey. IEEE Trans. Ind. Inform. 12(1), 425–436 (2016)
E. Ancillotti, R. Bruno, M. Conti, The role of communication systems in smart grids: Architectures, technical solutions and research challenges. Comput. Commun. 36(17–18), 1665–1697 (2013)
M. Benmalek, Y. Challal, A. Derhab, A. Bouabdallah, VerSAMI: Versatile and Scalable key management for smart grid AMI systems. Comput. Netw. 132, 161–179 (2018)
D. Bian, M. Kuzlu, M. Pipattanasomporn, S. Rahman, Analysis of communication schemes for advanced metering infrastructure (AMI). In 2014 IEEE PES general meeting – conference & exposition, IEEE (2014), pp. 1–5
Y. Chen, J.-F. Martínez, P. Castillejo, L. López, An anonymous authentication and key establish scheme for smart grid: FAuth. Energies 10(9), 1354 (2017)
D. He, N. Kumar, J.-H. Lee, Privacy-preserving data aggregation scheme against internal attackers in smart grids. Wirel. Netw 22, 491–502 (2016)
A. Humayed, J. Lin, F. Li, B. Luo, Cyber-physical systems security – A survey. IEEE Internet Things J. 4(6), 1802–1831 (2017)
D. Johnson, A. Menezes, S. Vanstone, The Elliptic Curve Digital Signature Algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001)
Y. Kabalci, A survey on smart metering and smart grid communication. Renew. Sust. Energ. Rev. 57, 302–318 (2016)
S.L. Keoh, Z. Tang, Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification. In 2014 10th international conference on information assurance and security (2014), pp. 6–11
S. Khasawneh, M. Kadoch, Hybrid cryptography algorithm with precomputation for advanced metering infrastructure networks. Mob. Netw. Appl. 23(4), 982–993 (2018)
H. Ko, J. Jin, S.L. Keoh, in ViotSOC: Controlling access to dynamically virtualized IoT services using service object capability. Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, CPSS ’17 (ACM, New York, 2017), pp. 69–80
N. Koblitz, Elliptic curve cryptosystems. Math. Comput. 48, 203–209 (1997)
K. Mahmood, S.A. Chaudhry, H. Naqvi, T. Shon, H.F. Ahmad, A lightweight message authentication scheme for smart grid communications in power sector. Comput. Electr. Eng. 52, 114–124 (2016)
A. Mohammadali, M. Sayad Haghighi, M.H. Tadayon, A. Mohammadi-Nodooshan, A novel identity-based key establishment method for advanced metering infrastructure in smart grid. IEEE Trans. Smart Grid 9(4), 2834–2842 (2018)
R.R. Mohassel, A. Fung, F. Mohammadi, K. Raahemifar, A survey on advanced metering infrastructure. Int. J. Electr. Power Energy Syst. 63, 473–484 (2014)
J. Ng, S.L. Keoh, Z. Tang, H. Ko, SEABASS: Symmetric-keychain encryption and authentication for building automation systems. In 4th IEEE World Forum on Internet of Things (WF-IoT 2018), Singapore (5–8 Feb 2018), pp. 219–224
R.D. Nicola, M. Loreti, R. Pugliese, F. Tiezzi, A formal approach to autonomic systems programming: The SCEL language. ACM Trans. Auton. Adapt. Syst. 9(2), 7:1–7:29 (2014)
V. Odelu, S. Zeadally, A.K. Das, M. Wazid, D. He, A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks. Telecommun. Syst. 69(4), 431–445 (2018)
Y. Piao, J. Kim, U. Tariq, M. Hong, Polynomial-based key management for secure intra-group and inter-group communication. Comput. Math. Appl. 65(9), 1300–1309 (2013)
D.S. Roche, in Space- and time-efficient polynomial multiplication. Proceedings of the 2009 International Symposium on Symbolic and Algebraic Computation (ISSAC ’09) (ACM, New York, 2009), pp. 295–302
A. Sani, D. Yuan, W. Bao, Z. Dong, in Towards secure energy internet communication scheme: An identity-based key bootstrapping protocol supporting unicast and multicast. 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA) (IEEE Computer Society, Los Alamitos, 2017), pp. 1–5
M. Siekkinen, M. Hiienkari, J.K. Nurminen, J. Nieminen, How low energy is Bluetooth Low Energy? Comparative measurements with ZigBee/802.15.4. In 2012 IEEE wireless communications and networking conference workshops (WCNCW), IEEE (2012), pp. 232–237
H.C. Tan, K. Lim, S.L. Keoh, Z. Tang, D. Leong, C.S. Sum, Chameleon: A blind double trapdoor hash function for securing AMI data aggregation. In 2018 IEEE 4th World Forum on Internet of Things (WF-IoT) (2018), pp. 225–230
T. Thakur, An access control protocol for wireless sensor network using double trapdoor chameleon hash function. J. Sens. (2016), pp. 1–6
J. Tsai, N. Lo, Secure anonymous key distribution scheme for smart grid. IEEE Trans. Smart Grid 7(2), 906–914 (2016)
Z. Wan, G. Wang, Y. Yang, S. Shi, SKM: Scalable key management for advanced metering infrastructure in smart grids. IEEE Trans. Ind. Electron. 61(12), 7055–7066 (2014)
M. Wazid, A.K. Das, S. Kumari, X. Li, F. Wu, Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS. Secur. Commun. Netw. 9(13), 1983–2001 (2016)
WiSUN Alliance, Wi-SUN Alliance and FAN. https://www.wi-sun.org/smart-utilities/. Accessed Jan 2019
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this entry
Cite this entry
Keoh, S.L., Tan, H.C., Tang, Z. (2020). Authentication and Integrity Protection for Real-Time Cyber-Physical Systems. In: Tian, YC., Levy, D. (eds) Handbook of Real-Time Computing. Springer, Singapore. https://doi.org/10.1007/978-981-4585-87-3_39-1
Download citation
DOI: https://doi.org/10.1007/978-981-4585-87-3_39-1
Received:
Accepted:
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-4585-87-3
Online ISBN: 978-981-4585-87-3
eBook Packages: Springer Reference EngineeringReference Module Computer Science and Engineering