Advertisement

A Privacy Protection Key Agreement Protocol Based on ECC for Smart Grid

  • Mostafa Farhdi Moghadam
  • Amirhossein Mohajerzdeh
  • Hadis KarimipourEmail author
  • Hamid Chitsaz
  • Roya Karimi
  • Behzad Molavi
Chapter
  • 72 Downloads

Abstract

Smart grid is a combination of traditional power grid and many systems and networks including a variety of energy and operational measures such as smart meters, smart supplies, renewable energy sources and efficient energy sources. All these facilities and systems in smart grid, are integrated to provide a supervised and two-way commutation network for the grid. This new infrastructure of developing power distribution grid, utilizes a digital collection system called smart grid. Due to the rapid development and the sensitive data transmitted in this grid, different security challenges arise. Among them are privacy of smart meters, secure data transmission and a variety of attacks which may threaten network security. Given the security challenges in the smart grid, there are a variety of attacks e.g. denial of service (DoS), man in the middle (MITM), replay attack and spoofing that can affect the integrity of network data and the authentication of network devices and users.

Further, there are other threats such as various viruses and attacks which may compromise the security and confidentiality of network data. In this paper, we have proposed a robust ECC-based mutual authentication and key exchange scheme to generate a separate session key for each session in communication. The aim of the proposed scheme is to enable smart grid entities to establish a low-cost and secure 2-step handshake communication. Moreover, it supports a robust mutual authentication mechanism. It consists of two steps, registration process and key agreement.

References

  1. 1.
    M. Chen, Y. Miao, Y. Hao, K. Hwang, Narrow band internet of things. IEEE Access 5, 20557–20577 (2017)CrossRefGoogle Scholar
  2. 2.
    M. Conti, A. Dehghantanha, K. Franke, S. Watson, Internet of things security and forensics: challenges and opportunitiesm. Futur. Gener. Comput. Syst. 78, 544–546 (2018)CrossRefGoogle Scholar
  3. 3.
    H. Karimipour, V. Dinavahi, Robust Massively parallel dynamic state estimation of power systems against cyber-attack. IEEE Access 6, 2984–2995 (2017)CrossRefGoogle Scholar
  4. 4.
    H. Karimipour, V. Dinavahi, Parallel relaxation based joint dynamic state estimation of large-scale power system. IET Gen. Trans. Dist. 10(2), 452–459 (2016)CrossRefGoogle Scholar
  5. 5.
    H.M. Ruzbahani, A. Rahimnejad, H. Karimipour, Smart households demand response management with micro grid, in IEEE Innovative Smart Grid Technologies (ISGT 2019), Washington, DC (2019), pp. 1–5Google Scholar
  6. 6.
    A. Dehghantanha, K. Franke, Privacy-respecting digital investigation, in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (2014), pp. 129–138Google Scholar
  7. 7.
    F. Ghalavand, B.M. Alizadeh, H. Karimipour, Micro grid islanding detection based on mathematical morphology. J. Energy 11(10), 456–477 (2018)Google Scholar
  8. 8.
    R. Lu, X. Liang, X. Li, X. Lin, X. Shen, Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23(9), 1621–1631 (2012)CrossRefGoogle Scholar
  9. 9.
    H. Karimipour, V. Dinavahi, Extended Kalman filter based massively parallel dynamic state estimation. IEEE Trans. Smart Grid 6(3), 1539–1549 (2015)CrossRefGoogle Scholar
  10. 10.
    H. Karimipour, A. Dehghantanha, R.M. Parizi, R. Choo, H. Leung, A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids. IEEE Access 7, 80778–80788 (2019)CrossRefGoogle Scholar
  11. 11.
    H. Karimipour, V. Dinavahi, Parallel domain decomposition based distributed state estimation for large-scale power systems. IEEE Trans. Ind. Appl. 52(2), 1265–1269 (2016)Google Scholar
  12. 12.
    N. Framework, Roadmap for Smart Grid Interoperability Standards (National Institute of Standards and Technology, 2010), p. 26Google Scholar
  13. 13.
    D.B. Rawat, C. Bajracharya, Cyber security for smart grid systems: Status, challenges and perspectives, in IEEE SoutheastCon 2015 (2015), pp. 1–6Google Scholar
  14. 14.
    M. Damshenas, A. Dehghantanha, R. Mahmoud, A survey on malware propagation, analysis, and detection. Int. J. Cyber-Secur. Digital Forensics 2(4), 10–30 (2013)Google Scholar
  15. 15.
    S. Hadayeghparast, A. S. Soltaninejad, H. Karimipour, Employing composite demand response model in microgrid energy management, in IEEE International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, Canada (2019), pp. 1–5Google Scholar
  16. 16.
    S. Hadayeghparast, H. A. Shayanfar, H. Karimipour, Day-ahead scheduling of a virtual power plant in presence of an incentive-based demand response program, in IEEE I&CPS Conference, Calgary, Canada, (2019), pp. 1–5Google Scholar
  17. 17.
    P.-Y. Chen, S.-M. Cheng, K.-C. Chen, Smart attacks in smart grid communication networks. IEEE Commun. Mag. 50(8), 24–29 (2012)CrossRefGoogle Scholar
  18. 18.
    P. Lv, X. Wang, Y. Yang, M. Xu, Network virtualization for smart grid communications. IEEE Syst. J. 8(2), 471–482 (2013)CrossRefGoogle Scholar
  19. 19.
    Q. Song, W. Sheng, L. Kou, D. Zhao, Z. Wu, H. Fang, Smart substation integration technology and its application in distribution power grid. CSEE J. Power Energy Syst. 2(4), 31–36 (2016)CrossRefGoogle Scholar
  20. 20.
    E. Tebekaemi, D. Wijesekera, Designing an IEC 61850 based power distribution substation simulation/emulation testbed for cyber-physical security studies, in Proceedings of the First International Conference on Cyber-Technologies and Cyber-Systems (2016), pp. 41–49Google Scholar
  21. 21.
    C. Wester, M. Adamiak, J. Vico, IEC61850 protocol-practical applications in industrial facilities, in 2011 IEEE Industry Applications Society Annual Meeting (2011), pp. 1–7Google Scholar
  22. 22.
    R. Tawde, A. Nivangune, M. Sankhe, Cyber security in smart grid SCADA automation systems, in 2015 IEEE International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) (2015), pp. 1–5Google Scholar
  23. 23.
    D. Li, Z. Aung, J. Williams, A. Sanchez, P3: Privacy preservation protocol for automatic appliance control application in smart grid. IEEE Internet Things J. 1(5), 414–429 (2014)CrossRefGoogle Scholar
  24. 24.
    R. Khan, K. Mclaughlin, D. Laverty, S. Sezer, Design and implementation of security gateway for synchrophasor based real-time control and monitoring in smart grid. IEEE Access 5, 11626–11644 (2017)CrossRefGoogle Scholar
  25. 25.
    X. Li, J. Niu, S. Kumari, F. Wu, K.-K.R. Choo, A robust biometrics based three-factor authentication scheme for global mobility networks in smart city. Futur. Gener. Comput. Syst. 83, 607–618 (2018)CrossRefGoogle Scholar
  26. 26.
    E. Modiri, A. Azmoodeh, A. Dehghantanha, H. Karimipour, Fuzzy pattern tree for edge attack detection and categorization. Elsevier J. Syst. Archit., 1–15 (2018)Google Scholar
  27. 27.
    S. Mohammadi, H. Mirvaziri, M.G. Ahsaee, H. Karimipour, Cyber intrusion detection by combined feature selection algorithm. Elsevier J. Inf. Secur. Appl. 44, 80–88 (2018)Google Scholar
  28. 28.
    H. Karimipour, V. Dinavahi, On false data injection attack against dynamic state estimation on smart power grids, in IEEE International Conference on Smart Energy Grid Engineering, Oshawa, Canada (2017), pp. 1–7Google Scholar
  29. 29.
    W. Wang, Z. Lu, Cyber security in the smart grid: survey and challenges. Comput. Netw. 57(5), 1344–1371 (2013)CrossRefGoogle Scholar
  30. 30.
    D. Wu, C. Zhou, Fault-tolerant and scalable key management for smart grid. IEEE Trans. Smart Grid 2(2), 375–381 (2011)CrossRefGoogle Scholar
  31. 31.
    V. Odelu, A.K. Das, M. Wazid, M. Conti, Provably secure authenticated key agreement scheme for smart grid. IEEE Trans. Smart Grid 9(3), 1900–1910 (2016)Google Scholar
  32. 32.
    J. Xia, Y. Wang, Secure key distribution for the smart grid. IEEE Trans. Smart Grid 3(3), 1437–1443 (2012)CrossRefGoogle Scholar
  33. 33.
    H. Nicanfar, P. Jokar, V.C. Leung, Smart grid authentication and key management for unicast and multicast communications, in 2011 IEEE PES Innovative Smart Grid Technologies (2011), pp. 1–8Google Scholar
  34. 34.
    K. Mahmood, S.A. Chaudhry, H. Naqvi, S. Kumari, X. Li, A.K. Sangaiah, An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Futur. Gener. Comput. Syst. 81, 557–565 (2018)CrossRefGoogle Scholar
  35. 35.
    H. Nicanfar, P. Jokar, K. Beznosov, V.C. Leung, Efficient authentication and key management mechanisms for smart grid communications. IEEE Syst. J. 8(2), 629–640 (2013)CrossRefGoogle Scholar
  36. 36.
    D. He, H. Wang, M.K. Khan, L. Wang, Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun. 10(14), 1795–1802 (2016)CrossRefGoogle Scholar
  37. 37.
    J.-L. Tsai, N.-W. Lo, Secure anonymous key distribution scheme for smart grid. IEEE Trans. Smart Grid 7(2), 906–914 (2015)Google Scholar
  38. 38.
    Y. Chen, J.-F. Martínez, P. Castillejo, L. López, An anonymous authentication and key establish scheme for smart grid: FAuth. Energies 10(9), 1354 (2017)CrossRefGoogle Scholar
  39. 39.
    D. Abbasinezhad-Mood, M. Nikooghadam, An anonymous ECC-based self-certified key distribution scheme for the smart grid. IEEE Trans. Ind. Electron. 65(10), 7996–8004 (2018)CrossRefGoogle Scholar
  40. 40.
    P. Kumar, A. Gurtov, M. Sain, A. Martin, P.H. Ha, Lightweight authentication and key agreement for smart metering in smart energy networks. in IEEE Transactions on Smart Grid 10(4), 4349–4359 (July 2019)CrossRefGoogle Scholar
  41. 41.
    P. Gope, B. Sikdar, Privacy-aware authenticated key agreement scheme for secure smart grid communication. in IEEE Transactions on Smart Grid 10(4), 3953–3962 (July 2019)CrossRefGoogle Scholar
  42. 42.
    L. Zhang, L. Zhao, S. Yin, C.-H. Chi, R. Liu, Y. Zhang, A lightweight authentication scheme 403 with privacy protection for smart grid communications. Futur. Gener. Comput. Syst. 100, 770–778 (2019)CrossRefGoogle Scholar
  43. 43.
    Y. Chen, J.-F. Martínez, P. Castillejo, L. López, A bilinear map pairing based authentication scheme for smart grid communications: PAuth. IEEE Access 7, 22633–22643 (2019)CrossRefGoogle Scholar
  44. 44.
    D. Abbasinezhad-Mood, M. Nikooghadam, S.M. Mazinani, A. Babamohammadi, A. Ostad-Sharif, More efficient key establishment protocol for smart grid communications: design and experimental evaluation on ARM-based hardware. Ad Hoc Netw. 89, 119–131 (2019)CrossRefGoogle Scholar
  45. 45.
    K. Sha, N. Alatrash, Z. Wang, A secure and efficient framework to read isolated smart grid devices. IEEE Trans. Smart Grid 8(6), 2519–2531 (2016)CrossRefGoogle Scholar
  46. 46.
    D. Abbasinezhad-Mood, M. Nikooghadam, Efficient anonymous password-authenticated key exchange protocol to read isolated smart meters by utilization of extended Chebyshev chaotic maps. IEEE Trans. Ind. Inf. 14(11), 4815–4828 (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Mostafa Farhdi Moghadam
    • 1
  • Amirhossein Mohajerzdeh
    • 2
  • Hadis Karimipour
    • 3
    Email author
  • Hamid Chitsaz
    • 1
  • Roya Karimi
    • 2
  • Behzad Molavi
    • 2
  1. 1.Department of ComputerVahdat Institute of Higher EducationTorbat-e-JamIran
  2. 2.Department of Computer EngineeringFerdowsi University of MashhadMashhadIran
  3. 3.School of Engineering, University of GuelphGuelphCanada

Personalised recommendations