Abstract
Smart grid is a combination of traditional power grid and many systems and networks including a variety of energy and operational measures such as smart meters, smart supplies, renewable energy sources and efficient energy sources. All these facilities and systems in smart grid, are integrated to provide a supervised and two-way commutation network for the grid. This new infrastructure of developing power distribution grid, utilizes a digital collection system called smart grid. Due to the rapid development and the sensitive data transmitted in this grid, different security challenges arise. Among them are privacy of smart meters, secure data transmission and a variety of attacks which may threaten network security. Given the security challenges in the smart grid, there are a variety of attacks e.g. denial of service (DoS), man in the middle (MITM), replay attack and spoofing that can affect the integrity of network data and the authentication of network devices and users.
Further, there are other threats such as various viruses and attacks which may compromise the security and confidentiality of network data. In this paper, we have proposed a robust ECC-based mutual authentication and key exchange scheme to generate a separate session key for each session in communication. The aim of the proposed scheme is to enable smart grid entities to establish a low-cost and secure 2-step handshake communication. Moreover, it supports a robust mutual authentication mechanism. It consists of two steps, registration process and key agreement.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
M. Chen, Y. Miao, Y. Hao, K. Hwang, Narrow band internet of things. IEEE Access 5, 20557–20577 (2017)
M. Conti, A. Dehghantanha, K. Franke, S. Watson, Internet of things security and forensics: challenges and opportunitiesm. Futur. Gener. Comput. Syst. 78, 544–546 (2018)
H. Karimipour, V. Dinavahi, Robust Massively parallel dynamic state estimation of power systems against cyber-attack. IEEE Access 6, 2984–2995 (2017)
H. Karimipour, V. Dinavahi, Parallel relaxation based joint dynamic state estimation of large-scale power system. IET Gen. Trans. Dist. 10(2), 452–459 (2016)
H.M. Ruzbahani, A. Rahimnejad, H. Karimipour, Smart households demand response management with micro grid, in IEEE Innovative Smart Grid Technologies (ISGT 2019), Washington, DC (2019), pp. 1–5
A. Dehghantanha, K. Franke, Privacy-respecting digital investigation, in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (2014), pp. 129–138
F. Ghalavand, B.M. Alizadeh, H. Karimipour, Micro grid islanding detection based on mathematical morphology. J. Energy 11(10), 456–477 (2018)
R. Lu, X. Liang, X. Li, X. Lin, X. Shen, Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23(9), 1621–1631 (2012)
H. Karimipour, V. Dinavahi, Extended Kalman filter based massively parallel dynamic state estimation. IEEE Trans. Smart Grid 6(3), 1539–1549 (2015)
H. Karimipour, A. Dehghantanha, R.M. Parizi, R. Choo, H. Leung, A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids. IEEE Access 7, 80778–80788 (2019)
H. Karimipour, V. Dinavahi, Parallel domain decomposition based distributed state estimation for large-scale power systems. IEEE Trans. Ind. Appl. 52(2), 1265–1269 (2016)
N. Framework, Roadmap for Smart Grid Interoperability Standards (National Institute of Standards and Technology, 2010), p. 26
D.B. Rawat, C. Bajracharya, Cyber security for smart grid systems: Status, challenges and perspectives, in IEEE SoutheastCon 2015 (2015), pp. 1–6
M. Damshenas, A. Dehghantanha, R. Mahmoud, A survey on malware propagation, analysis, and detection. Int. J. Cyber-Secur. Digital Forensics 2(4), 10–30 (2013)
S. Hadayeghparast, A. S. Soltaninejad, H. Karimipour, Employing composite demand response model in microgrid energy management, in IEEE International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, Canada (2019), pp. 1–5
S. Hadayeghparast, H. A. Shayanfar, H. Karimipour, Day-ahead scheduling of a virtual power plant in presence of an incentive-based demand response program, in IEEE I&CPS Conference, Calgary, Canada, (2019), pp. 1–5
P.-Y. Chen, S.-M. Cheng, K.-C. Chen, Smart attacks in smart grid communication networks. IEEE Commun. Mag. 50(8), 24–29 (2012)
P. Lv, X. Wang, Y. Yang, M. Xu, Network virtualization for smart grid communications. IEEE Syst. J. 8(2), 471–482 (2013)
Q. Song, W. Sheng, L. Kou, D. Zhao, Z. Wu, H. Fang, Smart substation integration technology and its application in distribution power grid. CSEE J. Power Energy Syst. 2(4), 31–36 (2016)
E. Tebekaemi, D. Wijesekera, Designing an IEC 61850 based power distribution substation simulation/emulation testbed for cyber-physical security studies, in Proceedings of the First International Conference on Cyber-Technologies and Cyber-Systems (2016), pp. 41–49
C. Wester, M. Adamiak, J. Vico, IEC61850 protocol-practical applications in industrial facilities, in 2011 IEEE Industry Applications Society Annual Meeting (2011), pp. 1–7
R. Tawde, A. Nivangune, M. Sankhe, Cyber security in smart grid SCADA automation systems, in 2015 IEEE International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) (2015), pp. 1–5
D. Li, Z. Aung, J. Williams, A. Sanchez, P3: Privacy preservation protocol for automatic appliance control application in smart grid. IEEE Internet Things J. 1(5), 414–429 (2014)
R. Khan, K. Mclaughlin, D. Laverty, S. Sezer, Design and implementation of security gateway for synchrophasor based real-time control and monitoring in smart grid. IEEE Access 5, 11626–11644 (2017)
X. Li, J. Niu, S. Kumari, F. Wu, K.-K.R. Choo, A robust biometrics based three-factor authentication scheme for global mobility networks in smart city. Futur. Gener. Comput. Syst. 83, 607–618 (2018)
E. Modiri, A. Azmoodeh, A. Dehghantanha, H. Karimipour, Fuzzy pattern tree for edge attack detection and categorization. Elsevier J. Syst. Archit., 1–15 (2018)
S. Mohammadi, H. Mirvaziri, M.G. Ahsaee, H. Karimipour, Cyber intrusion detection by combined feature selection algorithm. Elsevier J. Inf. Secur. Appl. 44, 80–88 (2018)
H. Karimipour, V. Dinavahi, On false data injection attack against dynamic state estimation on smart power grids, in IEEE International Conference on Smart Energy Grid Engineering, Oshawa, Canada (2017), pp. 1–7
W. Wang, Z. Lu, Cyber security in the smart grid: survey and challenges. Comput. Netw. 57(5), 1344–1371 (2013)
D. Wu, C. Zhou, Fault-tolerant and scalable key management for smart grid. IEEE Trans. Smart Grid 2(2), 375–381 (2011)
V. Odelu, A.K. Das, M. Wazid, M. Conti, Provably secure authenticated key agreement scheme for smart grid. IEEE Trans. Smart Grid 9(3), 1900–1910 (2016)
J. Xia, Y. Wang, Secure key distribution for the smart grid. IEEE Trans. Smart Grid 3(3), 1437–1443 (2012)
H. Nicanfar, P. Jokar, V.C. Leung, Smart grid authentication and key management for unicast and multicast communications, in 2011 IEEE PES Innovative Smart Grid Technologies (2011), pp. 1–8
K. Mahmood, S.A. Chaudhry, H. Naqvi, S. Kumari, X. Li, A.K. Sangaiah, An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Futur. Gener. Comput. Syst. 81, 557–565 (2018)
H. Nicanfar, P. Jokar, K. Beznosov, V.C. Leung, Efficient authentication and key management mechanisms for smart grid communications. IEEE Syst. J. 8(2), 629–640 (2013)
D. He, H. Wang, M.K. Khan, L. Wang, Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun. 10(14), 1795–1802 (2016)
J.-L. Tsai, N.-W. Lo, Secure anonymous key distribution scheme for smart grid. IEEE Trans. Smart Grid 7(2), 906–914 (2015)
Y. Chen, J.-F. MartÃnez, P. Castillejo, L. López, An anonymous authentication and key establish scheme for smart grid: FAuth. Energies 10(9), 1354 (2017)
D. Abbasinezhad-Mood, M. Nikooghadam, An anonymous ECC-based self-certified key distribution scheme for the smart grid. IEEE Trans. Ind. Electron. 65(10), 7996–8004 (2018)
P. Kumar, A. Gurtov, M. Sain, A. Martin, P.H. Ha, Lightweight authentication and key agreement for smart metering in smart energy networks. in IEEE Transactions on Smart Grid 10(4), 4349–4359 (July 2019)
P. Gope, B. Sikdar, Privacy-aware authenticated key agreement scheme for secure smart grid communication. in IEEE Transactions on Smart Grid 10(4), 3953–3962 (July 2019)
L. Zhang, L. Zhao, S. Yin, C.-H. Chi, R. Liu, Y. Zhang, A lightweight authentication scheme 403 with privacy protection for smart grid communications. Futur. Gener. Comput. Syst. 100, 770–778 (2019)
Y. Chen, J.-F. MartÃnez, P. Castillejo, L. López, A bilinear map pairing based authentication scheme for smart grid communications: PAuth. IEEE Access 7, 22633–22643 (2019)
D. Abbasinezhad-Mood, M. Nikooghadam, S.M. Mazinani, A. Babamohammadi, A. Ostad-Sharif, More efficient key establishment protocol for smart grid communications: design and experimental evaluation on ARM-based hardware. Ad Hoc Netw. 89, 119–131 (2019)
K. Sha, N. Alatrash, Z. Wang, A secure and efficient framework to read isolated smart grid devices. IEEE Trans. Smart Grid 8(6), 2519–2531 (2016)
D. Abbasinezhad-Mood, M. Nikooghadam, Efficient anonymous password-authenticated key exchange protocol to read isolated smart meters by utilization of extended Chebyshev chaotic maps. IEEE Trans. Ind. Inf. 14(11), 4815–4828 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Farhdi Moghadam, M., Mohajerzdeh, A., Karimipour, H., Chitsaz, H., Karimi, R., Molavi, B. (2020). A Privacy Protection Key Agreement Protocol Based on ECC for Smart Grid. In: Choo, KK., Dehghantanha, A. (eds) Handbook of Big Data Privacy. Springer, Cham. https://doi.org/10.1007/978-3-030-38557-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-38557-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-38556-9
Online ISBN: 978-3-030-38557-6
eBook Packages: Computer ScienceComputer Science (R0)